Things You May Not Know About Android (Un) Packers: A Systematic Study based on Whole-System Emulation Y Duan, M Zhang, AV Bhaskar, H Yin, X Pan, T Li, X Wang, XF Wang The Network and Distributed System Security Symposium 2018 (NDSS'18), 2018 | 108 | 2018 |
VTrust: Regaining Trust on Virtual Calls. C Zhang, SA Carr, T Li, Y Ding, C Song, M Payer, D Song The Network and Distributed System Security Symposium 2016 (NDSS'16), 2016 | 105 | 2016 |
Unleashing the walking dead: Understanding cross-app remote infections on mobile webviews T Li, X Wang, M Zha, K Chen, XF Wang, L Xing, X Bai, N Zhang, X Han Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 67 | 2017 |
Mayhem in the push clouds: Understanding and mitigating security hazards in mobile push-messaging services T Li, X Zhou, L Xing, Y Lee, M Naveed, XF Wang, X Han Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 61 | 2014 |
Detecting telecommunication fraud by understanding the contents of a call Q Zhao, K Chen, T Li, Y Yang, XF Wang Cybersecurity 1, 1-12, 2018 | 58 | 2018 |
Cracking app isolation on apple: Unauthorized cross-app resource access on MAC os~ x and ios L Xing, X Bai, T Li, XF Wang, K Chen, X Liao, SM Hu, X Han Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 49 | 2015 |
Staying secure and unprepared: Understanding and mitigating the security risks of apple zeroconf X Bai, L Xing, N Zhang, XF Wang, X Liao, T Li, SM Hu 2016 IEEE Symposium on Security and Privacy (SP), 655-674, 2016 | 47 | 2016 |
Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment X Bai, Z Zhou, XF Wang, Z Li, X Mi, N Zhang, T Li, SM Hu, K Zhang 26th USENIX Security Symposium (USENIX Security 17), 593-608, 2017 | 39 | 2017 |
Unauthorized cross-app resource access on mac os x and ios L Xing, X Bai, T Li, XF Wang, K Chen, X Liao, SM Hu, X Han arXiv preprint arXiv:1505.06836, 2015 | 18 | 2015 |
Understanding {iOS-based} Crowdturfing Through Hidden {UI} Analysis Y Lee, X Wang, K Lee, X Liao, XF Wang, T Li, X Mi 28th USENIX Security Symposium (USENIX Security 19), 765-781, 2019 | 16 | 2019 |
Perplexed messengers from the cloud: Automated security analysis of push-messaging integrations Y Chen, T Li, XF Wang, K Chen, X Han Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 13 | 2015 |
Building and maintaining a third-party library supply chain for productive and secure SGX enclave development P Wang, Y Ding, M Sun, H Wang, T Li, R Zhou, Z Chen, Y Jing Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 12 | 2020 |
Ghost installer in the shadow: Security analysis of app installation on android Y Lee, T Li, N Zhang, S Demetriou, M Zha, XF Wang, K Chen, X Zhou, ... 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 10 | 2017 |
Apple ZeroConf holes: How hackers can steal iPhone photos X Bai, L Xing, N Zhang, XF Wang, X Liao, T Li, SM Hu IEEE Security & Privacy 15 (2), 42-49, 2017 | 8 | 2017 |
Towards memory safe python enclave for security sensitive computation H Wang, M Sun, Q Feng, P Wang, T Li, Y Ding arXiv preprint arXiv:2005.05996, 2020 | 5 | 2020 |
POSTER: AdHoneyDroid--Capture Malicious Android Advertisements D Wang, S Dai, Y Ding, T Li, X Han Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 5 | 2014 |
Minergate: A novel generic and accurate defense solution against web based cryptocurrency mining attacks G Yu, G Yang, T Li, X Han, S Guan, J Zhang, G Gu Cyber Security: 17th China Annual Conference, CNCERT 2020, Beijing, China …, 2020 | 4 | 2020 |
Filtering for malice through the data ocean: Large-scale PHA install detection at the communication service provider level K Chen, T Li, B Ma, P Wang, XF Wang, P Zong Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017 | 4 | 2017 |
Poster: gbdt-rs: Fast and trustworthy gradient boosting decision tree T Li, T Li, Y Ding, Y Zhang, T Wei, X Han Posters In 2019 IEEE Symposium on Security and Privacy (SP), 2019 | 3 | 2019 |
POSTER: PT-DBG: Bypass anti-debugging with Intel processor tracing G Li, Y Chen, T Li, T Li, X Wu, C Zhang, X Han Proceedings of the 39th IEEE Symposium on Security and Privacy, San …, 2018 | 2 | 2018 |