Follow
Song Li
Title
Cited by
Cited by
Year
(Cross-) browser fingerprinting via OS and hardware level features
Y Cao, S Li, E Wijmans
Proceedings 2017 Network and Distributed System Security Symposium, 2017
1672017
Detecting node. js prototype pollution vulnerabilities via object lookup analysis
S Li, M Kang, J Hou, Y Cao
Proceedings of the 29th ACM Joint Meeting on European Software Engineering …, 2021
552021
Mining Node. js Vulnerabilities via Object Dependence Graph and Query
S Li, M Kang, J Hou, Y Cao
31th USENIX Security Symposium 22, 2022
532022
Deterministic browser
Y Cao, Z Chen, S Li, S Wu
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
412017
Rendered private: Making {GLSL} execution uniform to prevent {WebGL-based} browser fingerprinting
S Wu, S Li, Y Cao, N Wang
28th USENIX Security Symposium (USENIX Security 19), 1645-1660, 2019
352019
Probe the Proto: Measuring Client-Side Prototype Pollution Vulnerabilities of One Million Real-world Websites
Z Kang, S Li, Y Cao
NDSS '22, 2022
292022
Who touched my browser fingerprint? a large-scale measurement study and classification of fingerprint dynamics
S Li, Y Cao
Proceedings of the ACM Internet Measurement Conference, 370-385, 2020
232020
Scaling javascript abstract interpretation to detect and exploit node. js taint-style vulnerability
M Kang, Y Xu, S Li, R Gjomemo, J Hou, VN Venkatakrishnan, Y Cao
2023 IEEE Symposium on Security and Privacy (SP), 1059-1076, 2023
162023
CoCo: Efficient Browser Extension Vulnerability Detection via Coverage-guided, Concurrent Abstract Interpretation
J Yu, S Li, J Zhu, Y Cao
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
102023
Towards Making JavaScript Applications Secure and Private
S Li
Johns Hopkins University, 2022
22022
GraphTrack: A Graph-based Cross-Device Tracking Framework
B Wang, T Zhou, S Li, Y Cao, N Gong
ACM ASIA Conference on Computer and Communications Security, 2022
22022
GraphTunnel: Robust DNS Tunnel Detection Based on DNS Recursive Resolution Graph
G Gao, W Niu, J Gong, D Gu, S Li, M Zhang, X Zhang
IEEE Transactions on Information Forensics and Security, 2024
12024
Assessing thresholds of resistance prevalence at which empiric treatment of gonorrhea should change among men who have sex with men in the US: A cost-effectiveness analysis
X Yin, Y Li, MM Rönn, S Li, Y Yuan, TL Gift, K Hsu, JA Salomon, YH Grad, ...
Plos Medicine 21 (7), e1004424, 2024
12024
Follow My Flow: Unveiling Client-Side Prototype Pollution Gadgets from One Million Real-World Websites
Z Kang, M Lyu, Z Liu, J Yu, R Fan, S Li, Y Cao
2025 IEEE Symposium on Security and Privacy (SP), 16-16, 2024
2024
LiScopeLens: An Open-Source License Incompatibility Analysis Tool Based on Scope Representation of License Terms
Z Liu, X Liu, Y Zhang, Z Zhang, S Li, W Niu, Q Zhou, R Zhou, X Zhou
2024 IEEE 35th International Symposium on Software Reliability Engineering …, 2024
2024
What's the Real: A Novel Design Philosophy for Robust AI-Synthesized Voice Detection
X Hai, X Liu, Y Tan, G Liu, S Li, W Niu, R Zhou, X Zhou
Proceedings of the 32nd ACM International Conference on Multimedia, 6900-6909, 2024
2024
Sensitive Behavioral Chain-focused Android Malware Detection Fused with AST Semantics
J Gong, W Niu, S Li, M Zhang, X Zhang
IEEE Transactions on Information Forensics and Security, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–17