IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing. J Chen, W Diao, Q Zhao, C Zuo, Z Lin, XF Wang, WC Lau, M Sun, R Yang, ... NDSS, 2018 | 459 | 2018 |
Model-based security testing: An empirical study on oauth 2.0 implementations R Yang, G Li, WC Lau, K Zhang, P Hu Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 75 | 2016 |
Application impersonation: problems of OAuth and API design in online social networks P Hu, R Yang, Y Li, WC Lau Proceedings of the second ACM conference on Online social networks, 271-278, 2014 | 49 | 2014 |
Scalable detection of promotional website defacements in black hat {SEO} campaigns R Yang, X Wang, C Chi, D Wang, J He, S Pang, WC Lau 30th USENIX Security Symposium (USENIX Security 21), 3703-3720, 2021 | 31 | 2021 |
Breaking and fixing mobile app authentication with OAuth2. 0-based protocols R Yang, WC Lau, S Shi Applied Cryptography and Network Security: 15th International Conference …, 2017 | 24 | 2017 |
Vetting Single {Sign-On}{SDK} Implementations via Symbolic Reasoning R Yang, WC Lau, J Chen, K Zhang 27th USENIX Security Symposium (USENIX Security 18), 1459-1474, 2018 | 22 | 2018 |
Signing into one billion mobile app accounts effortlessly with OAuth2. 0 R Yang, WC Lau, T Liu Black Hat Europe, 2016 | 22 | 2016 |
Search & catch: Detecting promotion infection in the underground through search engines R Yang, J Liu, L Gu, Y Chen 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 8 | 2020 |
Make redirection evil again: Url parser issues in oauth X Wang, WC Lau, R Yang, S Shi BlackHat Asia 2019, 2019 | 5 | 2019 |
Fingerprint-jacking: Practical fingerprint authorization hijacking in Android apps X Wang, Y Chen, R Yang, S Shi, WC Lau Blackhat, Europe, Tech. Rep. Blackhat 2020, 2020 | 4 | 2020 |
An empirical study on mobile payment credential leaks and their exploits S Shi, X Wang, K Zeng, R Yang, WC Lau Security and Privacy in Communication Networks: 17th EAI International …, 2021 | 3 | 2021 |
Solving Large Graph Problems in MapReduce-Like Frameworks via Optimized Parameter Configuration H Xu, R Yang, Z Yang, WC Lau Algorithms and Architectures for Parallel Processing: 15th International …, 2015 | 1 | 2015 |
SWIDE: A Semantic-aware Detection Engine for Successful Web Injection Attacks R Yang, X Wang, K Luo, X Lei, K Li, J Xin, WC Lau Proceedings of the 2024 on ACM SIGSAC Conference on Computer and …, 2024 | | 2024 |
Security and Privacy of Single Sign-On Protocols: Vulnerability Analysis and Automated Testing R Yang PQDT-Global, 2017 | | 2017 |