33
44@string {aps = {American Physical Society,}}
55
6+ @article {zhang2025acfix ,
7+ abbr ={ TSE} ,
8+ selected ={ true} ,
9+ bibtex_show ={ true} ,
10+ title ={ ACFix: Guiding LLMs with Mined Common RBAC Practices for Context-Aware Repair of Access Control Vulnerabilities in Smart Contracts} ,
11+ author ={ Zhang, Lyuye and Li, Kaixuan and Sun, Kairan and Wu, Daoyuan and Liu, Ye and Tian, Haoye and Liu, Yang} ,
12+ journal ={ IEEE Transactions on Software Engineering (TSE)} ,
13+ year ={ 2025} ,
14+ }
15+
616@inproceedings {zhong2025detecting ,
717 abbr ={ ASE} ,
818 selected ={ true} ,
19+ bibtex_show ={ true} ,
920 title ={ Detecting Various DeFi Price Manipulations with LLM Reasoning} ,
1021 author ={ Zhong, Juantao and Wu, Daoyuan and Liu, Ye and Xie, Maoyi and Liu, Yang and Li, Yi and Liu, Ning} ,
1122 booktitle ={ Proc. IEEE/ACM Automated Software Engineering (ASE)} ,
1223 year ={ 2025}
1324}
1425
26+ @inproceedings {liu2025demystifying ,
27+ abbr ={ ASE} ,
28+ selected ={ true} ,
29+ bibtex_show ={ true} ,
30+ title ={ Demystifying OpenZeppelin's Own Vulnerabilities and Analyzing Their Propagation in Smart Contracts} ,
31+ author ={ Liu, Han and Wu, Daoyuan and Sun, Yuqiang and Wang, Shuai and Liu, Yang and Chen, Yixiang}
32+ booktitle={ Proc. IEEE/ACM Automated Software Engineering (ASE)} ,
33+ year ={ 2025}
34+ }
35+
36+ @inproceedings {liu2025have ,
37+ abbr ={ ASE} ,
38+ bibtex_show ={ true} ,
39+ title ={ Have We Solved Access Control Vulnerability Detection in Smart Contracts? A Benchmark Study} ,
40+ author ={ Liu, Han and Wu, Daoyuan and Sun, Yuqiang and Wang, Shuai and Liu, Yang}
41+ booktitle={ Proc. IEEE/ACM Automated Software Engineering (ASE)} ,
42+ year ={ 2025}
43+ }
44+
1545@inproceedings {ji2025measuring ,
1646 abbr ={ CCS} ,
1747 selected ={ true} ,
18- title ={ Measuring and augmenting large language models for solving capture-the-flag challenges} ,
48+ bibtex_show ={ true} ,
49+ title ={ Measuring and Augmenting Large Language Models for Solving Capture-the-Flag Challenges} ,
1950 author ={ Ji, Zimo and Wu, Daoyuan and Jiang, Wenyuan and Ma, Pingchuan and Li, Zongjie and Wang, Shuai} ,
20- booktitle ={ Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security} ,
21- pages ={ 603--617} ,
51+ booktitle ={ Proc. ACM Conference on Computer and Communications Security (CCS)} ,
2252 year ={ 2025}
2353}
2454
2555@inproceedings {wang2025selfdefend ,
2656 abbr ={ USENIX Security} ,
2757 selected ={ true} ,
28- title ={ $\{$SelfDefend$\}$:$\{$LLMs$\}$ can defend themselves against jailbreaking in a practical manner} ,
58+ bibtex_show ={ true} ,
59+ title ={ SelfDefend: LLMs Can Defend Themselves against Jailbreaking in a Practical Manner} ,
2960 author ={ Wang, Xunguang and Wu, Daoyuan and Ji, Zhenlan and Li, Zongjie and Ma, Pingchuan and Wang, Shuai and Li, Yingjiu and Liu, Yang and Liu, Ning and Rahmel, Juergen} ,
30- booktitle ={ 34th USENIX Security Symposium (USENIX Security 25)} ,
31- pages ={ 2441--2460} ,
61+ booktitle ={ Proc. USENIX Security Symposium} ,
3262 year ={ 2025}
3363}
3464
3565@inproceedings {peng2025testing ,
3666 abbr ={ ICSE} ,
3767 selected ={ true} ,
68+ bibtex_show ={ true} ,
3869 title ={ Testing and Understanding Deviation Behaviors in FHE-hardened Machine Learning Models} ,
3970 author ={ Peng, Yiteng and Wu, Daoyuan and Liu, Zhibo and Xiao, Dongwei and Ji, Zhenlan and Rahmel, Juergen and Wang, Shuai} ,
40- booktitle ={ IEEE Computer Society} ,
41- pages ={ 644--644} ,
42- year ={ 2025}
71+ booktitle ={ Proc. IEEE/ACM Conference on Software Engineering (ICSE)} ,
72+ year ={ 2025} ,
4373}
4474
4575@inproceedings {ma2025combining ,
4676 abbr ={ ICSE} ,
4777 selected ={ true} ,
78+ bibtex_show ={ true} ,
4879 title ={ Combining Fine-Tuning and LLM-Based Agents for Intuitive Smart Contract Auditing with Justifications} ,
4980 author ={ Ma, Wei and Wu, Daoyuan and Sun, Yuqiang and Wang, Tianwen and Liu, Shangqing and Zhang, Jian and Xue, Yue and Liu, Yang} ,
50- booktitle ={ 2025 IEEE/ACM 47th International Conference on Software Engineering (ICSE)} ,
51- pages ={ 1742--1754} ,
81+ booktitle ={ Proc. IEEE/ACM Conference on Software Engineering (ICSE)} ,
5282 year ={ 2025} ,
53- organization ={ IEEE}
5483}
5584
5685@inproceedings {zhong2025detecting ,
5786 abbr ={ NDSS} ,
5887 selected ={ true} ,
88+ bibtex_show ={ true} ,
5989 title ={ PropertyGPT: LLM-driven Formal Verification of Smart Contracts through Retrieval-Augmented Property Generation} ,
6090 author ={ Liu, Ye and Xue, Yue and Wu, Daoyuan and Sun, Yuqiang and Li, Yi and Shi, Miaolei and Liu, Yang} ,
6191 booktitle ={ Proc. ISOC Network and Distributed System Security Symposium (NDSS)} ,
@@ -65,36 +95,38 @@ @inproceedings{zhong2025detecting
6595@inproceedings {liu2024using ,
6696 abbr ={ USENIX Security} ,
6797 selected ={ true} ,
98+ bibtex_show ={ true} ,
6899 title ={ Using My Functions Should Follow My Checks: Understanding and Detecting Insecure OpenZeppelin Code in Smart Contracts} ,
69100 author ={ Liu, Han and Wu, Daoyuan and Sun, Yuqiang and Wang, Haijun and Li, Kaixuan and Liu, Yang and Chen, Yixiang} ,
70- booktitle ={ 33rd USENIX Security Symposium (USENIX Security 24)} ,
71- pages ={ 3585--3601} ,
101+ booktitle ={ Proc. USENIX Security Symposium} ,
72102 year ={ 2024}
73103}
74104
75105@inproceedings {sun2024gptscan ,
76106 abbr ={ ICSE} ,
77107 selected ={ true} ,
78- title ={ Gptscan: Detecting logic vulnerabilities in smart contracts by combining gpt with program analysis} ,
108+ bibtex_show ={ true} ,
109+ title ={ GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis} ,
79110 author ={ Sun, Yuqiang and Wu, Daoyuan and Xue, Yue and Liu, Han and Wang, Haijun and Xu, Zhengzi and Xie, Xiaofei and Liu, Yang} ,
80- booktitle ={ Proceedings of the IEEE/ACM 46th International Conference on Software Engineering} ,
81- pages ={ 1--13} ,
82- year ={ 2024}
111+ booktitle ={ Proc. IEEE/ACM Conference on Software Engineering (ICSE)} ,
112+ year ={ 2024} ,
83113}
84114
85115@inproceedings {fang2023beyond ,
86116 abbr ={ ISSTA} ,
87117 selected ={ true} ,
118+ bibtex_show ={ true} ,
88119 title ={ Beyond “Protected” and “Private”: An Empirical Security Analysis of Custom Function Modifiers in Smart Contracts} ,
89120 author ={ Fang, Yuzhou and Wu, Daoyuan and Yi, Xiao and Wang, Shuai and Chen, Yufan and Chen, Mengjie and Liu, Yang and Jiang, Lingxiao} ,
90- booktitle ={ Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis} ,
121+ booktitle ={ Proc. ACM International Symposium on Software Testing and Analysis (ISSTA) } ,
91122 pages ={ 1157--1168} ,
92123 year ={ 2023}
93124}
94125
95126@inproceedings {yi2023blockscope ,
96127 abbr ={ NDSS} ,
97128 selected ={ true} ,
129+ bibtex_show ={ true} ,
98130 title ={ BlockScope: Detecting and investigating propagated vulnerabilities in forked blockchain projects} ,
99131 author ={ Yi, Xiao and Fang, Yuzhou and Wu, Daoyuan and Jiang, Lingxiao} ,
100132 booktitle ={ Proc. ISOC Network and Distributed System Security Symposium (NDSS)} ,
0 commit comments