关注
Guangliang Yang
Guangliang Yang
在 fudan.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Life after speech recognition: Fuzzing semantic misinterpretation for voice assistant applications
Y Zhang, L Xu, A Mendoza, G Yang, P Chinprutthiwong, G Gu
Proc. of the Network and Distributed System Security Symposium (NDSS'19), 2019
712019
Autoprobe: Towards automatic active malicious server probing using dynamic binary analysis
Z Xu, A Nappa, R Baykov, G Yang, J Caballero, G Gu
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
622014
Towards fine-grained network security forensics and diagnosis in the SDN era
H Wang, G Yang, P Chinprutthiwong, L Xu, Y Zhang, G Gu
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
512018
Automated generation of event-oriented exploits in android hybrid apps
G Yang, J Huang
Proc. of the Network and Distributed System Security Symposium (NDSS'18), 2018
382018
Identity confusion in {WebView-based} mobile app-in-app ecosystems
L Zhang, Z Zhang, A Liu, Y Cao, X Zhang, Y Chen, Y Zhang, G Yang, ...
31st USENIX Security Symposium (USENIX Security 22), 1597-1613, 2022
372022
Study and mitigation of origin stripping vulnerabilities in hybrid-postmessage enabled mobile applications
G Yang, J Huang, G Gu, A Mendoza
2018 IEEE Symposium on Security and Privacy (SP), 742-755, 2018
362018
Abusing hidden properties to attack the node. js ecosystem
F Xiao, J Huang, Y Xiong, G Yang, H Hu, G Gu, W Lee
30th USENIX Security Symposium (USENIX Security 21), 2951-2968, 2021
302021
Using provenance patterns to vet sensitive behaviors in Android apps
C Yang, G Yang, A Gehani, V Yegneswaran, D Tariq, G Gu
Security and Privacy in Communication Networks: 11th EAI International …, 2015
302015
Precisely and scalably vetting javascript bridge in android hybrid apps
G Yang, A Mendoza, J Zhang, G Gu
Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017
292017
{Iframes/Popups} Are Dangerous in Mobile {WebView}: Studying and Mitigating Differential Context Vulnerabilities
G Yang, J Huang, G Gu
28th USENIX Security Symposium (USENIX Security 19), 977-994, 2019
202019
Security Study of Service Worker Cross-Site Scripting.
P Chinprutthiwong, R Vardhan, GL Yang, G Gu
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
192020
SEPAL: Towards a large-scale analysis of SEAndroid policy customization
D Yu, G Yang, G Meng, X Gong, X Zhang, X Xiang, X Wang, Y Jiang, ...
Proceedings of the Web Conference 2021, 2733-2744, 2021
92021
Collect responsibly but deliver arbitrarily? a study on cross-user privacy leakage in mobile apps
S Li, Z Yang, N Hua, P Liu, X Zhang, G Yang, M Yang
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
62022
The service worker hiding in your browser: The next web attack target?
P Chinprutthiwong, R Vardhan, GL Yang, Y Zhang, G Gu
Proceedings of the 24th International Symposium on Research in Attacks …, 2021
62021
Understanding and mitigating remote code execution vulnerabilities in cross-platform ecosystem
F Xiao, Z Yang, J Allen, G Yang, G Williams, W Lee
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
52022
Minergate: A novel generic and accurate defense solution against web based cryptocurrency mining attacks
G Yu, G Yang, T Li, X Han, S Guan, J Zhang, G Gu
Cyber Security: 17th China Annual Conference, CNCERT 2020, Beijing, China …, 2020
42020
Trusteddomain compromise attack in app-in-app ecosystems
Z Zhang, Z Zhang, K Lian, G Yang, L Zhang, Y Zhang, M Yang
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 51-57, 2023
32023
The Dark Forest: Understanding Security Risks of Cross-Party Delegated Resources in Mobile App-in-App Ecosystems
Z Zhang, L Zhang, G Yang, Y Chen, J Xu, M Yang
IEEE Transactions on Information Forensics and Security, 2024
12024
NestFuzz: Enhancing Fuzzing with Comprehensive Understanding of Input Processing Logic
P Deng, Z Yang, L Zhang, G Yang, W Hong, Y Zhang, M Yang
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
12023
Component Security Ten Years Later: An Empirical Study of Cross-Layer Threats in Real-World Mobile Applications
K Lian, L Zhang, G Yang, S Mao, X Wang, Y Zhang, M Yang
Proceedings of the ACM on Software Engineering 1 (FSE), 70-91, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–20