Xiaofeng Wang [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition 27thUsenixSecuritySymposium-2018 - Vancouver, Canada
An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications 27thUsenixSecuritySymposium-2018 - Vancouver, Canada
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition 27thUsenixSecuritySymposium-2018 - Vancouver, Canada
An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications 27thUsenixSecuritySymposium-2018 - Vancouver, Canada
Panel Discussion: Verification & Vulnerability Analysis SGCRC-2018 - Singapore, Singapore
IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing. NDSS-2018 - san diego,usa
Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation. NDSS-2018 - san diego,usa
Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps. NDSS-2018 - san diego,usa
OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS. NDSS-2018 - san diego,usa
Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations. NDSS-2018 - san diego,usa
SmartAuth: User-Centered Authorization for the Internet of Things usenixsecurity-2017 - vancouver,canada
Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment usenixsecurity-2017 - vancouver,canada
Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps NDSS-2017 - california,usa
Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward RWC-2016 - stanford,usa
RScam: Cloud-Based Anti-Malware via Reversible Sketch SecureComm-2015 - Dallas,USa
Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale SecuritySymposium-2015 - washington,USA
UIPicker: User-Input Privacy Identification in Mobile Applications SecuritySymposium-2015 - washington,USA
What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources NDSS-2015 - san diego,usa
Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services CCS-2014 - Scottsdale,USA
Controlled Functional Encryption CCS-2014 - Scottsdale,USA
Understanding the Dark Side of Domain Parking usenix-2014 - san diego,usa
A Semantic-based Malware Detection System Design Based on Channels (virtual) AsiaARES-2014 - Bali,indonesia
An Efficient Semantic-based Organization and Similarity Search Method for Internet Data Resources (virtual) AsiaARES-2014 - Bali,indonesia
Screenmilker: How to Milk Your Android Screen for Secrets NDSS-2014 - San Diego,USA
Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android NDSS-2014 - San Diego,USA
The Tangled Web of Password Reuse NDSS-2014 - San Diego,USA
Sedic: Privacy-Aware Data Intensive Computing on Hybrid Cloud Confrence-on-computer-communications-security-2011 - Chicago, USA
Web security Confrence-on-computer-communications-security-2011 - Chicago, USA Security
Peeping Tom In The Neighborhood: Keystroke Eavesdropping On Multi-User Systems 18th USENIX Security Symposium-2009 - Montreal, Canada Security
Effective And Efficient Malware Detection At The End Host 18th USENIX Security Symposium-2009 - Montreal, Canada Security Malware
Panalyst: Privacy-Aware Remote Error Analysis On Commodity Software 17th USENIX Security Symposium-2008 - San Jose, USA Security Analysis