Indiana University, Bloomington

General Info

Rank: #15 Worldwide
#12 in US
Papers: 125
Number of Researchers: 89
APA
(average papers per authors):
1.4
Country: USA

Activity Map

Contributors

  • XiaoFeng Wang (94 papers)
  • Luyi Xing (23 papers)
  • Xiaojing Liao (18 papers)
  • Kan Yuan (11 papers)
  • Xueqiang Wang (10 papers)
  • Nan Zhang (10 papers)
  • Haixu Tang (9 papers)
  • Apu Kapadia (9 papers)
  • Xiaoyong Zhou (9 papers)
  • Yan Huang (9 papers)
  • Rui Wang (8 papers)
  • Peng Wang (7 papers)
  • Yeonjoon Lee (6 papers)
  • Xiaorui Pan (6 papers)
  • Xianghang Mi (6 papers)
  • Kehuan Zhang (6 papers)
  • Sumayah Alrwais (6 papers)
  • Eihal Alowaisheq (5 papers)
  • Zhou Li (5 papers)
  • Yangyi Chen (4 papers)
  • Feng Qian (4 papers)
  • Siyuan Tang (4 papers)
  • Mingming Zha (4 papers)
  • Yi Chen (4 papers)
  • Haoran Lu (4 papers)
  • Dongfang Zhao (4 papers)
  • Kai Chen (4 papers)
  • Ruiyu Zhu (4 papers)
  • David Crandall (3 papers)
  • Yue Qin (3 papers)
  • Markus Jakobsson (3 papers)
  • Xuan Feng (3 papers)
  • Yue Xiao (3 papers)
  • Zhuowei Li (2 papers)
  • Jong Youl Choi (2 papers)
  • Steven Myers (2 papers)
  • Wenhao Wang (2 papers)
  • Rakibul Hasan (2 papers)
  • Wei You (2 papers)
  • Yifan Zhang (2 papers)
  • Di Tang (2 papers)
  • Bo Peng (1 papers)
  • Zahid Rahman (1 papers)
  • Robert Templeman (1 papers)
  • Mohammed Korayem (1 papers)
  • Xiaojin Leo (1 papers)
  • Xaiofeng Wang (1 papers)
  • Tasneem Alowaisheq (1 papers)
  • XiangHang Mi (1 papers)
  • Zhengyi Li (1 papers)
  • Zilong Lin (1 papers)
  • Alex Tsow (1 papers)
  • Tom N. Jagatic (1 papers)
  • Adam Shull (1 papers)
  • Tianyu Chen (1 papers)
  • Kurt Hugenberg (1 papers)
  • Bennett Bertenthal (1 papers)
  • Xiaozhong Liu (1 papers)
  • Weijie Liu (1 papers)
  • Hongbo Chen (1 papers)
  • Adithya Vadapalli (1 papers)
  • Zheng Dong (1 papers)
  • Yong Fuga Li (1 papers)
  • Nathaniel Husted (1 papers)
  • Shirin Nilizadeh (1 papers)
  • Yong-Yeol Ahn (1 papers)
  • Xiaolong Bai (1 papers)
  • Yongan Zhao (1 papers)
  • Diyue Bu (1 papers)
  • Peter Yeonjoon Lee (1 papers)
  • Syed Mahbub Hafiz (1 papers)
  • Ryan Henry (1 papers)
  • Sameer Patil (1 papers)
  • Amr Sabry (1 papers)
  • Changchang Ding (1 papers)
  • Peyton Crnjak (1 papers)
  • Ze Jin (1 papers)
  • Yiwei Fang (1 papers)
  • Jiale Guan (1 papers)
  • Sid Stamm (1 papers)
  • Xiao Zhou (1 papers)
  • Kwangwuk Lee (1 papers)
  • Taslima Akter (1 papers)
  • Tousif Ahmed (1 papers)
  • Liya Su (1 papers)
  • Xinyue Shen (1 papers)
  • Xiangyu Du (1 papers)
  • Jice Wang (1 papers)
  • Nicolas Serrano (1 papers)

Papers

"Fragile Mixing"

XiaoFeng Wang, ... -- CCS 2004

"Mitigating Bandwidth-Exhaustion Attacks using Congestion Puzzles"

XiaoFeng Wang, ... -- CCS 2004

"Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks"

XiaoFeng Wang, Markus Jakobsson, Alex Tsow, ... -- Oakland 2006

"Cache Cookies for Browser Authentication (Extended Abstract)"

Markus Jakobsson, Tom N. Jagatic, ... -- Oakland 2006

"Packet Vaccine: Black-box Exploit Detection and Signature Generation"

XiaoFeng Wang, Zhuowei Li, Jong Youl Choi, ... -- CCS 2006

"Combating Click Fraud via Premium Clicks"

Sid Stamm, Markus Jakobsson, ... -- Usenix 2007

"PRECIP: Towards Practical and Retrofittable Confidential Information Protection"

XiaoFeng Wang, Zhuowei Li, Jong Youl Choi, ... -- NDSS 2008

"Towards Automatic Reverse Engineering of Software Security Configuration"

Rui Wang, XiaoFeng Wang, Kehuan Zhang, ... -- CCS 2008

"Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software"

XiaoFeng Wang, Rui Wang, ... -- Usenix 2008

"Privacy-preserving genomic computation through program specialization"

Rui Wang, XiaoFeng Wang, Zhou Li, Haixu Tang, Zheng Dong, ... -- CCS 2009

"Learning your identity and disease from research papers: information leaks in genome wide association study"

Rui Wang, Yong Fuga Li, XiaoFeng Wang, Haixu Tang, Xiaoyong Zhou, ... -- CCS 2009

"Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems"

XiaoFeng Wang, Kehuan Zhang, ... -- Usenix 2009

"Effective and Efficient Malware Detection at the End Host"

XiaoFeng Wang, Xiao Zhou, ... -- Usenix 2009

"Side-Channel Leaks in Web Applications: a Reality Today, a Challenge Tomorrow"

Rui Wang, XiaoFeng Wang, Kehuan Zhang, ... -- Oakland 2010

"Mobile location tracking in metro areas: malnets and others"

Nathaniel Husted, Steven Myers, ... -- CCS 2010

"Sidebuster: automated detection and quantification of side-channel leaks in web application development"

Kehuan Zhang, Zhou Li, Rui Wang, XiaoFeng Wang, ... -- CCS 2010

"How to Shop for Free Online - Security Analysis of Cashier-as-a-Service Based Web Stores"

Rui Wang, XiaoFeng Wang, ... -- Oakland 2011

"Sedic: Privacy-Aware Data Intensive Computing on Hybrid Cloud"

Kehuan Zhang, Xiaoyong Zhou, Yangyi Chen, XiaoFeng Wang, ... -- CCS 2011

"Large-Scale Privacy-Preserving Mapping of Human Genomic Sequences on Hybrid Clouds"

Yangyi Chen, Bo Peng, XiaoFeng Wang, Haixu Tang, ... -- NDSS 2012

"BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation"

Apu Kapadia, ... -- NDSS 2012

"Signing Me onto Your Accounts through Facebook and Google: a Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services"

Rui Wang, XiaoFeng Wang, ... -- Oakland 2012

"Knowing Your Enemy: Understanding and Detecting Malicious Web Advertising"

Zhou Li, Kehuan Zhang, XiaoFeng Wang, ... -- CCS 2012

"PERM: Practical Reputation-Based Blacklisting without TTPs"

Apu Kapadia, ... -- CCS 2012

"PlaceRaider: Virtual Theft in Physical Spaces with Smartphones"

Zahid Rahman, David Crandall, Apu Kapadia, ... -- NDSS 2013

"InteGuard: Toward Automatic Protection of Third-Party Web Service Integrations"

Luyi Xing, Yangyi Chen, XiaoFeng Wang, ... -- NDSS 2013

"Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures"

Zhou Li, Sumayah Alrwais, XiaoFeng Wang, ... -- Oakland 2013

"Identity, Location, Disease and More: Inferring Your Secrets from Android Public Resources"

Xiaoyong Zhou, Xiaorui Pan, XiaoFeng Wang, ... -- CCS 2013

"Unauthorized Origin Crossing on Mobile Platforms: Threats and Mitigation"

Luyi Xing, XiaoFeng Wang, ... -- CCS 2013

"Screenmilker: How to Milk Your Android Screen for Secrets"

Xiaoyong Zhou, XiaoFeng Wang, ... -- NDSS 2014

"Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android"

Xiaoyong Zhou, XiaoFeng Wang, ... -- NDSS 2014

"The Tangled Web of Password Reuse"

XiaoFeng Wang, ... -- NDSS 2014

"PlaceAvoider: Steering First-Person Cameras away from Sensitive Spaces"

Robert Templeman, Mohammed Korayem, David Crandall, Apu Kapadia, ... -- NDSS 2014

"Hunting the Red Fox Online: Understanding and Detection of Mass Redirect-Script Injections"

Sumayah Alrwais, XiaoFeng Wang, Eihal Alowaisheq, ... -- Oakland 2014

"Upgrading Your Android, Elevating My Malware: Privilege Escalation Through Mobile OS Updating"

Luyi Xing, Xiaorui Pan, Kan Yuan, XiaoFeng Wang, ... -- Oakland 2014

"The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations"

Xiaoyong Zhou, Yeonjoon Lee, Nan Zhang, XiaoFeng Wang, ... -- Oakland 2014

"Controlled Functional Encryption"

XiaoFeng Wang, ... -- CCS 2014

"Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services"

Xiaoyong Zhou, Luyi Xing, Yeonjoon Lee, XiaoFeng Wang, ... -- CCS 2014

"Oblivious Data Structures"

Yan Huang, ... -- CCS 2014

"Community-Enhanced De-anonymization of Online Social Networks"

Shirin Nilizadeh, Apu Kapadia, Yong-Yeol Ahn, ... -- CCS 2014

"SCORAM: Oblivious RAM for Secure Computation"

Yan Huang, ... -- CCS 2014

"Understanding the Dark Side of Domain Parking"

Sumayah Alrwais, Kan Yuan, Eihal Alowaisheq, Zhou Li, XiaoFeng Wang, ... -- Usenix 2014

"What's in Your Dongle and Bank Account's Mandatory and Discretionary Protection of Android External Resources"

Xiaoyong Zhou, Yeonjoon Lee, Kan Yuan, XiaoFeng Wang, ... -- NDSS 2015

"ObliVM: A Programming Framework for Secure Computation"

Yan Huang, ... -- Oakland 2015

"Leave Me Alone: App-level Protection Against Runtime Information Gathering on Android"

Nan Zhang, Kan Yuan, Xiaoyong Zhou, XiaoFeng Wang, ... -- Oakland 2015

"Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS X and iOS"

Luyi Xing, Xiaolong Bai, XiaoFeng Wang, Kai Chen, ... -- CCS 2015

"Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References"

Nan Zhang, Kai Chen, XiaoFeng Wang, ... -- CCS 2015

"Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy and the New Way Forward"

Xiaorui Pan, XiaoFeng Wang, Yan Huang, ... -- CCS 2015

"Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging Integrations"

Yangyi Chen, XiaoFeng Wang, Kai Chen, ... -- CCS 2015

"Efficient Genome-Wide, Privacy-Preserving Similar Patient Query based on Private Edit Distance"

Yan Huang, Yongan Zhao, Haixu Tang, XiaoFeng Wang, Diyue Bu, ... -- CCS 2015

"Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale"

Kai Chen, Peng Wang, Yeonjoon Lee, XiaoFeng Wang, Nan Zhang, ... -- Usenix 2015

"UIPicker: User-Input Privacy Identification in Mobile Applications"

XiaoFeng Wang, ... -- Usenix 2015

"Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS"

Xueqiang Wang, Peng Wang, Yeonjoon Lee, XiaoFeng Wang, ... -- Oakland 2016

"On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud"

Adam Shull, Steven Myers, ... -- Oakland 2016

"Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search"

Kan Yuan, XiaoFeng Wang, Eihal Alowaisheq, Sumayah Alrwais, Luyi Xing, ... -- Oakland 2016

"Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf"

Luyi Xing, Nan Zhang, XiaoFeng Wang, ... -- Oakland 2016

"Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence"

Kan Yuan, XiaoFeng Wang, Luyi Xing, ... -- CCS 2016

"Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service"

Sumayah Alrwais, Kan Yuan, Luyi Xing, XiaoFeng Wang, ... -- CCS 2016

"The Cut-and-Choose Game and its Application to Cryptographic Protocols"

Ruiyu Zhu, Yan Huang, ... -- Usenix 2016

"Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps"

Xiaorui Pan, Xueqiang Wang, XiaoFeng Wang, ... -- NDSS 2017

"Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks"

Sumayah Alrwais, Xianghang Mi, Peng Wang, XiaoFeng Wang, Feng Qian, ... -- Oakland 2017

"Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX"

Wenhao Wang, Xiaorui Pan, XiaoFeng Wang, Haixu Tang, ... -- CCS 2017

"Mass Discovery of Android Traffic Imprints through Instantiated Partial Execution"

Wei You, Peter Yeonjoon Lee, XiaoFeng Wang, ... -- CCS 2017

"Pool: Scalable On-Demand Secure Computation Service Against Malicious Adversaries"

Ruiyu Zhu, Yan Huang, ... -- CCS 2017

"Querying for Queries: Indexes of Queries for Efficient and Expressive IT-PIR"

Syed Mahbub Hafiz, Ryan Henry, ... -- CCS 2017

"SemFuzz: Semantics-based Automatic Exploit Generation"

Wei You, XiaoFeng Wang, ... -- CCS 2017

"Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews"

Xueqiang Wang, XiaoFeng Wang, Luyi Xing, Nan Zhang, ... -- CCS 2017

"SmartAuth: User-Centered Authorization for the Internet of Things"

Nan Zhang, XiaoFeng Wang, ... -- Usenix 2017

"Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment"

XiaoFeng Wang, Xianghang Mi, Nan Zhang, ... -- Usenix 2017

"IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing."

XiaoFeng Wang, ... -- NDSS 2018

"Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation."

Xiaorui Pan, Xueqiang Wang, XiaoFeng Wang, ... -- NDSS 2018

"Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps."

XiaoFeng Wang, ... -- NDSS 2018

"OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS."

Xueqiang Wang, XiaoFeng Wang, ... -- NDSS 2018

"Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations."

Peng Wang, Xianghang Mi, XiaoFeng Wang, Kan Yuan, Feng Qian, ... -- NDSS 2018

"Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races"

Wenhao Wang, Tianyu Chen, XiaoFeng Wang, ... -- Oakland 2018

"Detecting User Experience Issues of the Tor Browser In The Wild"

Sameer Patil, ... -- CCS 2018

"nanoPI: Extreme-Scale Actively-Secure Multi-Party Computation"

Ruiyu Zhu, Amr Sabry, Yan Huang, ... -- CCS 2018

"CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition"

XiaoFeng Wang, ... -- Usenix 2018

"Reading Thieves' Cant: Automatically Identifying and Understanding Dark Jargons from Cybercrime Marketplaces"

Kan Yuan, Haoran Lu, Xiaojing Liao, XiaoFeng Wang, ... -- Usenix 2018

"An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications"

XiaoFeng Wang, ... -- Usenix 2018

"MBeacon: Privacy-Preserving Beacons for DNA Methylation Data"

Haixu Tang, XiaoFeng Wang, ... -- NDSS 2019

"Cracking Wall of Confinement: Understanding and Analyzing Malicious Domain Takedowns"

Eihal Alowaisheq, Peng Wang, Xiaojin Leo, Xaiofeng Wang, Tasneem Alowaisheq, XiangHang Mi, Siyuan Tang, ... -- NDSS 2019

"Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems"

Nan Zhang, Xianghang Mi, Xuan Feng, XiaoFeng Wang, Feng Qian, ... -- Oakland 2019

"Demystifying Hidden Privacy Settings in Mobile Apps"

Yi Chen, Nan Zhang, Kan Yuan, XiaoFeng Wang, ... -- Oakland 2019

"ProFuzzer: On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery"

Xueqiang Wang, XiaoFeng Wang, ... -- Oakland 2019

"Resident Evil: Understanding Residential IP Proxy as a Dark Service"

Xianghang Mi, Xuan Feng, Xiaojing Liao, XiaoFeng Wang, Feng Qian, ... -- Oakland 2019

"Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion"

Kan Yuan, Xiaojing Liao, XiaoFeng Wang, Xuan Feng, Yi Chen, Haoran Lu, ... -- Oakland 2019

"Efficient Publicly Verifiable 2PC over a Blockchain with Applications to Financially-Secure Computations"

Ruiyu Zhu, Changchang Ding, Yan Huang, ... -- CCS 2019

"Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation Analysis"

Luyi Xing, Yue Qin, Xiaojing Liao, XiaoFeng Wang, ... -- Usenix 2019

"Understanding iOS-based Crowdturfing Through Hidden UI Analysis"

Yeonjoon Lee, Xueqiang Wang, Kwangwuk Lee, Xiaojing Liao, XiaoFeng Wang, Xianghang Mi, ... -- Usenix 2019

"Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis"

Xiaojing Liao, XiaoFeng Wang, ... -- Usenix 2019

"Looking from the Mirror: Evaluating IoT Device Security through Mobile Companion Apps"

Xueqiang Wang, XiaoFeng Wang, ... -- Usenix 2019

"Into the Deep Web: Understanding E-commerce Fraud from Autonomous Chat with Cybercriminals"

Peng Wang, Xiaojing Liao, Yue Qin, XiaoFeng Wang, ... -- NDSS 2020

"Automatically Detecting Bystanders in Photos to Reduce Privacy Risks"

Rakibul Hasan, David Crandall, Apu Kapadia, ... -- Oakland 2020

"Burglars' IoT Paradise: Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds"

Luyi Xing, Dongfang Zhao, XiaoFeng Wang, ... -- Oakland 2020

"Enabling Rack-scale Confidential Computing using Heterogeneous Trusted Execution Environment"

XiaoFeng Wang, ... -- Oakland 2020

"Influencing Photo Sharing Decisions on Social Media: A Case of Paradoxical Findings"

Rakibul Hasan, Kurt Hugenberg, Bennett Bertenthal, Apu Kapadia, ... -- Oakland 2020

"Demystifying Resource Management Risks in Emerging Mobile App-in-App Ecosystems"

Haoran Lu, Luyi Xing, Yifan Zhang, Yue Xiao, Xiaojing Liao, XiaoFeng Wang, Xueqiang Wang, ... -- CCS 2020

"Zombie Awakening: Stealthy Hijacking of Active Domains Through DNS Hosting Referral"

Eihal Alowaisheq, Siyuan Tang, Xiaojing Liao, XiaoFeng Wang, ... -- CCS 2020

"iDEA: Towards Static Analysis on the Security of Apple Kernel Drivers"

Luyi Xing, ... -- CCS 2020

"RTFM! Automatic Assumption Discovery and Verification Derivation from Library Document for API Misuse Detection"

Xiaojing Liao, XiaoFeng Wang, Luyi Xing, ... -- CCS 2020

"Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation"

Luyi Xing, Dongfang Zhao, XiaoFeng Wang, ... -- Usenix 2020

""I am uncomfortable sharing what I can't see": Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications"

Taslima Akter, Tousif Ahmed, Apu Kapadia, ... -- Usenix 2020

"Devil’s Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices"

XiaoFeng Wang, ... -- Usenix 2020

"As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service"

XiaoFeng Wang, ... -- NDSS 2021

"Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks"

Siyuan Tang, Zhengyi Li, Xiaojing Liao, XiaoFeng Wang, ... -- NDSS 2021

"Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis"

Yi Chen, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, ... -- Oakland 2021

"Who's In Control? On Security Risks of Disjointed IoT Device Management Channels"

Luyi Xing, Dongfang Zhao, XiaoFeng Wang, Yifan Zhang, Peyton Crnjak, ... -- CCS 2021

"Learning Security Classifiers with Verified Global Robustness Properties"

Yue Qin, Xiaojing Liao, ... -- CCS 2021

"Effect of Mood, Location, Trust, and Presence of Others on Video-Based Social Authentication"

Apu Kapadia, ... -- Usenix 2021

"Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications"

Liya Su, Xinyue Shen, Xiangyu Du, Xiaojing Liao, XiaoFeng Wang, Luyi Xing, ... -- Usenix 2021

"Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection"

XiaoFeng Wang, Haixu Tang, ... -- Usenix 2021

"Understanding Malicious Cross-library Data Harvesting on Android"

Jice Wang, Yue Xiao, Xueqiang Wang, Luyi Xing, Xiaojing Liao, Nicolas Serrano, Haoran Lu, XiaoFeng Wang, ... -- Usenix 2021

"Demystifying Local Business Search Poisoning for Illicit Drug Promotion"

Peng Wang, Zilong Lin, Xiaojing Liao, XiaoFeng Wang, ... -- NDSS 2022

"Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems"

Mingming Zha, XiaoFeng Wang, ... -- NDSS 2022

"Analyzing Ground-Truth Data of Mobile Gambling Scam"

Xiaojing Liao, ... -- Oakland 2022

"Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms"

Weijie Liu, Hongbo Chen, XiaoFeng Wang, Xiaojing Liao, Luyi Xing, Mingming Zha, ... -- Oakland 2022

"Sabre: Sender-Anonymous Messaging with Fast Audits"

Adithya Vadapalli, ... -- Oakland 2022

"Clues in Tweets: Twitter-Guided Discovery and Analysis of SMS Spam"

Siyuan Tang, XiaoFeng Wang, ... -- CCS 2022

"Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models"

Di Tang, XiaoFeng Wang, ... -- CCS 2022

"P-Verifier: Understanding and Mitigating Security Risks in Cloud-based IoT Access Policies"

Ze Jin, Luyi Xing, Yiwei Fang, ... -- CCS 2022

"Perils and Mitigation of Security Risks of Cooperation in Mobile-as-a-Gateway IoT"

Jiale Guan, Luyi Xing, ... -- CCS 2022

"When Evil Calls: Targeted Adversarial Voice over IP Network"

Mingming Zha, XiaoFeng Wang, ... -- CCS 2022

"Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change Requests"

Yi Chen, Di Tang, Mingming Zha, XiaoFeng Wang, Haixu Tang, Dongfang Zhao, ... -- Usenix 2022

"OS-Aware Vulnerability Prioritization via Differential Severity Analysis"

Yue Xiao, Xiaojing Liao, ... -- Usenix 2022

"How Are Your Zombie Accounts? Understanding Users' Practices and Expectations on Mobile App Account Deletion"

Luyi Xing, ... -- Usenix 2022