Obserwuj
Wei You
Wei You
Rennin University of China
Zweryfikowany adres z ruc.edu.cn
Tytuł
Cytowane przez
Cytowane przez
Rok
Who are the phishers? phishing scam detection on ethereum via network embedding
J Wu, Q Yuan, D Lin, W You, W Chen, C Chen, Z Zheng
IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2020
952020
Profuzzer: On-the-fly input type probing for better zero-day vulnerability discovery
W You, X Wang, S Ma, J Huang, X Zhang, XF Wang, B Liang
2019 IEEE symposium on security and privacy (SP), 769-786, 2019
872019
Semfuzz: Semantics-based automatic generation of proof-of-concept exploits
W You, P Zong, K Chen, XF Wang, X Liao, P Bian, B Liang
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
872017
Cracking classifiers for evasion: A case study on the google's phishing pages filter
B Liang, M Su, W You, W Shi, G Yang
Proceedings of the 25th International Conference on World Wide Web, 345-356, 2016
632016
AntMiner: mining more bugs by reducing noise interference
B Liang, P Bian, Y Zhang, W Shi, W You, Y Cai
Proceedings of the 38th International Conference on Software Engineering …, 2016
552016
SLF: Fuzzing without valid seed inputs
W You, X Liu, S Ma, D Perry, X Zhang, B Liang
2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019
532019
Taintman: An art-compatible dynamic taint analysis framework on unmodified and non-rooted android devices
W You, B Liang, W Shi, P Wang, X Zhang
IEEE Transactions on Dependable and Secure Computing 17 (1), 209-222, 2017
372017
Reference hijacking: Patching, protecting and analyzing on unmodified and non-rooted android devices
W You, B Liang, W Shi, S Zhu, P Wang, S Xie, X Zhang
2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE …, 2016
322016
Automatic Android GUI traversal with high coverage
P Wang, B Liang, W You, J Li, W Shi
2014 Fourth International Conference on Communication Systems and Network …, 2014
312014
Mass discovery of android traffic imprints through instantiated partial execution
Y Chen, W You, Y Lee, K Chen, XF Wang, W Zou
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
252017
Scriptless timing attacks on web browser privacy
B Liang, W You, L Liu, W Shi, M Heiderich
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
232014
Android implicit information flow demystified
W You, B Liang, J Li, W Shi, X Zhang
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
222015
Detecting stealthy malware with inter-structure and imported signatures
B Liang, W You, W Shi, Z Liang
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
152011
Hunting vulnerable smart contracts via graph embedding based bytecode matching
J Huang, S Han, W You, W Shi, B Liang, J Wu, Y Wu
IEEE Transactions on Information Forensics and Security 16, 2144-2156, 2021
132021
Android {SmartTVs} Vulnerability Discovery via {Log-Guided} Fuzzing
Y Aafer, W You, Y Sun, Y Shi, X Zhang, H Yin
30th USENIX Security Symposium (USENIX Security 21), 2759-2776, 2021
112021
BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation
Z Zhang, W You, G Tao, G Wei, Y Kwon, X Zhang
Proceedings of the ACM on Programming Languages 3 (OOPSLA), 1-31, 2019
112019
Pmp: Cost-effective forced execution with probabilistic memory pre-planning
W You, Z Zhang, Y Kwon, Y Aafer, F Peng, Y Shi, C Harmon, X Zhang
2020 IEEE Symposium on Security and Privacy (SP), 1121-1138, 2020
102020
Stochfuzz: Sound and cost-effective fuzzing of stripped binaries by incremental and stochastic rewriting
Z Zhang, W You, G Tao, Y Aafer, X Liu, X Zhang
2021 IEEE Symposium on Security and Privacy (SP), 659-676, 2021
92021
OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary
Z Zhang, Y Ye, W You, G Tao, W Lee, Y Kwon, Y Aafer, X Zhang
2021 IEEE Symposium on Security and Privacy (SP), 813-832, 2021
42021
Finding client-side business flow tampering vulnerabilities
IL Kim, Y Zheng, H Park, W Wang, W You, Y Aafer, X Zhang
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
42020
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20