Yuanyuan Zhang
Yuanyuan Zhang
Verified email at sjtu.edu.cn
Title
Cited by
Cited by
Year
Appspear: Bytecode decrypting and dex reassembling for packed android malware
W Yang, Y Zhang, J Li, J Shu, B Li, W Hu, D Gu
International Workshop on Recent Advances in Intrusion Detection, 359-381, 2015
602015
From collision to exploitation: Unleashing use-after-free vulnerabilities in linux kernel
W Xu, J Li, J Shu, W Yang, T Xie, Y Zhang, D Gu
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
572015
Vulnerability assessment of oauth implementations in android applications
H Wang, Y Zhang, J Li, H Liu, W Yang, B Li, D Gu
Proceedings of the 31st Annual Computer Security Applications Conference, 61-70, 2015
402015
Binary code clone detection across architectures and compiling configurations
Y Hu, Y Zhang, J Li, D Gu
Proceedings of the 25th International Conference on Program Comprehension, 88-98, 2017
362017
icryptotracer: Dynamic analysis on misuse of cryptography functions in ios applications
Y Li, Y Zhang, J Li, D Gu
International Conference on Network and System Security, 349-362, 2014
322014
APKLancet: tumor payload diagnosis and purification for android applications
W Yang, J Li, Y Zhang, Y Li, J Shu, D Gu
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
282014
SGOR: Secure and scalable geographic opportunistic routing with received signal strength in WSNs
C Lyu, D Gu, X Zhang, S Sun, Y Zhang, A Pande
Computer Communications 59, 37-51, 2015
252015
Smart solution, poor protection: An empirical study of security and privacy issues in developing and deploying smart home devices
H Liu, C Li, X Jin, J Li, Y Zhang, D Gu
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy …, 2017
192017
Show Me the Money! Finding Flawed Implementations of Third-party In-app Payment in Android Apps
W Yang, Y Zhang, J Li, H Liu, Q Wang, Y Zhang, D Gu
182017
Cross-Architecture Binary Semantics Understanding via Similar Code Comparison
Y Hu, Y Zhang, J Li, D Gu
Software Analysis, Evolution, and Reengineering (SANER), 2016 IEEE 23rd …, 2016
162016
AppSpear: Automating the hidden-code extraction and reassembling of packed android malware
B Li, Y Zhang, J Li, W Yang, D Gu
Journal of Systems and Software 140, 3-16, 2018
152018
The Achilles heel of OAuth: a multi-platform study of OAuth-based authentication
H Wang, Y Zhang, J Li, D Gu
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
152016
Android app protection via interpretation obfuscation
J Shu, J Li, Y Zhang, D Gu
Dependable, Autonomic and Secure Computing (DASC), 2014 IEEE 12th …, 2014
142014
Towards efficient, secure, and fine-grained access control system in msns with flexible revocations
SF Sun, C Lyu, D Gu, Y Zhang, Y Ren
International Journal of Distributed Sensor Networks, 2015
13*2015
Embroidery: Patching Vulnerable Binary Code of Fragmentized Android Devices
X Zhang, Y Zhang, J Li, Y Hu, H Li, D Gu
Software Maintenance and Evolution (ICSME), 2017 IEEE International …, 2017
122017
Passwords in the Air: Harvesting Wi-Fi Credentials from SmartCfg Provisioning
C Li, Q Cai, J Li, H Liu, Y Zhang, D Gu, Y Yu
92018
Why data deletion fails? A study on deletion flaws and data remanence in Android systems
J Shu, Y Zhang, J Li, B Li, D Gu
ACM Transactions on Embedded Computing Systems (TECS) 16 (2), 61, 2017
92017
Selective Forwarding Attacks against Data and ACK Flows in Network Coding and Countermeasures
Y Zhang, M Minier
Journal of Computer Networks and Communications 2012, 2012
92012
Exploiting unidirectional links for key establishment protocols in heterogeneous sensor networks
Y Zhang, D Gu, J Li
Computer Communications 31 (13), 2959-2971, 2008
92008
Security analysis of vendor customized code in firmware of embedded device
M Liu, Y Zhang, J Li, J Shu, D Gu
International Conference on Security and Privacy in Communication Systems …, 2016
72016
The system can't perform the operation now. Try again later.
Articles 1–20