conf.researchr.org / Zibin Zheng
Not registered as user yet
Name:Zibin Zheng
Country:China
Affiliation:Sun Yat-sen University
Contributions
2024
ASE
ISSTA
- Author of DAppFL: Just-in-Time Fault Localization for Decentralized Applications in Web3 within the Technical Papers-track
- Author of Face It Yourselves: An LLM-Based Two-Stage Strategy to Localize Configuration Errors via Logs within the Technical Papers-track
- Author of When to Stop? Towards Efficient Code Generation in LLMs with Excess Token Prevention within the Technical Papers-track
- Author of LENT-SSE: Leveraging Executed and Near Transactions for Speculative Symbolic Execution of Smart Contracts within the Technical Papers-track
- Author of Identifying Smart Contract Security Issues in Code Snippets from Stack Overflow within the Technical Papers-track
- Author of Midas: Mining Profitable Exploits in On-Chain Smart Contracts via Feedback-Driven Fuzzing and Differential Analysis within the Technical Papers-track
Internetware
2030 Software Engineering
ESEC/FSE
- Author of JIT-Smart: A Multi-Task Learning Framework for Just-In-Time Defect Prediction and Localization within the Research Papers-track
- Author of SmartAxe: Detecting Cross-Chain Vulnerabilities in Bridge Smart Contracts via Fine-Grained Static Analysis within the Research Papers-track
- Author of ChangeRCA: Finding Root Causes from Software Changes in Large Online Systems within the Research Papers-track
- Author of Efficiently Detecting Reentrancy Vulnerabilities in Complex Smart Contracts within the Research Papers-track
ICSE
- Author of F-CodeLLM: A Federated Learning Framework for Adapting Large Language Models to Practical Software Development within the Posters-track
- Author of Revealing Hidden Threats: An Empirical Study of Library Misuse in Smart Contracts within the Research Track-track
- Author of Uncover the Premeditated Attacks: Detecting Exploitable Reentrancy Vulnerabilities by Identifying Attacker Contracts within the Research Track-track
- Author of PrettySmart: Detecting Permission Re-delegation Vulnerability for Token Behaviors in Smart Contracts within the Research Track-track
- Author of An Empirical Study on Oculus Virtual Reality Applications: Security and Privacy Perspectives within the Research Track-track
International Conference on Program Comprehension
2023
ASE
- Author of iASTMapper: An Iterative Similarity-Based Abstract Syntax Tree Mapping Algorithm within the Research Papers-track
- Author of SmartCoCo: Checking Comment-code Inconsistency in Smart Contracts via Constraint Propagation and Binding within the Research Papers-track
- Author of DeFiWarder: Protecting DeFi Apps from Token Leaking Vulnerabilities within the Research Papers-track
Internetware
ISSTA
- Author of DeFiTainter: Detecting Price Manipulation Vulnerabilities in DeFi Protocols within the Technical Papers-track
- Author of Detecting State Inconsistency Bugs in DApps via On-Chain Transaction Replay and Fuzzing within the Technical Papers-track
- Author of SmartState: Detecting State-Reverting Vulnerabilities in Smart Contracts via Fine-Grained State-Dependency Analysis within the Technical Papers-track
- Author of Definition and Detection of Defects in NFT Smart Contracts within the Technical Papers-track
- Author of Toward Automated Detecting Unanticipated Price Feed in Smart Contract within the Technical Papers-track
ICSE
- Author of Practical and Efficient Model Extraction of Sentiment Analysis APIs within the Technical Track-track
- Author of Turn the Rudder: A Beacon of Reentrancy Detection for Smart Contracts on Ethereum within the Technical Track-track
- Author of BSHUNTER: Detecting and Tracing Defects of Bitcoin Scripts within the Technical Track-track
- Author of LogReducer: Identify and Reduce Log Hotspots in Kernel on the Fly within the Technical Track-track
- Author of ShellFusion: An Answer Generator for Shell Programming Tasks via Knowledge Fusion within the DEMO - Demonstrations-track