Obserwuj
Peng Wang
Tytuł
Cytowane przez
Cytowane przez
Rok
Asdroid: Detecting stealthy behaviors in android applications by user interface and program behavior contradiction
J Huang, X Zhang, L Tan, P Wang, B Liang
Proceedings of the 36th International Conference on Software Engineering …, 2014
2592014
Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the {Google-Play} Scale
K Chen, P Wang, Y Lee, XF Wang, N Zhang, H Huang, W Zou, P Liu
24th USENIX Security Symposium (USENIX Security 15), 659-674, 2015
2492015
Following devil's footprints: Cross-platform analysis of potentially harmful libraries on android and ios
K Chen, X Wang, Y Chen, P Wang, Y Lee, XF Wang, B Ma, A Wang, ...
2016 IEEE Symposium on Security and Privacy (SP), 357-376, 2016
1072016
Under the shadow of sunshine: Understanding and detecting bulletproof hosting on legitimate service provider networks
S Alrwais, X Liao, X Mi, P Wang, XF Wang, F Qian, R Beyah, D McCoy
2017 IEEE Symposium on Security and Privacy (SP), 805-823, 2017
392017
Taintman: An art-compatible dynamic taint analysis framework on unmodified and non-rooted android devices
W You, B Liang, W Shi, P Wang, X Zhang
IEEE Transactions on Dependable and Secure Computing 17 (1), 209-222, 2017
352017
Reference hijacking: Patching, protecting and analyzing on unmodified and non-rooted android devices
W You, B Liang, W Shi, S Zhu, P Wang, S Xie, X Zhang
2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE …, 2016
322016
Automatic Android GUI traversal with high coverage
P Wang, B Liang, W You, J Li, W Shi
2014 Fourth International Conference on Communication Systems and Network …, 2014
302014
Cracking wall of confinement: Understanding and analyzing malicious domain takedowns
E Alowaisheq
The Network and Distributed System Security Symposium (NDSS), 2019
252019
Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations
P Wang, X Mi, X Liao, XF Wang, K Yuan, F Qian, R Beyah
Proceedings of The 25th Annual Network And Distributed System Security Symposium, 2018
152018
Into the Deep Web: Understanding E-commerce Fraud from Autonomous Chat with Cybercriminals
P Wang, X Liao, Y Qin, XF Wang
The Network and Distributed System Security Symposium, 2020
42020
Filtering for malice through the data ocean: Large-scale PHA install detection at the communication service provider level
K Chen, T Li, B Ma, P Wang, XF Wang, P Zong
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2017
32017
Price TAG: Towards Semi-Automatically Discovery Tactics, Techniques and Procedures OF E-Commerce Cyber Threat Intelligence
Y Wu, Q Liu, X Liao, S Ji, P Wang, X Wang, C Wu, Z Li
IEEE Transactions on Dependable and Secure Computing, 2021
22021
Control dependency analyses for detecting remote control Android malware
J LI, B LIANG, W YOU, P WANG, W SHI
Journal of Tsinghua University (Science and Technology), 2014
2014
一种在Android中植入动态污点分析模块的方法
梁彬, 游伟, 王鹏, 石文昌
CN Patent CN103,177,210 A, 2013
2013
Demystifying Local Business Search Poisoning for Illicit Drug Promotion
P Wang, Z Lin, X Liao, XF Wang
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–15