Stebėti
Yue Xiao
Pavadinimas
Cituota
Cituota
Metai
Demystifying resource management risks in emerging mobile app-in-app ecosystems
H Lu, L Xing, Y Xiao, Y Zhang, X Liao, XF Wang, X Wang
Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020
532020
Understanding malicious cross-library data harvesting on android
J Wang, Y Xiao, X Wang, Y Nan, L Xing, X Liao, JW Dong, N Serrano, ...
30th USENIX Security Symposium (USENIX Security 21), 4133-4150, 2021
452021
Lalaine: Measuring and characterizing non-compliance of apple privacy labels at scale
Y Xiao, Z Li, Y Qin, X Bai, J Guan, X Liao, L Xing
arXiv preprint arXiv:2206.06274, 2022
242022
Lalaine: Measuring and characterizing {Non-Compliance} of apple privacy labels
Y Xiao, Z Li, Y Qin, X Bai, J Guan, X Liao, L Xing
32nd USENIX Security Symposium (USENIX Security 23), 1091-1108, 2023
202023
{OS-Aware} vulnerability prioritization via differential severity analysis
Q Wu, Y Xiao, X Liao, K Lu
31st USENIX Security Symposium (USENIX Security 22), 395-412, 2022
132022
Vulnerability intelligence alignment via masked graph attention networks
Y Qin, Y Xiao, X Liao
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
42023
Measuring Compliance Implications of Third-party Libraries' Privacy Label Disclosure Guidelines
Y Xiao, C Zhang, Y Qin, FFS Alharbi, L Xing, X Liao
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and …, 2024
2024
Understanding Legal Professionals' Practices and Expectations in Data Breach Incident Reporting
E Gumusel, Y Xiao, Y Qin, J Qin, X Liao
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and …, 2024
2024
Fulfilling Privacy and Security Compliance in Software Supply Chain
Y Xiao
Indiana University, 2024
2024
{iHunter}: Hunting Privacy Violations at Scale in the Software Supply Chain on {iOS}
D Liu, Y Xiao, C Zhang, K Xie, X Bai, S Zhang, L Xing
33rd USENIX Security Symposium (USENIX Security 24), 5663-5680, 2024
2024
Enhancing Transparency and Accountability of TPLs with PBOM: A Privacy Bill of Materials
Y Xiao, A Nadkarni, X Liao
Proceedings of the 2024 Workshop on Software Supply Chain Offensive Research …, 2023
2023
Automated Expansion of Privacy Data Taxonomy for Compliant Data Breach Notification
Y Qin, Y Xiao, X Liao
JBomAudit: Assessing the Landscape, Compliance, and Security Implications of Java SBOMs
Y Xiao, D Kirat, DL Schales, J Jang, L Xing, X Liao
Sistema negali atlikti operacijos. Bandykite vėliau dar kartą.
Straipsniai 1–13