Acing the ioc game: Toward automatic discovery and analysis of open-source cyber threat intelligence X Liao, K Yuan, XF Wang, Z Li, L Xing, R Beyah Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 340 | 2016 |
Upgrading your android, elevating my malware: Privilege escalation through mobile os updating L Xing, X Pan, R Wang, K Yuan, XF Wang 2014 IEEE symposium on security and privacy, 393-408, 2014 | 169 | 2014 |
Unauthorized origin crossing on mobile platforms: Threats and mitigation R Wang, L Xing, XF Wang, S Chen Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 127 | 2013 |
Integuard: Toward automatic protection of third-party web service integrations L Xing, Y Chen, XF Wang, S Chen Network & Distributed System Security Symposium (NDSS), 2013 | 75 | 2013 |
Burglars’ iot paradise: Understanding and mitigating security risks of general messaging protocols on iot clouds Y Jia, L Xing, Y Mao, D Zhao, XF Wang, S Zhao, Y Zhang 2020 IEEE Symposium on Security and Privacy (SP), 465-481, 2020 | 72 | 2020 |
Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services XH Tongxin Li, Xiaoyong Zhou, Luyi Xing, Yeonjoon Lee, Muhammad Naveed ... Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 58 | 2014 |
Shattered Chain of Trust: Understanding Security Risks in {Cross-Cloud}{IoT} Access Delegation B Yuan, Y Jia, L Xing, D Zhao, XF Wang, Y Zhang 29th USENIX security symposium (USENIX security 20), 1183-1200, 2020 | 55 | 2020 |
Unleashing the walking dead: Understanding cross-app remote infections on mobile webviews T Li, X Wang, M Zha, K Chen, XF Wang, L Xing, X Bai, N Zhang, X Han Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 55 | 2017 |
Evil under the sun: Understanding and discovering attacks on ethereum decentralized applications L Su, X Shen, X Du, X Liao, XF Wang, L Xing, B Liu 30th USENIX Security Symposium (USENIX Security 21), 1307-1324, 2021 | 52 | 2021 |
Seeking nonsense, looking for trouble: Efficient promotional-infection detection through semantic inconsistency search X Liao, K Yuan, XF Wang, Z Pei, H Yang, J Chen, H Duan, K Du, ... 2016 IEEE Symposium on Security and Privacy (SP), 707-723, 2016 | 48 | 2016 |
Staying secure and unprepared: Understanding and mitigating the security risks of apple zeroconf X Bai, L Xing, N Zhang, XF Wang, X Liao, T Li, SM Hu 2016 IEEE Symposium on Security and Privacy (SP), 655-674, 2016 | 46 | 2016 |
Cracking app isolation on apple: Unauthorized cross-app resource access on MAC os~ x and ios L Xing, X Bai, T Li, XF Wang, K Chen, X Liao, SM Hu, X Han Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 46 | 2015 |
Devils in the guidance: predicting logic vulnerabilities in payment syndication services through automated documentation analysis Y Chen, L Xing, Y Qin, X Liao, XF Wang, K Chen, W Zou 28th USENIX Security Symposium (USENIX Security 19), 747-764, 2019 | 40 | 2019 |
Demystifying resource management risks in emerging mobile app-in-app ecosystems H Lu, L Xing, Y Xiao, Y Zhang, X Liao, XF Wang, X Wang Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020 | 39 | 2020 |
Understanding malicious cross-library data harvesting on android J Wang, Y Xiao, X Wang, Y Nan, L Xing, X Liao, JW Dong, N Serrano, ... 30th USENIX Security Symposium (USENIX Security 21), 4133-4150, 2021 | 27 | 2021 |
Rtfm! automatic assumption discovery and verification derivation from library document for api misuse detection T Lv, R Li, Y Yang, K Chen, X Liao, XF Wang, P Hu, L Xing Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020 | 23 | 2020 |
Who's in control? On security risks of disjointed IoT device management channels Y Jia, B Yuan, L Xing, D Zhao, Y Zhang, XF Wang, Y Liu, K Zheng, ... Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 20 | 2021 |
Lurking malice in the cloud: Understanding and detecting cloud repository as a malicious service X Liao, S Alrwais, K Yuan, L Xing, XF Wang, S Hao, R Beyah Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 20 | 2016 |
Unauthorized cross-app resource access on mac os x and ios L Xing, X Bai, T Li, XF Wang, K Chen, X Liao, SM Hu, X Han arXiv preprint arXiv:1505.06836, 2015 | 20 | 2015 |
Robbery on devops: Understanding and mitigating illicit cryptomining on continuous integration service platforms Z Li, W Liu, H Chen, XF Wang, X Liao, L Xing, M Zha, H Jin, D Zou 2022 IEEE Symposium on Security and Privacy (SP), 2397-2412, 2022 | 17 | 2022 |