Demystifying resource management risks in emerging mobile app-in-app ecosystems H Lu, L Xing, Y Xiao, Y Zhang, X Liao, XF Wang, X Wang Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020 | 53 | 2020 |
Understanding malicious cross-library data harvesting on android J Wang, Y Xiao, X Wang, Y Nan, L Xing, X Liao, JW Dong, N Serrano, ... 30th USENIX Security Symposium (USENIX Security 21), 4133-4150, 2021 | 45 | 2021 |
Lalaine: Measuring and characterizing non-compliance of apple privacy labels at scale Y Xiao, Z Li, Y Qin, X Bai, J Guan, X Liao, L Xing arXiv preprint arXiv:2206.06274, 2022 | 24 | 2022 |
Lalaine: Measuring and characterizing {Non-Compliance} of apple privacy labels Y Xiao, Z Li, Y Qin, X Bai, J Guan, X Liao, L Xing 32nd USENIX Security Symposium (USENIX Security 23), 1091-1108, 2023 | 20 | 2023 |
{OS-Aware} vulnerability prioritization via differential severity analysis Q Wu, Y Xiao, X Liao, K Lu 31st USENIX Security Symposium (USENIX Security 22), 395-412, 2022 | 13 | 2022 |
Vulnerability intelligence alignment via masked graph attention networks Y Qin, Y Xiao, X Liao Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 4 | 2023 |
Measuring Compliance Implications of Third-party Libraries' Privacy Label Disclosure Guidelines Y Xiao, C Zhang, Y Qin, FFS Alharbi, L Xing, X Liao Proceedings of the 2024 on ACM SIGSAC Conference on Computer and …, 2024 | | 2024 |
Understanding Legal Professionals' Practices and Expectations in Data Breach Incident Reporting E Gumusel, Y Xiao, Y Qin, J Qin, X Liao Proceedings of the 2024 on ACM SIGSAC Conference on Computer and …, 2024 | | 2024 |
Fulfilling Privacy and Security Compliance in Software Supply Chain Y Xiao Indiana University, 2024 | | 2024 |
{iHunter}: Hunting Privacy Violations at Scale in the Software Supply Chain on {iOS} D Liu, Y Xiao, C Zhang, K Xie, X Bai, S Zhang, L Xing 33rd USENIX Security Symposium (USENIX Security 24), 5663-5680, 2024 | | 2024 |
Enhancing Transparency and Accountability of TPLs with PBOM: A Privacy Bill of Materials Y Xiao, A Nadkarni, X Liao Proceedings of the 2024 Workshop on Software Supply Chain Offensive Research …, 2023 | | 2023 |
Automated Expansion of Privacy Data Taxonomy for Compliant Data Breach Notification Y Qin, Y Xiao, X Liao | | |
JBomAudit: Assessing the Landscape, Compliance, and Security Implications of Java SBOMs Y Xiao, D Kirat, DL Schales, J Jang, L Xing, X Liao | | |