Obserwuj
Tongxin Li
Tongxin Li
Zweryfikowany adres z pku.edu.cn
Tytuł
Cytowane przez
Cytowane przez
Rok
VTrust: Regaining Trust on Virtual Calls.
C Zhang, SA Carr, T Li, Y Ding, C Song, M Payer, D Song
The Network and Distributed System Security Symposium 2016 (NDSS'16), 2016
912016
Things You May Not Know About Android (Un) Packers: A Systematic Study based on Whole-System Emulation
Y Duan, M Zhang, AV Bhaskar, H Yin, X Pan, T Li, X Wang, XF Wang
The Network and Distributed System Security Symposium 2018 (NDSS'18), 2018
832018
Mayhem in the push clouds: Understanding and mitigating security hazards in mobile push-messaging services
T Li, X Zhou, L Xing, Y Lee, M Naveed, XF Wang, X Han
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
512014
Unleashing the walking dead: Understanding cross-app remote infections on mobile webviews
T Li, X Wang, M Zha, K Chen, XF Wang, L Xing, X Bai, N Zhang, X Han
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
442017
Cracking app isolation on apple: Unauthorized cross-app resource access on MAC os~ x and ios
L Xing, X Bai, T Li, XF Wang, K Chen, X Liao, SM Hu, X Han
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
432015
Staying secure and unprepared: Understanding and mitigating the security risks of apple zeroconf
X Bai, L Xing, N Zhang, XF Wang, X Liao, T Li, SM Hu
2016 IEEE Symposium on Security and Privacy (SP), 655-674, 2016
412016
Detecting telecommunication fraud by understanding the contents of a call
Q Zhao, K Chen, T Li, Y Yang, XF Wang
Cybersecurity 1 (1), 1-12, 2018
262018
Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment
X Bai, Z Zhou, XF Wang, Z Li, X Mi, N Zhang, T Li, SM Hu, K Zhang
26th USENIX Security Symposium (USENIX Security 17), 593-608, 2017
262017
Unauthorized cross-app resource access on mac os x and ios
L Xing, X Bai, T Li, XF Wang, K Chen, X Liao, SM Hu, X Han
arXiv preprint arXiv:1505.06836, 2015
152015
Ghost installer in the shadow: Security analysis of app installation on android
Y Lee, T Li, N Zhang, S Demetriou, M Zha, XF Wang, K Chen, X Zhou, ...
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
82017
Perplexed messengers from the cloud: Automated security analysis of push-messaging integrations
Y Chen, T Li, XF Wang, K Chen, X Han
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
82015
Building and maintaining a third-party library supply chain for productive and secure SGX enclave development
P Wang, Y Ding, M Sun, H Wang, T Li, R Zhou, Z Chen, Y Jing
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
72020
Understanding {iOS-based} Crowdturfing Through Hidden {UI} Analysis
Y Lee, X Wang, K Lee, X Liao, XF Wang, T Li, X Mi
28th USENIX Security Symposium (USENIX Security 19), 765-781, 2019
72019
Apple ZeroConf holes: How hackers can steal iPhone photos
X Bai, L Xing, N Zhang, XF Wang, X Liao, T Li, SM Hu
IEEE Security & Privacy 15 (2), 42-49, 2017
72017
POSTER: AdHoneyDroid--Capture Malicious Android Advertisements
D Wang, S Dai, Y Ding, T Li, X Han
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
52014
Poster: gbdt-rs: Fast and trustworthy gradient boosting decision tree
T Li, T Li, Y Ding, Y Zhang, T Wei, X Han
Posters In 2019 IEEE Symposium on Security and Privacy (SP), 2019
32019
Filtering for malice through the data ocean: Large-scale PHA install detection at the communication service provider level
K Chen, T Li, B Ma, P Wang, XF Wang, P Zong
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2017
32017
Staying secure and unprepared: Understanding and mitigating the security risks of Apple ZeroConf
N Zhang, XF Wang, X Liao, T Li, SM Hu
22016
Minergate: A novel generic and accurate defense solution against web based cryptocurrency mining attacks
G Yu, G Yang, T Li, X Han, S Guan, J Zhang, G Gu
China Cyber Security Annual Conference, 50-70, 2020
12020
Towards Memory Safe Python Enclave for Security Sensitive Computation
H Wang, M Sun, Q Feng, P Wang, T Li, Y Ding
arXiv preprint arXiv:2005.05996, 2020
12020
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20