Obserwuj
Xueqiang Wang
Tytuł
Cytowane przez
Cytowane przez
Rok
Privacy loss in Apple's implementation of differential privacy on MacOS 10.12
J Tang, A Korolova, X Bai, X Wang, X Wang
arXiv preprint arXiv:1709.02753, 2017
2482017
DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices.
X Wang, K Sun, Y Wang, J Jing
Ndss, 2015
1142015
Following devil's footprints: Cross-platform analysis of potentially harmful libraries on android and ios
K Chen, X Wang, Y Chen, P Wang, Y Lee, XF Wang, B Ma, A Wang, ...
2016 IEEE Symposium on Security and Privacy (SP), 357-376, 2016
1132016
ProFuzzer: On-the-fly Input Type Probing for Better Zero-Day Vulnerability Discovery
W You, X Wang, S Ma, J Huang, X Zhang, XF Wang, B Liang
IEEE Symposium on Security and Privacy 2019, 0, 2019
872019
Things You May Not Know About Android (Un) Packers: A Systematic Study based on Whole-System Emulation.
Y Duan, M Zhang, AV Bhaskar, H Yin, X Pan, T Li, X Wang, XF Wang
NDSS, 2018
842018
Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps.
X Pan, X Wang, Y Duan, XF Wang, H Yin
NDSS 17, 10.14722, 2017
702017
Looking from the Mirror: Evaluating IoT Device Security through Mobile Companion Apps
X Wang, Y Sun, S Nanda, XF Wang
28th {USENIX} Security Symposium ({USENIX} Security 19), 1151-1167, 2019
442019
Unleashing the walking dead: Understanding cross-app remote infections on mobile webviews
T Li, X Wang, M Zha, K Chen, XF Wang, L Xing, X Bai, N Zhang, X Han
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
442017
Os-level side channels without procfs: Exploring cross-app information leakage on ios
X Zhang, X Wang, X Bai, Y Zhang, XF Wang
Proceedings of the Symposium on Network and Distributed System Security, 2018
292018
Understanding malicious cross-library data harvesting on android
J Wang, Y Xiao, X Wang, Y Nan, L Xing, X Liao, JW Dong, N Serrano, ...
30th USENIX Security Symposium (USENIX Security 21), 4133-4150, 2021
112021
Demystifying Resource Management Risks in Emerging Mobile App-in-App Ecosystems
H Lu, L Xing, Y Xiao, Y Zhang, X Liao, XF Wang, X Wang
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
82020
Understanding iOS-based Crowdturfing Through Hidden {UI} Analysis
X Wang, Y Lee, K Lee, X Liao, XF Wang, T Li, X Mi
28th {USENIX} Security Symposium ({USENIX} Security 19), 765-781, 2019
8*2019
WrapDroid: Flexible and fine-grained scheme towards regulating behaviors of Android apps
X Wang, Y Wang, L Liu, L Lei, J Jing
International Conference on Information Security and Cryptology, 255-268, 2015
32015
Understanding Illicit UI in iOS apps Through Hidden UI Analysis
X Wang, Y Lee, X Liao, XF Wang
IEEE Transactions on Dependable and Secure Computing, 2019
22019
Credit Karma: Understanding Security Implications of Exposed Cloud Services through Automated Capability Inference
X Wang, Y Sun, S Nanda, XF Wang
32nd USENIX Security Symposium (USENIX Security 23), 2023
2023
Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps
Y Nan, X Wang, L Xing, X Liao, R Wu, J Wu, Y Zhang, XF Wang
32nd USENIX Security Symposium (USENIX Security 23), 2023
2023
Determining security vulnerabilities of Internet of Things devices
PE Yuqiong Sun, Xueqiang Wang, Susanta K. Nanda
2019
Systems and methods for fingerprinting devices
PE Yuqiong Sun, Xueqiang Wang, Susanta Nanda, Yun Shen, Pierre-Antoine Vervier
2018
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–18