Obserwuj
Xueqiang Wang
Tytuł
Cytowane przez
Cytowane przez
Rok
Privacy loss in Apple's implementation of differential privacy on MacOS 10.12
J Tang, A Korolova, X Bai, X Wang, X Wang
arXiv preprint arXiv:1709.02753, 2017
3672017
ProFuzzer: On-the-fly Input Type Probing for Better Zero-Day Vulnerability Discovery
W You, X Wang, S Ma, J Huang, X Zhang, XF Wang, B Liang
IEEE Symposium on Security and Privacy 2019, 0, 2019
1522019
Following devil's footprints: Cross-platform analysis of potentially harmful libraries on android and ios
K Chen, X Wang, Y Chen, P Wang, Y Lee, XF Wang, B Ma, A Wang, ...
2016 IEEE Symposium on Security and Privacy (SP), 357-376, 2016
1402016
DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices.
X Wang, K Sun, Y Wang, J Jing
Ndss, 2015
1232015
Things You May Not Know About Android (Un) Packers: A Systematic Study based on Whole-System Emulation.
Y Duan, M Zhang, AV Bhaskar, H Yin, X Pan, T Li, X Wang, XF Wang
NDSS, 2018
1112018
Looking from the Mirror: Evaluating IoT Device Security through Mobile Companion Apps
X Wang, Y Sun, S Nanda, XF Wang
28th {USENIX} Security Symposium ({USENIX} Security 19), 1151-1167, 2019
842019
Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps.
X Pan, X Wang, Y Duan, XF Wang, H Yin
NDSS 17, 10.14722, 2017
81*2017
Unleashing the walking dead: Understanding cross-app remote infections on mobile webviews
T Li, X Wang, M Zha, K Chen, XF Wang, L Xing, X Bai, N Zhang, X Han
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
672017
Demystifying Resource Management Risks in Emerging Mobile App-in-App Ecosystems
H Lu, L Xing, Y Xiao, Y Zhang, X Liao, XF Wang, X Wang
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
532020
Understanding malicious cross-library data harvesting on android
J Wang, Y Xiao, X Wang, Y Nan, L Xing, X Liao, JW Dong, N Serrano, ...
30th USENIX Security Symposium (USENIX Security 21), 4133-4150, 2021
452021
Os-level side channels without procfs: Exploring cross-app information leakage on ios
X Zhang, X Wang, X Bai, Y Zhang, XF Wang
Proceedings of the Symposium on Network and Distributed System Security, 2018
442018
Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps
Y Nan, X Wang, L Xing, X Liao, R Wu, J Wu, Y Zhang, XF Wang
32nd USENIX Security Symposium (USENIX Security 23), 2023
302023
Understanding iOS-based Crowdturfing Through Hidden {UI} Analysis
X Wang, Y Lee, K Lee, X Liao, XF Wang, T Li, X Mi
28th {USENIX} Security Symposium ({USENIX} Security 19), 765-781, 2019
162019
Understanding Illicit UI in iOS apps Through Hidden UI Analysis
X Wang, Y Lee, X Liao, XF Wang
IEEE Transactions on Dependable and Secure Computing, 2019
62019
Credit Karma: Understanding Security Implications of Exposed Cloud Services through Automated Capability Inference
X Wang, Y Sun, S Nanda, XF Wang
32nd USENIX Security Symposium (USENIX Security 23), 2023
42023
WrapDroid: Flexible and fine-grained scheme towards regulating behaviors of Android apps
X Wang, Y Wang, L Liu, L Lei, J Jing
International Conference on Information Security and Cryptology, 255-268, 2015
42015
DARPA: Combating Asymmetric Dark UI Patterns on Android with Run-time View Decorator
Z Cai, Y Nan, X Wang, M Long, Q Ou, M Yang, Z Zheng
2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2023
22023
STATION: Gesture-Based Authentication for Voice Interfaces
S Park, X Wang, K Chen, Y Lee
IEEE Internet of Things Journal, 2024
12024
Union under Duress: Understanding Hazards of Duplicate Resource Mismediation in Android Software Supply Chain
X Wang, Y Zhang, XF Wang, Y Jia, L Xing
32nd USENIX Security Symposium (USENIX Security 23), 3403-3420, 2023
12023
Exclusively in-store: Acoustic location authentication for stationary business devices
S Park, C Seo, X Wang, Y Lee, SH Seo
Journal of Network and Computer Applications 232, 104028, 2024
2024
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20