"Fragile Mixing"
XiaoFeng Wang, ... -- CCS 2004
"Mitigating Bandwidth-Exhaustion Attacks using Congestion Puzzles"
XiaoFeng Wang, ... -- CCS 2004
"Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks"
XiaoFeng Wang, Markus Jakobsson, Alex Tsow, ... -- Oakland 2006
"Cache Cookies for Browser Authentication (Extended Abstract)"
Markus Jakobsson, Tom N. Jagatic, ... -- Oakland 2006
"Packet Vaccine: Black-box Exploit Detection and Signature Generation"
XiaoFeng Wang, Zhuowei Li, Jong Youl Choi, ... -- CCS 2006
"Combating Click Fraud via Premium Clicks"
Sid Stamm, Markus Jakobsson, ... -- Usenix 2007
"PRECIP: Towards Practical and Retrofittable Confidential Information Protection"
XiaoFeng Wang, Zhuowei Li, Jong Youl Choi, ... -- NDSS 2008
"Towards Automatic Reverse Engineering of Software Security Configuration"
Rui Wang, XiaoFeng Wang, Kehuan Zhang, ... -- CCS 2008
"Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software"
XiaoFeng Wang, Rui Wang, ... -- Usenix 2008
"Privacy-preserving genomic computation through program specialization"
Rui Wang, XiaoFeng Wang, Zhou Li, Haixu Tang, Zheng Dong, ... -- CCS 2009
"Learning your identity and disease from research papers: information leaks in genome wide association study"
Rui Wang, Yong Fuga Li, XiaoFeng Wang, Haixu Tang, Xiaoyong Zhou, ... -- CCS 2009
"Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems"
XiaoFeng Wang, Kehuan Zhang, ... -- Usenix 2009
"Effective and Efficient Malware Detection at the End Host"
XiaoFeng Wang, Xiao Zhou, ... -- Usenix 2009
"Side-Channel Leaks in Web Applications: a Reality Today, a Challenge Tomorrow"
Rui Wang, XiaoFeng Wang, Kehuan Zhang, ... -- Oakland 2010
"Mobile location tracking in metro areas: malnets and others"
Nathaniel Husted, Steven Myers, ... -- CCS 2010
"Sidebuster: automated detection and quantification of side-channel leaks in web application development"
Kehuan Zhang, Zhou Li, Rui Wang, XiaoFeng Wang, ... -- CCS 2010
"How to Shop for Free Online - Security Analysis of Cashier-as-a-Service Based Web Stores"
Rui Wang, XiaoFeng Wang, ... -- Oakland 2011
"Sedic: Privacy-Aware Data Intensive Computing on Hybrid Cloud"
Kehuan Zhang, Xiaoyong Zhou, Yangyi Chen, XiaoFeng Wang, ... -- CCS 2011
"Large-Scale Privacy-Preserving Mapping of Human Genomic Sequences on Hybrid Clouds"
Yangyi Chen, Bo Peng, XiaoFeng Wang, Haixu Tang, ... -- NDSS 2012
"BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation"
Apu Kapadia, ... -- NDSS 2012
"Signing Me onto Your Accounts through Facebook and Google: a Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services"
Rui Wang, XiaoFeng Wang, ... -- Oakland 2012
"Knowing Your Enemy: Understanding and Detecting Malicious Web Advertising"
Zhou Li, Kehuan Zhang, XiaoFeng Wang, ... -- CCS 2012
"PERM: Practical Reputation-Based Blacklisting without TTPs"
Apu Kapadia, ... -- CCS 2012
"PlaceRaider: Virtual Theft in Physical Spaces with Smartphones"
Zahid Rahman, David Crandall, Apu Kapadia, ... -- NDSS 2013
"InteGuard: Toward Automatic Protection of Third-Party Web Service Integrations"
Luyi Xing, Yangyi Chen, XiaoFeng Wang, ... -- NDSS 2013
"Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures"
Zhou Li, Sumayah Alrwais, XiaoFeng Wang, ... -- Oakland 2013
"Identity, Location, Disease and More: Inferring Your Secrets from Android Public Resources"
Xiaoyong Zhou, Xiaorui Pan, XiaoFeng Wang, ... -- CCS 2013
"Unauthorized Origin Crossing on Mobile Platforms: Threats and Mitigation"
Luyi Xing, XiaoFeng Wang, ... -- CCS 2013
"Screenmilker: How to Milk Your Android Screen for Secrets"
Xiaoyong Zhou, XiaoFeng Wang, ... -- NDSS 2014
"Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android"
Xiaoyong Zhou, XiaoFeng Wang, ... -- NDSS 2014
"The Tangled Web of Password Reuse"
XiaoFeng Wang, ... -- NDSS 2014
"PlaceAvoider: Steering First-Person Cameras away from Sensitive Spaces"
Robert Templeman, Mohammed Korayem, David Crandall, Apu Kapadia, ... -- NDSS 2014
"Hunting the Red Fox Online: Understanding and Detection of Mass Redirect-Script Injections"
Sumayah Alrwais, XiaoFeng Wang, Eihal Alowaisheq, ... -- Oakland 2014
"Upgrading Your Android, Elevating My Malware: Privilege Escalation Through Mobile OS Updating"
Luyi Xing, Xiaorui Pan, Kan Yuan, XiaoFeng Wang, ... -- Oakland 2014
"The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations"
Xiaoyong Zhou, Yeonjoon Lee, Nan Zhang, XiaoFeng Wang, ... -- Oakland 2014
"Controlled Functional Encryption"
XiaoFeng Wang, ... -- CCS 2014
"Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services"
Xiaoyong Zhou, Luyi Xing, Yeonjoon Lee, XiaoFeng Wang, ... -- CCS 2014
"Oblivious Data Structures"
Yan Huang, ... -- CCS 2014
"Community-Enhanced De-anonymization of Online Social Networks"
Shirin Nilizadeh, Apu Kapadia, Yong-Yeol Ahn, ... -- CCS 2014
"SCORAM: Oblivious RAM for Secure Computation"
Yan Huang, ... -- CCS 2014
"Understanding the Dark Side of Domain Parking"
Sumayah Alrwais, Kan Yuan, Eihal Alowaisheq, Zhou Li, XiaoFeng Wang, ... -- Usenix 2014
"What's in Your Dongle and Bank Account's Mandatory and Discretionary Protection of Android External Resources"
Xiaoyong Zhou, Yeonjoon Lee, Kan Yuan, XiaoFeng Wang, ... -- NDSS 2015
"ObliVM: A Programming Framework for Secure Computation"
Yan Huang, ... -- Oakland 2015
"Leave Me Alone: App-level Protection Against Runtime Information Gathering on Android"
Nan Zhang, Kan Yuan, Xiaoyong Zhou, XiaoFeng Wang, ... -- Oakland 2015
"Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS X and iOS"
Luyi Xing, Xiaolong Bai, XiaoFeng Wang, Kai Chen, ... -- CCS 2015
"Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References"
Nan Zhang, Kai Chen, XiaoFeng Wang, ... -- CCS 2015
"Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy and the New Way Forward"
Xiaorui Pan, XiaoFeng Wang, Yan Huang, ... -- CCS 2015
"Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging Integrations"
Yangyi Chen, XiaoFeng Wang, Kai Chen, ... -- CCS 2015
"Efficient Genome-Wide, Privacy-Preserving Similar Patient Query based on Private Edit Distance"
Yan Huang, Yongan Zhao, Haixu Tang, XiaoFeng Wang, Diyue Bu, ... -- CCS 2015
"Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale"
Kai Chen, Peng Wang, Yeonjoon Lee, XiaoFeng Wang, Nan Zhang, ... -- Usenix 2015
"UIPicker: User-Input Privacy Identification in Mobile Applications"
XiaoFeng Wang, ... -- Usenix 2015
"Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS"
Xueqiang Wang, Peng Wang, Yeonjoon Lee, XiaoFeng Wang, ... -- Oakland 2016
"On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud"
Adam Shull, Steven Myers, ... -- Oakland 2016
"Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search"
Kan Yuan, XiaoFeng Wang, Eihal Alowaisheq, Sumayah Alrwais, Luyi Xing, ... -- Oakland 2016
"Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf"
Luyi Xing, Nan Zhang, XiaoFeng Wang, ... -- Oakland 2016
"Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence"
Kan Yuan, XiaoFeng Wang, Luyi Xing, ... -- CCS 2016
"Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service"
Sumayah Alrwais, Kan Yuan, Luyi Xing, XiaoFeng Wang, ... -- CCS 2016
"The Cut-and-Choose Game and its Application to Cryptographic Protocols"
Ruiyu Zhu, Yan Huang, ... -- Usenix 2016
"Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps"
Xiaorui Pan, Xueqiang Wang, XiaoFeng Wang, ... -- NDSS 2017
"Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks"
Sumayah Alrwais, Xianghang Mi, Peng Wang, XiaoFeng Wang, Feng Qian, ... -- Oakland 2017
"Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX"
Wenhao Wang, Xiaorui Pan, XiaoFeng Wang, Haixu Tang, ... -- CCS 2017
"Mass Discovery of Android Traffic Imprints through Instantiated Partial Execution"
Wei You, Peter Yeonjoon Lee, XiaoFeng Wang, ... -- CCS 2017
"Pool: Scalable On-Demand Secure Computation Service Against Malicious Adversaries"
Ruiyu Zhu, Yan Huang, ... -- CCS 2017
"Querying for Queries: Indexes of Queries for Efficient and Expressive IT-PIR"
Syed Mahbub Hafiz, Ryan Henry, ... -- CCS 2017
"SemFuzz: Semantics-based Automatic Exploit Generation"
Wei You, XiaoFeng Wang, ... -- CCS 2017
"Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews"
Xueqiang Wang, XiaoFeng Wang, Luyi Xing, Nan Zhang, ... -- CCS 2017
"SmartAuth: User-Centered Authorization for the Internet of Things"
Nan Zhang, XiaoFeng Wang, ... -- Usenix 2017
"Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment"
XiaoFeng Wang, Xianghang Mi, Nan Zhang, ... -- Usenix 2017
"IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing."
XiaoFeng Wang, ... -- NDSS 2018
"Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation."
Xiaorui Pan, Xueqiang Wang, XiaoFeng Wang, ... -- NDSS 2018
"Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps."
XiaoFeng Wang, ... -- NDSS 2018
"OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS."
Xueqiang Wang, XiaoFeng Wang, ... -- NDSS 2018
"Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations."
Peng Wang, Xianghang Mi, XiaoFeng Wang, Kan Yuan, Feng Qian, ... -- NDSS 2018
"Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races"
Wenhao Wang, Tianyu Chen, XiaoFeng Wang, ... -- Oakland 2018
"Detecting User Experience Issues of the Tor Browser In The Wild"
Sameer Patil, ... -- CCS 2018
"nanoPI: Extreme-Scale Actively-Secure Multi-Party Computation"
Ruiyu Zhu, Amr Sabry, Yan Huang, ... -- CCS 2018
"CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition"
XiaoFeng Wang, ... -- Usenix 2018
"Reading Thieves' Cant: Automatically Identifying and Understanding Dark Jargons from Cybercrime Marketplaces"
Kan Yuan, Haoran Lu, Xiaojing Liao, XiaoFeng Wang, ... -- Usenix 2018
"An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications"
XiaoFeng Wang, ... -- Usenix 2018
"MBeacon: Privacy-Preserving Beacons for DNA Methylation Data"
Haixu Tang, XiaoFeng Wang, ... -- NDSS 2019
"Cracking Wall of Confinement: Understanding and Analyzing Malicious Domain Takedowns"
Eihal Alowaisheq, Peng Wang, Xiaojin Leo, Xaiofeng Wang, Tasneem Alowaisheq, XiangHang Mi, Siyuan Tang, ... -- NDSS 2019
"Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems"
Nan Zhang, Xianghang Mi, Xuan Feng, XiaoFeng Wang, Feng Qian, ... -- Oakland 2019
"Demystifying Hidden Privacy Settings in Mobile Apps"
Yi Chen, Nan Zhang, Kan Yuan, XiaoFeng Wang, ... -- Oakland 2019
"ProFuzzer: On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery"
Xueqiang Wang, XiaoFeng Wang, ... -- Oakland 2019
"Resident Evil: Understanding Residential IP Proxy as a Dark Service"
Xianghang Mi, Xuan Feng, Xiaojing Liao, XiaoFeng Wang, Feng Qian, ... -- Oakland 2019
"Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion"
Kan Yuan, Xiaojing Liao, XiaoFeng Wang, Xuan Feng, Yi Chen, Haoran Lu, ... -- Oakland 2019
"Efficient Publicly Verifiable 2PC over a Blockchain with Applications to Financially-Secure Computations"
Ruiyu Zhu, Changchang Ding, Yan Huang, ... -- CCS 2019
"Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation Analysis"
Luyi Xing, Yue Qin, Xiaojing Liao, XiaoFeng Wang, ... -- Usenix 2019
"Understanding iOS-based Crowdturfing Through Hidden UI Analysis"
Yeonjoon Lee, Xueqiang Wang, Kwangwuk Lee, Xiaojing Liao, XiaoFeng Wang, Xianghang Mi, ... -- Usenix 2019
"Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis"
Xiaojing Liao, XiaoFeng Wang, ... -- Usenix 2019
"Looking from the Mirror: Evaluating IoT Device Security through Mobile Companion Apps"
Xueqiang Wang, XiaoFeng Wang, ... -- Usenix 2019
"Into the Deep Web: Understanding E-commerce Fraud from Autonomous Chat with Cybercriminals"
Peng Wang, Xiaojing Liao, Yue Qin, XiaoFeng Wang, ... -- NDSS 2020
"Automatically Detecting Bystanders in Photos to Reduce Privacy Risks"
Rakibul Hasan, David Crandall, Apu Kapadia, ... -- Oakland 2020
"Burglars' IoT Paradise: Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds"
Luyi Xing, Dongfang Zhao, XiaoFeng Wang, ... -- Oakland 2020
"Enabling Rack-scale Confidential Computing using Heterogeneous Trusted Execution Environment"
XiaoFeng Wang, ... -- Oakland 2020
"Influencing Photo Sharing Decisions on Social Media: A Case of Paradoxical Findings"
Rakibul Hasan, Kurt Hugenberg, Bennett Bertenthal, Apu Kapadia, ... -- Oakland 2020
"Demystifying Resource Management Risks in Emerging Mobile App-in-App Ecosystems"
Haoran Lu, Luyi Xing, Yifan Zhang, Yue Xiao, Xiaojing Liao, XiaoFeng Wang, Xueqiang Wang, ... -- CCS 2020
"Zombie Awakening: Stealthy Hijacking of Active Domains Through DNS Hosting Referral"
Eihal Alowaisheq, Siyuan Tang, Xiaojing Liao, XiaoFeng Wang, ... -- CCS 2020
"iDEA: Towards Static Analysis on the Security of Apple Kernel Drivers"
Luyi Xing, ... -- CCS 2020
"RTFM! Automatic Assumption Discovery and Verification Derivation from Library Document for API Misuse Detection"
Xiaojing Liao, XiaoFeng Wang, Luyi Xing, ... -- CCS 2020
"Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation"
Luyi Xing, Dongfang Zhao, XiaoFeng Wang, ... -- Usenix 2020
""I am uncomfortable sharing what I can't see": Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications"
Taslima Akter, Tousif Ahmed, Apu Kapadia, ... -- Usenix 2020
"Devil’s Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices"
XiaoFeng Wang, ... -- Usenix 2020
"As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service"
XiaoFeng Wang, ... -- NDSS 2021
"Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks"
Siyuan Tang, Zhengyi Li, Xiaojing Liao, XiaoFeng Wang, ... -- NDSS 2021
"Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis"
Yi Chen, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, ... -- Oakland 2021
"Who's In Control? On Security Risks of Disjointed IoT Device Management Channels"
Luyi Xing, Dongfang Zhao, XiaoFeng Wang, Yifan Zhang, Peyton Crnjak, ... -- CCS 2021
"Learning Security Classifiers with Verified Global Robustness Properties"
Yue Qin, Xiaojing Liao, ... -- CCS 2021
"Effect of Mood, Location, Trust, and Presence of Others on Video-Based Social Authentication"
Apu Kapadia, ... -- Usenix 2021
"Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications"
Liya Su, Xinyue Shen, Xiangyu Du, Xiaojing Liao, XiaoFeng Wang, Luyi Xing, ... -- Usenix 2021
"Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection"
XiaoFeng Wang, Haixu Tang, ... -- Usenix 2021
"Understanding Malicious Cross-library Data Harvesting on Android"
Jice Wang, Yue Xiao, Xueqiang Wang, Luyi Xing, Xiaojing Liao, Nicolas Serrano, Haoran Lu, XiaoFeng Wang, ... -- Usenix 2021
"Demystifying Local Business Search Poisoning for Illicit Drug Promotion"
Peng Wang, Zilong Lin, Xiaojing Liao, XiaoFeng Wang, ... -- NDSS 2022
"Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems"
Mingming Zha, XiaoFeng Wang, ... -- NDSS 2022
"Analyzing Ground-Truth Data of Mobile Gambling Scam"
Xiaojing Liao, ... -- Oakland 2022
"Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms"
Weijie Liu, Hongbo Chen, XiaoFeng Wang, Xiaojing Liao, Luyi Xing, Mingming Zha, ... -- Oakland 2022
"Sabre: Sender-Anonymous Messaging with Fast Audits"
Adithya Vadapalli, ... -- Oakland 2022
"Clues in Tweets: Twitter-Guided Discovery and Analysis of SMS Spam"
Siyuan Tang, XiaoFeng Wang, ... -- CCS 2022
"Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models"
Di Tang, XiaoFeng Wang, ... -- CCS 2022
"P-Verifier: Understanding and Mitigating Security Risks in Cloud-based IoT Access Policies"
Ze Jin, Luyi Xing, Yiwei Fang, ... -- CCS 2022
"Perils and Mitigation of Security Risks of Cooperation in Mobile-as-a-Gateway IoT"
Jiale Guan, Luyi Xing, ... -- CCS 2022
"When Evil Calls: Targeted Adversarial Voice over IP Network"
Mingming Zha, XiaoFeng Wang, ... -- CCS 2022
"Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change Requests"
Yi Chen, Di Tang, Mingming Zha, XiaoFeng Wang, Haixu Tang, Dongfang Zhao, ... -- Usenix 2022
"OS-Aware Vulnerability Prioritization via Differential Severity Analysis"
Yue Xiao, Xiaojing Liao, ... -- Usenix 2022
"How Are Your Zombie Accounts? Understanding Users' Practices and Expectations on Mobile App Account Deletion"
Luyi Xing, ... -- Usenix 2022