(Cross-) browser fingerprinting via OS and hardware level features Y Cao, S Li, E Wijmans Proceedings 2017 Network and Distributed System Security Symposium, 2017 | 146 | 2017 |
Deterministic browser Y Cao, Z Chen, S Li, S Wu Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 37 | 2017 |
Detecting node. js prototype pollution vulnerabilities via object lookup analysis S Li, M Kang, J Hou, Y Cao Proceedings of the 29th ACM Joint Meeting on European Software Engineering …, 2021 | 34 | 2021 |
Rendered private: Making {GLSL} execution uniform to prevent {WebGL-based} browser fingerprinting S Wu, S Li, Y Cao, N Wang 28th USENIX Security Symposium (USENIX Security 19), 1645-1660, 2019 | 27 | 2019 |
Mining Node. js Vulnerabilities via Object Dependence Graph and Query S Li, M Kang, J Hou, Y Cao 31th USENIX Security Symposium 22, 2022 | 26 | 2022 |
Who touched my browser fingerprint? a large-scale measurement study and classification of fingerprint dynamics S Li, Y Cao Proceedings of the ACM Internet Measurement Conference, 370-385, 2020 | 18 | 2020 |
Probe the Proto: Measuring Client-Side Prototype Pollution Vulnerabilities of One Million Real-world Websites Z Kang, S Li, Y Cao NDSS '22, 2022 | 9 | 2022 |
Towards Making JavaScript Applications Secure and Private S Li Johns Hopkins University, 2022 | 1 | 2022 |
Scaling JavaScript Abstract Interpretation to Detect and Exploit Node. js Taint-style Vulnerability M Kang, Y Xu, S Li, R Gjomemo, J Hou, VN Venkatakrishnan, Y Cao 2023 IEEE Symposium on Security and Privacy (SP), 1059-1076, 2023 | | 2023 |
GraphTrack: A Graph-based Cross-Device Tracking Framework B Wang, T Zhou, S Li, Y Cao, N Gong ACM ASIA Conference on Computer and Communications Security, 2022 | | 2022 |