Tian, J., Ma, H.*, Gao, D., Kuang, X. (2025). CacheAlarm: Monitoring Sensitive Behaviors of Android Apps Using Cache Side Channel. IEEE Transactions on Dependable and Secure Computing, accepted.
Lin, Y., Wong, J., Li, X., Ma, H.*, & Gao, D. (2024). Peep with a mirror: breaking the integrity of android app sandboxing via unprivileged cache side channel. In 33rd USENIX Security Symposium (USENIX Security 24) (pp. 2119-2135).
Lin, Z., Li, J., Li, B., Ma, H.*, Gao, D., & Ma, J. (2023, November). Typesqueezer: When static recovery of function signatures for binary executables meets dynamic analysis. In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (pp. 2725-2739).
Zhang, Z., Ma, H., Wu, D., Gao, D., Yi, X., Chen, Y., ... & Jiang, L. (2024, July). MtdScout: Complementing the Identification of Insecure Methods in Android Apps via Source-to-Bytecode Signature Generation and Tree-based Layered Search. In 2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P) (pp. 724-740). IEEE.
Ma, H.*, Li, S., Gao, D., Wu, D., Jia, Q., & Jia, C. (2021). Active warden attack: On the (in) effectiveness of Android app repackage-proofing. IEEE Transactions on Dependable and Secure Computing, 19(5), 3508-3520.
Ma, H.*, Tian, J., Gao, D., & Jia, C. (2021). On the effectiveness of using graphics interrupt as a side channel for user behavior snooping. IEEE Transactions on Dependable and Secure Computing, 19(5), 3257-3270.
Ma, H.*, Li, S., Gao, D., & Jia, C. (2021). Secure repackage-proofing framework for Android apps using collatz conjecture. IEEE Transactions on Dependable and Secure Computing, 19(5), 3271-3285.
Ma, H.*, Tian, J., Qiu, K., Lo, D., Gao, D., Wu, D., ... & Baker, T. (2020). Deep-learning–based app sensitive behavior surveillance for Android powered cyber–physical systems. IEEE Transactions on Industrial Informatics, 17(8), 5840-5850.
Ma, H.*, Tian, J., Gao, D., & Jia, C. (2020). Walls have ears: Eavesdropping user behaviors via graphics-interrupt-based side channel. In Information Security: 23rd International Conference, ISC 2020, Bali, Indonesia, December 16–18, 2020, Proceedings 23 (pp. 178-195). Springer International Publishing.
Ma, H.*, Jia, C., Li, S., Zheng, W., & Wu, D. (2019). Xmark: dynamic software watermarking using Collatz conjecture. IEEE Transactions on Information Forensics and Security, 14(11), 2859-2874.