Chinese Academy of Sciences

General Info

Rank: #26 Worldwide
#2 outside of US and Europe
Papers: 92
Number of Researchers: 171
APA
(average papers per authors):
0.5
Country: CHINA

Activity Map

Contributors

  • Kai Chen (21 papers)
  • Wei Zou (11 papers)
  • Jiwu Jing (7 papers)
  • Zhenfeng Zhang (7 papers)
  • Purui Su (6 papers)
  • Xuan Feng (5 papers)
  • Yuqing Zhang (5 papers)
  • Xiaorui Gong (5 papers)
  • Yuewu Wang (4 papers)
  • Yi Chen (4 papers)
  • Limin Sun (4 papers)
  • Zhe Wang (4 papers)
  • Chenggang Wu (4 papers)
  • Yue Zhao (4 papers)
  • Jingqiang Lin (3 papers)
  • Yuchen Wang (3 papers)
  • Yuan Lu (3 papers)
  • Jing Xu (3 papers)
  • Dengguo Feng (3 papers)
  • Wenhao Wang (3 papers)
  • Dan Meng (3 papers)
  • Mengyao Xie (3 papers)
  • Yuanming Lai (3 papers)
  • Baoxu Liu (3 papers)
  • Wei Huo (3 papers)
  • Le Guan (2 papers)
  • Yanhao Wang (2 papers)
  • Bingyong Guo (2 papers)
  • Mingming Zha (2 papers)
  • Dandan Xu (2 papers)
  • Yan Jia (2 papers)
  • Yuhang Mao (2 papers)
  • Yepeng Yao (2 papers)
  • Yu Wen (2 papers)
  • Jianhua Zhou (2 papers)
  • Peiyuan Zong (2 papers)
  • Lingguang Lei (2 papers)
  • Yan Wang (2 papers)
  • Xiaobo Xiang (2 papers)
  • Zixuan Zhao (2 papers)
  • Hong Zhu (2 papers)
  • Ruigang Liang (2 papers)
  • Tao Lv (2 papers)
  • Yi Yang (2 papers)
  • Yanjun Wu (2 papers)
  • Feng Li (2 papers)
  • Yan Kang (2 papers)
  • Lian Li (2 papers)
  • Zizhuang Deng (2 papers)
  • Guozhu Meng (2 papers)
  • Xuejing Yuan (2 papers)
  • Wei Wu (2 papers)
  • Hongsong Zhu (2 papers)
  • Wei Zhou (2 papers)
  • Yang Xiao (2 papers)
  • Xueqiang Wang (1 papers)
  • Yuwei Liu (1 papers)
  • Kehai Liu (1 papers)
  • Wenqiang Li (1 papers)
  • Jianting Ning (1 papers)
  • jing xu (1 papers)
  • Jing Wang (1 papers)
  • Bin Ma (1 papers)
  • Aohui Wang (1 papers)
  • Yingjun Zhang (1 papers)
  • Honggang Hu (1 papers)
  • Dongdai Lin (1 papers)
  • Qianqian Zhao (1 papers)
  • Shangru Zhao (1 papers)
  • Jianping Zhu (1 papers)
  • Rui Hou (1 papers)
  • Jianfeng Cao (1 papers)
  • Boyan Zhao (1 papers)
  • Zhongpu Wang (1 papers)
  • Yuhui Zhang (1 papers)
  • Jiameng Ying (1 papers)
  • Lixin Zhang (1 papers)
  • Xiaofeng Zhang (1 papers)
  • Yang Kang (1 papers)
  • Chang Yue (1 papers)
  • Wei Song (1 papers)
  • Boya Li (1 papers)
  • Zihan Xue (1 papers)
  • Zhenzhen Li (1 papers)
  • Guangke Chen (1 papers)
  • Zhiqiang Xu (1 papers)
  • Jiawei Yin (1 papers)
  • Menghao Li (1 papers)
  • Dandan Sun (1 papers)
  • Zhongwen Zhang (1 papers)
  • He Sun (1 papers)
  • Kai Wang (1 papers)
  • Kang Yang (1 papers)
  • Shijie Jia (1 papers)
  • Luning Xia (1 papers)
  • Bingchang Liu (1 papers)
  • Wenjie Li (1 papers)
  • Bingyu Li (1 papers)
  • Qiongxiao Wang (1 papers)
  • Congli Wang (1 papers)
  • Fucheng Liu (1 papers)
  • Dongxue Zhang (1 papers)
  • Xihe Jiang (1 papers)
  • Shijun Zhao (1 papers)
  • Qin Yu (1 papers)
  • Wei Feng (1 papers)
  • Qintao Shen (1 papers)
  • Zhihao Wang (1 papers)
  • Jie Wang (1 papers)
  • Ruishi Li (1 papers)
  • Peiwei Hu (1 papers)
  • Xiaoyu He (1 papers)
  • Lei Yu (1 papers)
  • Jiali Xu (1 papers)
  • Wei Wang (1 papers)
  • Ying Li (1 papers)
  • Jie Lu (1 papers)
  • Haofeng Li (1 papers)
  • Chen Liu (1 papers)
  • Ze Jin (1 papers)
  • Yiwei Fang (1 papers)
  • Qixu Liu (1 papers)
  • Xiaodong Zhang (1 papers)
  • Xiangkun Jia (1 papers)
  • Huafeng Huang (1 papers)
  • Xiaokang Liu (1 papers)
  • Siwei Sun (1 papers)
  • Ying Dong (1 papers)
  • Kai Yang (1 papers)
  • Yaowen Zheng (1 papers)
  • Yao Yao (1 papers)
  • Lipeng Zhu (1 papers)
  • Bowen Tang (1 papers)
  • Lingjing Yu (1 papers)
  • Zhaoyu Zhou (1 papers)
  • Qingyun Liu (1 papers)
  • Chendong Yu (1 papers)
  • Zimu Yuan (1 papers)
  • Binghong Liu (1 papers)
  • Dawei Wang (1 papers)
  • Zhixiu Guo (1 papers)
  • Zijin Lin (1 papers)
  • Pan Li (1 papers)
  • Yuxuan Chen (1 papers)
  • Jiangshan Zhang (1 papers)
  • Xiangyu Du (1 papers)
  • Bolun Zhang (1 papers)
  • Yingzhe He (1 papers)
  • Xingbo Hu (1 papers)
  • Jinwen He (1 papers)
  • Tianyu Cui (1 papers)
  • Gaopeng Gou (1 papers)
  • Gang Xiong (1 papers)
  • Zhen Li (1 papers)
  • Mingxin Cui (1 papers)
  • Chang Liu (1 papers)
  • Jian Liu (1 papers)
  • Lin Yi (1 papers)
  • Jingzheng Wu (1 papers)
  • Liang He (1 papers)
  • Yan Cai (1 papers)
  • Fangming Gu (1 papers)
  • Qingli Guo (1 papers)
  • Zhiniang Peng (1 papers)
  • Wei Lin (1 papers)
  • Xiaobo Yang (1 papers)
  • Long Chen (1 papers)
  • Yeting Li (1 papers)
  • Yecheng Sun (1 papers)
  • Rongchen Li (1 papers)
  • Haiming Chen (1 papers)

Papers

"Copker: Computing with Private Keys without RAM"

Le Guan, Jingqiang Lin, Jiwu Jing, ... -- NDSS 2014

"DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices"

Xueqiang Wang, Yuewu Wang, Jiwu Jing, ... -- NDSS 2015

"Protecting Private Keys against Memory Disclosure Attacks using Hardware Transactional Memory"

Le Guan, Jingqiang Lin, Jiwu Jing, Jing Wang, ... -- Oakland 2015

"From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an Application"

Kai Chen, ... -- CCS 2015

"Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS X and iOS"

Kai Chen, ... -- CCS 2015

"Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References"

Zhongwen Zhang, Kai Chen, ... -- CCS 2015

"TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens"

He Sun, Yuewu Wang, Jiwu Jing, ... -- CCS 2015

"Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale"

Kai Chen, Wei Zou, ... -- Usenix 2015

"Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS"

Kai Chen, Yi Chen, Bin Ma, Aohui Wang, Yingjun Zhang, Wei Zou, ... -- Oakland 2016

"Multiple Handshakes Security of TLS 1.3 Candidates"

Jing Xu, Zhenfeng Zhang, Dengguo Feng, Honggang Hu, ... -- Oakland 2016

"Call Me Back! Attacks on System Server and System Apps in Android through Synchronous Callback"

Kai Wang, Yuqing Zhang, ... -- CCS 2016

"Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication"

Zhenfeng Zhang, Kang Yang, Yuchen Wang, ... -- CCS 2016

"DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation Layer"

Shijie Jia, Luning Xia, ... -- CCS 2017

"Mass Discovery of Android Traffic Imprints through Instantiated Partial Execution"

Yi Chen, Kai Chen, Wei Zou, ... -- CCS 2017

"SemFuzz: Semantics-based Automatic Exploit Generation"

Peiyuan Zong, Kai Chen, ... -- CCS 2017

"Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews"

Mingming Zha, Kai Chen, ... -- CCS 2017

"Vulnerable Implicit Service: A Revisit"

Lingguang Lei, Jiwu Jing, Yuewu Wang, ... -- CCS 2017

"Towards Efficient Heap Overflow Discovery"

Xiangkun Jia, Purui Su, Yi Yang, Huafeng Huang, Dengguo Feng, ... -- Usenix 2017

"Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races"

Wenhao Wang, Dongdai Lin, ... -- Oakland 2018

"LEMNA: Explaining Deep Learning based Security Applications"

Purui Su, ... -- CCS 2018

"Revery: from Proof-of-Concept to Exploitable. One Step towards Automatic Exploit Generation"

Yan Wang, Xiaobo Xiang, Zixuan Zhao, Bingchang Liu, Wenjie Li, Xiaorui Gong, Wei Zou, ... -- CCS 2018

"CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition"

Xuejing Yuan, Yue Zhao, Xiaokang Liu, Kai Chen, ... -- Usenix 2018

"Acquisitional Rule-based Engine for Discovering Internet-of-Things Devices"

Xuan Feng, Limin Sun, ... -- Usenix 2018

"FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities"

Wei Wu, Xiaorui Gong, Wei Zou, ... -- Usenix 2018

"One Engine To Serve'em All: Inferring Taint Rules Without Architectural Semantics"

Yanhao Wang, Purui Su, ... -- NDSS 2019

"Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems"

Xuan Feng, ... -- Oakland 2019

"Demystifying Hidden Privacy Settings in Mobile Apps"

Mingming Zha, Dandan Xu, Qianqian Zhao, Xuan Feng, Kai Chen, Wei Zou, ... -- Oakland 2019

"Resident Evil: Understanding Residential IP Proxy as a Dark Service"

Limin Sun, ... -- Oakland 2019

"Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion"

Xuan Feng, Yi Chen, ... -- Oakland 2019

"Certificate Transparency in the Wild: Exploring the Reliability of Monitors"

Bingyu Li, Jingqiang Lin, Qiongxiao Wang, Jiwu Jing, Congli Wang, ... -- CCS 2019

"Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise"

Fucheng Liu, Yu Wen, Dongxue Zhang, Xihe Jiang, Dan Meng, ... -- CCS 2019

"SecTEE: A Software-based Approach to Secure Enclave Architecture Using TEE"

Shijun Zhao, Qin Yu, Wei Feng, Dengguo Feng, ... -- CCS 2019

"Seeing isn't Believing: Towards More Robust Adversarial Attack Against Real World Object Detectors"

Yue Zhao, Hong Zhu, Ruigang Liang, Qintao Shen, Kai Chen, ... -- CCS 2019

"Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation Analysis"

Yi Chen, Kai Chen, Wei Zou, ... -- Usenix 2019

"StrongChain: Transparent and Collaborative Proof-of-Work Consensus"

Siwei Sun, ... -- Usenix 2019

"Towards the Detection of Inconsistencies in Public Security Vulnerability Reports"

Ying Dong, Yuqing Zhang, ... -- Usenix 2019

"Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis"

Xuan Feng, Kai Yang, Hongsong Zhu, Limin Sun, ... -- Usenix 2019

"FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation"

Yaowen Zheng, Hongsong Zhu, Limin Sun, ... -- Usenix 2019

"Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms"

Wei Zhou, Yan Jia, Yao Yao, Lipeng Zhu, Yuhang Mao, Yuqing Zhang, ... -- Usenix 2019

"KEPLER: Facilitating Control-flow Hijacking Primitive Evaluation for Linux Kernel Vulnerabilities"

Wei Wu, Wei Zou, ... -- Usenix 2019

"SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization"

Zhe Wang, Chenggang Wu, Bowen Tang, Mengyao Xie, Yuanming Lai, Yan Kang, ... -- Usenix 2019

"Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization"

Yanhao Wang, Yuwei Liu, Purui Su, ... -- NDSS 2020

"Strong Authentication without Temper-Resistant Hardware and Application to Federated Identities"

Zhenfeng Zhang, Yuchen Wang, ... -- NDSS 2020

"SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves"

Kehai Liu, ... -- NDSS 2020

"Burglars' IoT Paradise: Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds"

Yan Jia, Yuhang Mao, Shangru Zhao, Yuqing Zhang, ... -- Oakland 2020

"Enabling Rack-scale Confidential Computing using Heterogeneous Trusted Execution Environment"

Jianping Zhu, Rui Hou, Wenhao Wang, Jianfeng Cao, Boyan Zhao, Zhongpu Wang, Yuhui Zhang, Jiameng Ying, Lixin Zhang, Dan Meng, ... -- Oakland 2020

"SEIMI: Efficient and Secure SMAP-Enabled Intra-process Memory Isolation"

Zhe Wang, Chenggang Wu, Mengyao Xie, Xiaofeng Zhang, Yuanming Lai, Yang Kang, ... -- Oakland 2020

"Dumbo: Faster Asynchronous BFT Protocols"

Bingyong Guo, Jing Xu, Zhenfeng Zhang, ... -- CCS 2020

"Zombie Awakening: Stealthy Hijacking of Active Domains Through DNS Hosting Referral"

Zhihao Wang, ... -- CCS 2020

"Cache-in-the-Middle (CITM) Attacks : Manipulating Sensitive Data in Isolated Execution Environments"

Jie Wang, Lingguang Lei, Yuewu Wang, Jiwu Jing, ... -- CCS 2020

"RTFM! Automatic Assumption Discovery and Verification Derivation from Library Document for API Misuse Detection"

Tao Lv, Ruishi Li, Yi Yang, Kai Chen, Peiwei Hu, ... -- CCS 2020

"You Are What You Broadcast: Identification of Mobile and IoT Devices from (Public) WiFi"

Lingjing Yu, Zhaoyu Zhou, Qingyun Liu, ... -- Usenix 2020

"MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures"

Yang Xiao, Chendong Yu, Zimu Yuan, Feng Li, Binghong Liu, Wei Huo, Wei Zou, ... -- Usenix 2020

"Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation"

Yuqing Zhang, ... -- Usenix 2020

"FuzzGuard: Filtering out Unreachable Inputs in Directed Grey-box Fuzzing through Deep Learning"

Peiyuan Zong, Tao Lv, Dawei Wang, Zizhuang Deng, Ruigang Liang, Kai Chen, ... -- Usenix 2020

"SkillExplorer: Understanding the Behavior of Skills in Large Scale"

Zhixiu Guo, Zijin Lin, Pan Li, Kai Chen, ... -- Usenix 2020

"Devil’s Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices"

Yuxuan Chen, Xuejing Yuan, Jiangshan Zhang, Yue Zhao, Kai Chen, ... -- Usenix 2020

"From Library Portability to Para-rehosting: Natively Executing Open-source Microcontroller OSs on Commodity Hardware"

Wenqiang Li, ... -- NDSS 2021

"Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis"

Yepeng Yao, Dandan Xu, Chang Yue, Kai Chen, Baoxu Liu, ... -- Oakland 2021

"Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It"

Wei Song, Boya Li, Zihan Xue, Zhenzhen Li, Wenhao Wang, ... -- Oakland 2021

"Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems"

Guangke Chen, ... -- Oakland 2021

"CPscan: Detecting Bugs Caused by Code Pruning in IoT Kernels"

Yanjun Wu, ... -- CCS 2021

"Ghost in the Binder: Binder Transaction Redirection Attacks in Android System Services"

Xiaobo Xiang, Xiaorui Gong, Baoxu Liu, ... -- CCS 2021

"V-SHUTTLE: Scalable and Semantics-Aware Hypervisor Fuzzing"

Yanjun Wu, ... -- CCS 2021

"AI-Lancet: Locating Error-inducing Neurons to Optimize Neural Networks"

Yue Zhao, Hong Zhu, Kai Chen, ... -- CCS 2021

"SoFi: Reflection-Augmented Fuzzing for JavaScript Engines"

Xiaoyu He, Feng Li, Wei Zou, Lei Yu, Jianhua Zhou, Wei Huo, ... -- CCS 2021

"Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications"

Xiangyu Du, Baoxu Liu, ... -- Usenix 2021

"MAZE: Towards Automated Heap Feng Shui"

Yan Wang, Zixuan Zhao, Bolun Zhang, Xiaorui Gong, Wei Zou, ... -- Usenix 2021

"DRMI: A Dataset Reduction Technology based on Mutual Information for Black-box Attacks"

Yingzhe He, Guozhu Meng, Kai Chen, Xingbo Hu, Jinwen He, ... -- Usenix 2021

"Automatic Firmware Emulation through Invalidity-guided Knowledge Inference"

Wei Zhou, ... -- Usenix 2021

"Privacy-Preserving and Standard-Compatible AKA Protocol for 5G"

Yuchen Wang, Zhenfeng Zhang, ... -- Usenix 2021

"SiamHAN: IPv6 Address Correlation Attacks on TLS Encrypted Traffic via Siamese Heterogeneous Graph Attention Network"

Tianyu Cui, Gaopeng Gou, Gang Xiong, Zhen Li, Mingxin Cui, Chang Liu, ... -- Usenix 2021

"Hybrid Trust Multi-party Computation with Trusted Execution Environment"

Jianting Ning, ... -- NDSS 2022

"COOPER: Testing the Binding Code of Scripting Languages with Cooperative Mutation"

Purui Su, ... -- NDSS 2022

"Speeding Dumbo: Pushing Asynchronous BFT to Practice"

Bingyong Guo, Yuan Lu, jing xu, Zhenfeng Zhang, ... -- NDSS 2022

"DEPCOMM: Graph Summarization on System Audit Logs for Attack Investigation"

Zhiqiang Xu, Yu Wen, Dan Meng, ... -- Oakland 2022

"Finding SMM Privilege-Escalation Vulnerabilities in UEFI Firmware with Protocol-Centric Static Analysis"

Jiawei Yin, Wei Huo, Menghao Li, Dandan Sun, Jianhua Zhou, ... -- Oakland 2022

"Bolt-Dumbo Transformer: Asynchronous Consensus As Fast As the Pipelined BFT"

Yuan Lu, ... -- CCS 2022

"CETIS: Retrofitting Intel CET for Generic and Efficient Intra-process Memory Isolation"

Mengyao Xie, Chenggang Wu, Jiali Xu, Yuanming Lai, Yan Kang, Wei Wang, Zhe Wang, ... -- CCS 2022

"Clues in Tweets: Twitter-Guided Discovery and Analysis of SMS Spam"

Ying Li, Kai Chen, ... -- CCS 2022

"Detecting Missing-Permission-Check Vulnerabilities in Distributed Cloud Systems"

Jie Lu, Haofeng Li, Chen Liu, Lian Li, ... -- CCS 2022

"Dumbo-NG: Fast Asynchronous BFT Consensus with Throughput-Oblivious Latency"

Yuan Lu, Jing Xu, Zhenfeng Zhang, ... -- CCS 2022

"P-Verifier: Understanding and Mitigating Security Risks in Cloud-based IoT Access Policies"

Ze Jin, Yiwei Fang, Qixu Liu, ... -- CCS 2022

"Understanding Real-world Threats to Deep Learning Models in Android Apps"

Zizhuang Deng, Kai Chen, Guozhu Meng, Xiaodong Zhang, ... -- CCS 2022

"LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic Execution"

Jian Liu, Lin Yi, ... -- Usenix 2022

"Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths"

Zhe Wang, Chenggang Wu, ... -- Usenix 2022

"Label Inference Attacks Against Vertical Federated Learning"

Jingzheng Wu, ... -- Usenix 2022

"FreeWill: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting Detection on Binaries"

Liang He, Purui Su, Yan Cai, ... -- Usenix 2022

"Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change Requests"

Yepeng Yao, ... -- Usenix 2022

"COMRace: Detecting Data Race Vulnerabilities in COM Objects"

Fangming Gu, Qingli Guo, Lian Li, Zhiniang Peng, Wei Lin, Xiaobo Yang, Xiaorui Gong, ... -- Usenix 2022

"End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage"

Long Chen, ... -- Usenix 2022

"RegexScalpel: Regular Expression Denial of Service (ReDoS) Defense by Localize-and-Fix"

Yeting Li, Yecheng Sun, Rongchen Li, Haiming Chen, Yang Xiao, ... -- Usenix 2022