Following devil's footprints: Cross-platform analysis of potentially harmful libraries on android and ios K Chen, X Wang, Y Chen, P Wang, Y Lee, XF Wang, B Ma, A Wang, ... 2016 IEEE Symposium on Security and Privacy (SP), 357-376, 2016 | 141 | 2016 |
Stealthy porn: Understanding real-world adversarial images for illicit online promotion K Yuan, D Tang, X Liao, XF Wang, X Feng, Y Chen, M Sun, H Lu, K Zhang 2019 IEEE Symposium on Security and Privacy (SP), 952-966, 2019 | 67 | 2019 |
Bookworm game: Automatic discovery of lte vulnerabilities through documentation analysis Y Chen, Y Yao, XF Wang, D Xu, C Yue, X Liu, K Chen, H Tang, B Liu 2021 IEEE Symposium on Security and Privacy (SP), 1197-1214, 2021 | 50 | 2021 |
Demystifying hidden privacy settings in mobile apps Y Chen, M Zha, N Zhang, D Xu, Q Zhao, X Feng, K Yuan, F Suya, Y Tian, ... 2019 IEEE Symposium on Security and Privacy (SP), 570-586, 2019 | 46 | 2019 |
Devils in the guidance: predicting logic vulnerabilities in payment syndication services through automated documentation analysis Y Chen, L Xing, Y Qin, X Liao, XF Wang, K Chen, W Zou 28th USENIX Security Symposium (USENIX Security 19), 747-764, 2019 | 44 | 2019 |
Mass discovery of android traffic imprints through instantiated partial execution Y Chen, W You, Y Lee, K Chen, XF Wang, W Zou Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 31 | 2017 |
Seeing the forest for the trees: Understanding security hazards in the {3GPP} ecosystem through intelligent analysis on change requests Y Chen, D Tang, Y Yao, M Zha, XF Wang, X Liu, H Tang, D Zhao 31st USENIX Security Symposium (USENIX Security 22), 17-34, 2022 | 16 | 2022 |
Practical and efficient in-enclave verification of privacy compliance W Liu, W Wang, H Chen, XF Wang, Y Lu, K Chen, X Wang, Q Shen, ... 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021 | 12 | 2021 |
Android on pc: On the security of end-user android emulators F Xu, S Shen, W Diao, Z Li, Y Chen, R Li, K Zhang Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 8 | 2021 |
Sherlock on Specs: Building {LTE} Conformance Tests through Automated Reasoning Y Chen, D Tang, Y Yao, M Zha, XF Wang, X Liu, H Tang, B Liu 32nd USENIX Security Symposium (USENIX Security 23), 3529-3545, 2023 | 6 | 2023 |
Racing on the Negative Force: Efficient Vulnerability {Root-Cause} Analysis through Reinforcement Learning on Counterexamples D Xu, D Tang, Y Chen, XF Wang, K Chen, H Tang, L Li 33rd USENIX Security Symposium (USENIX Security 24), 4229-4246, 2024 | 1 | 2024 |
Confidential attestation: Efficient in-enclave verification of privacy policy compliance W Liu, W Wang, X Wang, X Meng, Y Lu, H Chen, X Wang, Q Shen, ... arXiv preprint arXiv:2007.10513, 2020 | 1 | 2020 |
LLM-Enhanced Software Patch Localization J Yu, Y Chen, D Tang, X Liu, XF Wang, C Wu, H Tang arXiv preprint arXiv:2409.06816, 2024 | | 2024 |
Stealthy Peers: Understanding Security and Privacy Risks of Peer-Assisted Video Streaming S Tang, E Alowaisheq, X Mi, Y Chen, XF Wang, Y Dou 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems …, 2024 | | 2024 |