Uncovering and exploiting hidden apis in mobile super apps
Mobile applications, particularly those from social media platforms such as WeChat and
TikTok, are evolving into" super apps" that offer a wide range of services such as instant …
TikTok, are evolving into" super apps" that offer a wide range of services such as instant …
Don't leak your keys: Understanding, measuring, and exploiting the appsecret leaks in mini-programs
Mobile mini-programs in WeChat have gained significant popularity since their debut in
2017, reaching a scale similar to that of Android apps in the Play Store. Like Google …
2017, reaching a scale similar to that of Android apps in the Play Store. Like Google …
Towards effective detection of ponzi schemes on ethereum with contract runtime behavior graph
Ponzi schemes, a form of scam, have been discovered in Ethereum smart contracts in recent
years, causing massive financial losses. Existing detection methods primarily focus on rule …
years, causing massive financial losses. Existing detection methods primarily focus on rule …
MiniTracker: Large-Scale Sensitive Information Tracking in Mini Apps
W Li, B Yang, H Ye, L **ang, Q Tao… - … on Dependable and …, 2023 - ieeexplore.ieee.org
Running on host mobile applications, mini apps have gained increasing popularity these
days for its convenience in installation and usage. However, being easy to use allows mini …
days for its convenience in installation and usage. However, being easy to use allows mini …
RIoTFuzzer: Companion App Assisted Remote Fuzzing for Detecting Vulnerabilities in IoT Devices
Due to the diversity of architectures and peripherals of Internet of Things (IoT) systems,
blackbox fuzzing stands out as a prime option for discovering vulnerabilities of IoT devices …
blackbox fuzzing stands out as a prime option for discovering vulnerabilities of IoT devices …
MiniCAT: Understanding and Detecting Cross-Page Request Forgery Vulnerabilities in Mini-Programs
Mini-programs are lightweight apps running in super apps (such as WeChat, Baidu, Alipay,
and TikTok), an emerging paradigm in the era of mobile computing. With the growing …
and TikTok), an emerging paradigm in the era of mobile computing. With the growing …
WeMinT: Tainting Sensitive Data Leaks in WeChat Mini-Programs
Mini-programs (MiniApps), lightweight versions of full-featured mobile apps that run inside a
host app such as WeChat, have become increasingly popular due to their simplified and …
host app such as WeChat, have become increasingly popular due to their simplified and …
Do as you say: Consistency detection of data practice in program code and privacy policy in mini-app
Mini-app is an emerging form of mobile application that combines web technology with
native capabilities. Its features, eg, no need to download and no installation, have made it …
native capabilities. Its features, eg, no need to download and no installation, have made it …
[PDF][PDF] Undefined-oriented Programming: Detecting and Chaining Prototype Pollution Gadgets in Node. js Template Engines for Malicious Consequences
Prototype pollution is a type of recently-discovered, impactful vulnerability that affects
JavaScript code. One important yet challenging research problem of prototype pollution is …
JavaScript code. One important yet challenging research problem of prototype pollution is …
The Same Only Different: On Information Modality for Configuration Performance Analysis
H Liang, Y Huang, T Chen - arxiv preprint arxiv:2501.15475, 2025 - arxiv.org
Configuration in software systems helps to ensure efficient operation and meet diverse user
needs. Yet, some, if not all, configuration options have profound implications for the system's …
needs. Yet, some, if not all, configuration options have profound implications for the system's …