CENTRIS: A Precise and Scalable Approach for Identifying Modified Open-Source Software Reuse (to appear)
43rd International Conference on Software Engineering (ICSE 2021)
OctoPoCs: Automatic Verification of Propagated Vulnerable Code Using Reformed Proofs of Concept (to appear)
51st IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2021)
IoTcube: an automated analysis platform for finding security vulnerabilities
38th IEEE Symposium on Poster presented at Security and Privacy (S&P Poster 2017)
VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery
38th IEEE Symposium on Security and Privacy (S&P 2017)
METHOD FOR IDENTIFYING OPEN-SOURCE SOFTWARE COMPONENTS AT THE SOURCE-CODE LEVEL
Developed an automated software vulnerable-code clone detection tool (https://iotcube.net).
Developed a basic DDoS attack simulation tool.
Developed a smart watch-based hotel management system.
Developed a multi-platformed application supporting the connection between Smart TV and other devices (i.e., smartphone).