Life after speech recognition: Fuzzing semantic misinterpretation for voice assistant applications Y Zhang, L Xu, A Mendoza, G Yang, P Chinprutthiwong, G Gu Proc. of the Network and Distributed System Security Symposium (NDSS'19), 2019 | 71 | 2019 |
Autoprobe: Towards automatic active malicious server probing using dynamic binary analysis Z Xu, A Nappa, R Baykov, G Yang, J Caballero, G Gu Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 62 | 2014 |
Towards fine-grained network security forensics and diagnosis in the SDN era H Wang, G Yang, P Chinprutthiwong, L Xu, Y Zhang, G Gu Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 51 | 2018 |
Automated generation of event-oriented exploits in android hybrid apps G Yang, J Huang Proc. of the Network and Distributed System Security Symposium (NDSS'18), 2018 | 38 | 2018 |
Identity confusion in {WebView-based} mobile app-in-app ecosystems L Zhang, Z Zhang, A Liu, Y Cao, X Zhang, Y Chen, Y Zhang, G Yang, ... 31st USENIX Security Symposium (USENIX Security 22), 1597-1613, 2022 | 37 | 2022 |
Study and mitigation of origin stripping vulnerabilities in hybrid-postmessage enabled mobile applications G Yang, J Huang, G Gu, A Mendoza 2018 IEEE Symposium on Security and Privacy (SP), 742-755, 2018 | 36 | 2018 |
Abusing hidden properties to attack the node. js ecosystem F Xiao, J Huang, Y Xiong, G Yang, H Hu, G Gu, W Lee 30th USENIX Security Symposium (USENIX Security 21), 2951-2968, 2021 | 30 | 2021 |
Using provenance patterns to vet sensitive behaviors in Android apps C Yang, G Yang, A Gehani, V Yegneswaran, D Tariq, G Gu Security and Privacy in Communication Networks: 11th EAI International …, 2015 | 30 | 2015 |
Precisely and scalably vetting javascript bridge in android hybrid apps G Yang, A Mendoza, J Zhang, G Gu Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017 | 29 | 2017 |
{Iframes/Popups} Are Dangerous in Mobile {WebView}: Studying and Mitigating Differential Context Vulnerabilities G Yang, J Huang, G Gu 28th USENIX Security Symposium (USENIX Security 19), 977-994, 2019 | 20 | 2019 |
Security Study of Service Worker Cross-Site Scripting. P Chinprutthiwong, R Vardhan, GL Yang, G Gu Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | 19 | 2020 |
SEPAL: Towards a large-scale analysis of SEAndroid policy customization D Yu, G Yang, G Meng, X Gong, X Zhang, X Xiang, X Wang, Y Jiang, ... Proceedings of the Web Conference 2021, 2733-2744, 2021 | 9 | 2021 |
Collect responsibly but deliver arbitrarily? a study on cross-user privacy leakage in mobile apps S Li, Z Yang, N Hua, P Liu, X Zhang, G Yang, M Yang Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 6 | 2022 |
The service worker hiding in your browser: The next web attack target? P Chinprutthiwong, R Vardhan, GL Yang, Y Zhang, G Gu Proceedings of the 24th International Symposium on Research in Attacks …, 2021 | 6 | 2021 |
Understanding and mitigating remote code execution vulnerabilities in cross-platform ecosystem F Xiao, Z Yang, J Allen, G Yang, G Williams, W Lee Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 5 | 2022 |
Minergate: A novel generic and accurate defense solution against web based cryptocurrency mining attacks G Yu, G Yang, T Li, X Han, S Guan, J Zhang, G Gu Cyber Security: 17th China Annual Conference, CNCERT 2020, Beijing, China …, 2020 | 4 | 2020 |
Trusteddomain compromise attack in app-in-app ecosystems Z Zhang, Z Zhang, K Lian, G Yang, L Zhang, Y Zhang, M Yang Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 51-57, 2023 | 3 | 2023 |
The Dark Forest: Understanding Security Risks of Cross-Party Delegated Resources in Mobile App-in-App Ecosystems Z Zhang, L Zhang, G Yang, Y Chen, J Xu, M Yang IEEE Transactions on Information Forensics and Security, 2024 | 1 | 2024 |
NestFuzz: Enhancing Fuzzing with Comprehensive Understanding of Input Processing Logic P Deng, Z Yang, L Zhang, G Yang, W Hong, Y Zhang, M Yang Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 1 | 2023 |
Component Security Ten Years Later: An Empirical Study of Cross-Layer Threats in Real-World Mobile Applications K Lian, L Zhang, G Yang, S Mao, X Wang, Y Zhang, M Yang Proceedings of the ACM on Software Engineering 1 (FSE), 70-91, 2024 | | 2024 |