Achieving Accuracy and Scalability Simultaneously in Detecting Application Clones on Android Market

Besides traditional problems such as potential bugs, (smartphone) application clones on Android markets bring new threats. Existing techniques achieve either accuracy or scalability, but not both. To solve those problems, we use a geometry characteristic, called centroid, of dependency graphs to measure the similarity between methods (code fragments) in two apps. Here is the demo of the system.

Our paper was accepted by the 36th International Conference on Software Engineering (ICSE 2014).[PDF]

Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale

Our malware detection platform, MassVet, detected over 100,000 potentially harmful apps (PHA). Among them, 10,000 PHAs are missed by VirusTotal. MassVet can also detect app privacy in a large scale, over millions of apps, in seconds. For more details, please refer to our paper. Or you can use MassVet to analyze Android apps at Android Malware Detection Platform. Here is the demo and media reports of the system.

Our paper was accepted by the 24th USENIX Security Symposium (USENIX Security 2015).[PDF]

Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS

We report the first systematic study on PhaLibs across Android and iOS, based upon a key observation that many iOS libraries have Android versions that can potentially be used to understand their behaviors and the relations between the libraries on both sides.

Our paper was accepted by the 37th IEEE Symposium on Security and Privacy (IEEE S&P 2016).[PDF][Data]

CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition

We find that the voice commands can be stealthily embedded into songs, which, when played, can effectively control the target system through ASR without being noticed by a human listener. Our CommanderSongs can be done automatically against real world ASR applications. In addition, they can be spread through Internet (e.g., YouTube) and radio, potentially affecting millions of ASR users. Here is the demo of the attack.

Our paper was accepted by the 27th USENIX Security Symposium (USENIX Security 2018).[PDF][Samples]

Graduate Students

Ph.D. Students

  • Peiyuan Zong

    Peiyuan Zong

    IIE, Chinese Academy of Sciences
  • Dawei Wang

    Dawei Wang

    IIE, Chinese Academy of Sciences
  • Weihao Huang

    Weihao Huang

    IIE, Chinese Academy of Sciences
  • Qintao Shen

    Qintao Shen

    IIE, Chinese Academy of Sciences
  • Dandan Xu

    Dandan Xu

    IIE, Chinese Academy of Sciences
  • Zizhuang Deng

    Zizhuang Deng

    IIE, Chinese Academy of Sciences
  • Ying Cao

    Ying Cao

    IIE, Chinese Academy of Sciences
  • Hong Zhu

    Hong Zhu

    IIE, Chinese Academy of Sciences
  • Zhixiu Guo

    Zhixiu Guo

    IIE, Chinese Academy of Sciences
  • Jinwen He

    Jinwen He

    IIE, Chinese Academy of Sciences
  • Zijin Lin

    Zijin Lin

    IIE, Chinese Academy of Sciences
  • Peizhuo Lv

    Peizhuo Lv

    Xidian University
  • Peiwei Hu

    Peiwei Hu

    Jilin University
  • Pan Li

    Pan Li

    University of Electronic Science and Technology of China
  • Chang Yue

    Chang Yue

    IIE, Chinese Academy of Sciences
  • Miaoqian Lin

    Miaoqian Lin

    IIE, Chinese Academy of Sciences
  • Jinghua Liu

    Jinghua Liu

    IIE, Chinese Academy of Sciences
  • Jiachen Zhou

    Jiachen Zhou

    IIE, Chinese Academy of Sciences
  • Zhiyu Zhang

    Zhiyu Zhang

    IIE, Chinese Academy of Sciences
  • Ying Li

    Ying Li

    IIE, Chinese Academy of Sciences
  • Chengan Wei

    Chengan Wei

    IIE, Chinese Academy of Sciences
  • Hongyu Wu

    Hongyu Wu

    IIE, Chinese Academy of Sciences
  • Yu Peng

    Yu Peng

    IIE, Chinese Academy of Sciences
  • Congyi Li

    Congyi Li

    IIE, Chinese Academy of Sciences
  • Siliang Qin

    Siliang Qin

    IIE, Chinese Academy of Sciences

Graduate Students

Master Students

  • Xiaodong Zhang

    Xiaodong Zhang

    IIE, Chinese Academy of Sciences
  • Shufei Li

    Shufei Li

    IIE, Chinese Academy of Sciences
  • Xueyang Li

    Xueyang Li

    IIE, Chinese Academy of Sciences
  • Yunfei Yang

    Yunfei Yang

    IIE, Chinese Academy of Sciences
  • Qiucun Yan

    Qiucun Yan

    IIE, Chinese Academy of Sciences
  • Yibing Lan

    Yibing Lan

    IIE, Chinese Academy of Sciences
  • Shenchen Zhu

    Shenchen Zhu

    IIE, Chinese Academy of Sciences
  • Lu Xiang

    Lu Xiang

    IIE, Chinese Academy of Sciences
  • Kun Lai

    Kun Lai

    IIE, Chinese Academy of Sciences
  • Hualong Ma

    Hualong Ma

    IIE, Chinese Academy of Sciences
  • Runze Zhang

    Runze Zhang

    IIE, Chinese Academy of Sciences
  • Ruiyuan Li

    Ruiyuan Li

    IIE, Chinese Academy of Sciences
  • Yuling Cai

    Yuling Cai

    IIE, Chinese Academy of Sciences
  • Fan Xiang

    Fan Xiang

    IIE, Chinese Academy of Sciences

Internship

Undergraduate Students