Xiaofeng Wang [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation 29thUSENIXSecuritySymposium-2020 - Berkeley, USA
Devil’s Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices 29thUSENIXSecuritySymposium-2020 - Berkeley, USA
Kindness is a Risky Business: On the Usage of the Accessibility APIs in Android RAID2019-2019 - Beijing, China
TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-scale DNS Analysis IEEEEuroS&P-2019 - Stockholm, Sweden
Demystifying Hidden Privacy Settings in Mobile Apps IEEESymposium-2019 - San Francisco, US
ProFuzzer: On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery IEEESymposium-2019 - San Francisco, US
Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion IEEESymposium-2019 - San Francisco, US
Resident Evil: Understanding Residential IP Proxy as a Dark Service IEEESymposium-2019 - San Francisco, US
Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems IEEESymposium-2019 - San Francisco, US
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition 27thUsenixSecuritySymposium-2018 - Vancouver, Canada
An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications 27thUsenixSecuritySymposium-2018 - Vancouver, Canada
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition 27thUsenixSecuritySymposium-2018 - Vancouver, Canada
An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications 27thUsenixSecuritySymposium-2018 - Vancouver, Canada
Panel Discussion: Verification & Vulnerability Analysis SGCRC-2018 - Singapore, Singapore
IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing. NDSS-2018 - san diego,usa
Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation. NDSS-2018 - san diego,usa
Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps. NDSS-2018 - san diego,usa
OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS. NDSS-2018 - san diego,usa
Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations. NDSS-2018 - san diego,usa
SmartAuth: User-Centered Authorization for the Internet of Things usenixsecurity-2017 - vancouver,canada
Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment usenixsecurity-2017 - vancouver,canada
Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps NDSS-2017 - california,usa
Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward RWC-2016 - stanford,usa
RScam: Cloud-Based Anti-Malware via Reversible Sketch SecureComm-2015 - Dallas,USa
Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale SecuritySymposium-2015 - washington,USA
UIPicker: User-Input Privacy Identification in Mobile Applications SecuritySymposium-2015 - washington,USA
What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources NDSS-2015 - san diego,usa
Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services CCS-2014 - Scottsdale,USA
Controlled Functional Encryption CCS-2014 - Scottsdale,USA
Understanding the Dark Side of Domain Parking usenix-2014 - san diego,usa
A Semantic-based Malware Detection System Design Based on Channels (virtual) AsiaARES-2014 - Bali,indonesia
An Efficient Semantic-based Organization and Similarity Search Method for Internet Data Resources (virtual) AsiaARES-2014 - Bali,indonesia
Screenmilker: How to Milk Your Android Screen for Secrets NDSS-2014 - San Diego,USA
Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android NDSS-2014 - San Diego,USA
The Tangled Web of Password Reuse NDSS-2014 - San Diego,USA
Sedic: Privacy-Aware Data Intensive Computing on Hybrid Cloud Confrence-on-computer-communications-security-2011 - Chicago, USA
Web security Confrence-on-computer-communications-security-2011 - Chicago, USA Security
Peeping Tom In The Neighborhood: Keystroke Eavesdropping On Multi-User Systems 18th USENIX Security Symposium-2009 - Montreal, Canada Security
Effective And Efficient Malware Detection At The End Host 18th USENIX Security Symposium-2009 - Montreal, Canada Security Malware
Panalyst: Privacy-Aware Remote Error Analysis On Commodity Software 17th USENIX Security Symposium-2008 - San Jose, USA Security Analysis