Title |
Conference |
Tags |
Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation |
29thUSENIXSecuritySymposium-2020 - Berkeley, USA |
|
Devil’s Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices |
29thUSENIXSecuritySymposium-2020 - Berkeley, USA |
|
Kindness is a Risky Business: On the Usage of the Accessibility APIs in Android |
RAID2019-2019 - Beijing, China |
|
TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-scale DNS Analysis |
IEEEEuroS&P-2019 - Stockholm, Sweden |
|
Demystifying Hidden Privacy Settings in Mobile Apps |
IEEESymposium-2019 - San Francisco, US |
|
ProFuzzer: On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery |
IEEESymposium-2019 - San Francisco, US |
|
Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion |
IEEESymposium-2019 - San Francisco, US |
|
Resident Evil: Understanding Residential IP Proxy as a Dark Service |
IEEESymposium-2019 - San Francisco, US |
|
Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems |
IEEESymposium-2019 - San Francisco, US |
|
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition |
27thUsenixSecuritySymposium-2018 - Vancouver, Canada |
|
An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications |
27thUsenixSecuritySymposium-2018 - Vancouver, Canada |
|
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition |
27thUsenixSecuritySymposium-2018 - Vancouver, Canada |
|
An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications |
27thUsenixSecuritySymposium-2018 - Vancouver, Canada |
|
Panel Discussion: Verification & Vulnerability Analysis |
SGCRC-2018 - Singapore, Singapore |
|
IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing. |
NDSS-2018 - san diego,usa |
|
Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation. |
NDSS-2018 - san diego,usa |
|
Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps. |
NDSS-2018 - san diego,usa |
|
OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS. |
NDSS-2018 - san diego,usa |
|
Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations. |
NDSS-2018 - san diego,usa |
|
SmartAuth: User-Centered Authorization for the Internet of Things |
usenixsecurity-2017 - vancouver,canada |
|
Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment |
usenixsecurity-2017 - vancouver,canada |
|
Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps |
NDSS-2017 - california,usa |
|
Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward |
RWC-2016 - stanford,usa |
|
RScam: Cloud-Based Anti-Malware via Reversible Sketch |
SecureComm-2015 - Dallas,USa |
|
Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale |
SecuritySymposium-2015 - washington,USA |
|
UIPicker: User-Input Privacy Identification in Mobile Applications |
SecuritySymposium-2015 - washington,USA |
|
What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources |
NDSS-2015 - san diego,usa |
|
Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services |
CCS-2014 - Scottsdale,USA |
|
Controlled Functional Encryption |
CCS-2014 - Scottsdale,USA |
|
Understanding the Dark Side of Domain Parking |
usenix-2014 - san diego,usa |
|
A Semantic-based Malware Detection System Design Based on Channels (virtual) |
AsiaARES-2014 - Bali,indonesia |
|
An Efficient Semantic-based Organization and Similarity Search Method for Internet Data Resources (virtual) |
AsiaARES-2014 - Bali,indonesia |
|
Screenmilker: How to Milk Your Android Screen for Secrets |
NDSS-2014 - San Diego,USA |
|
Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android |
NDSS-2014 - San Diego,USA |
|
The Tangled Web of Password Reuse |
NDSS-2014 - San Diego,USA |
|
Sedic: Privacy-Aware Data Intensive Computing on Hybrid Cloud |
Confrence-on-computer-communications-security-2011 - Chicago, USA |
|
Web security |
Confrence-on-computer-communications-security-2011 - Chicago, USA |
Security
|
Peeping Tom In The Neighborhood: Keystroke Eavesdropping On Multi-User Systems |
18th USENIX Security Symposium-2009 - Montreal, Canada |
Security
|
Effective And Efficient Malware Detection At The End Host |
18th USENIX Security Symposium-2009 - Montreal, Canada |
Security
Malware
|
Panalyst: Privacy-Aware Remote Error Analysis On Commodity Software |
17th USENIX Security Symposium-2008 - San Jose, USA |
Security
Analysis
|