Seguir
Tongxin Li
Tongxin Li
Dirección de correo verificada de pku.edu.cn
Título
Citado por
Citado por
Año
Things You May Not Know About Android (Un) Packers: A Systematic Study based on Whole-System Emulation
Y Duan, M Zhang, AV Bhaskar, H Yin, X Pan, T Li, X Wang, XF Wang
The Network and Distributed System Security Symposium 2018 (NDSS'18), 2018
1012018
VTrust: Regaining Trust on Virtual Calls.
C Zhang, SA Carr, T Li, Y Ding, C Song, M Payer, D Song
The Network and Distributed System Security Symposium 2016 (NDSS'16), 2016
1012016
Mayhem in the push clouds: Understanding and mitigating security hazards in mobile push-messaging services
T Li, X Zhou, L Xing, Y Lee, M Naveed, XF Wang, X Han
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
582014
Unleashing the walking dead: Understanding cross-app remote infections on mobile webviews
T Li, X Wang, M Zha, K Chen, XF Wang, L Xing, X Bai, N Zhang, X Han
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
532017
Detecting telecommunication fraud by understanding the contents of a call
Q Zhao, K Chen, T Li, Y Yang, XF Wang
Cybersecurity 1, 1-12, 2018
482018
Staying secure and unprepared: Understanding and mitigating the security risks of apple zeroconf
X Bai, L Xing, N Zhang, XF Wang, X Liao, T Li, SM Hu
2016 IEEE Symposium on Security and Privacy (SP), 655-674, 2016
462016
Cracking app isolation on apple: Unauthorized cross-app resource access on MAC os~ x and ios
L Xing, X Bai, T Li, XF Wang, K Chen, X Liao, SM Hu, X Han
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
452015
Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment
X Bai, Z Zhou, XF Wang, Z Li, X Mi, N Zhang, T Li, SM Hu, K Zhang
26th USENIX Security Symposium (USENIX Security 17), 593-608, 2017
362017
Unauthorized cross-app resource access on mac os x and ios
L Xing, X Bai, T Li, XF Wang, K Chen, X Liao, SM Hu, X Han
arXiv preprint arXiv:1505.06836, 2015
202015
Understanding {iOS-based} Crowdturfing Through Hidden {UI} Analysis
Y Lee, X Wang, K Lee, X Liao, XF Wang, T Li, X Mi
28th USENIX Security Symposium (USENIX Security 19), 765-781, 2019
142019
Building and maintaining a third-party library supply chain for productive and secure SGX enclave development
P Wang, Y Ding, M Sun, H Wang, T Li, R Zhou, Z Chen, Y Jing
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
122020
Ghost installer in the shadow: Security analysis of app installation on android
Y Lee, T Li, N Zhang, S Demetriou, M Zha, XF Wang, K Chen, X Zhou, ...
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
102017
Perplexed messengers from the cloud: Automated security analysis of push-messaging integrations
Y Chen, T Li, XF Wang, K Chen, X Han
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
102015
Apple ZeroConf holes: How hackers can steal iPhone photos
X Bai, L Xing, N Zhang, XF Wang, X Liao, T Li, SM Hu
IEEE Security & Privacy 15 (2), 42-49, 2017
82017
Towards memory safe python enclave for security sensitive computation
H Wang, M Sun, Q Feng, P Wang, T Li, Y Ding
arXiv preprint arXiv:2005.05996, 2020
52020
POSTER: AdHoneyDroid--Capture Malicious Android Advertisements
D Wang, S Dai, Y Ding, T Li, X Han
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
52014
Filtering for malice through the data ocean: Large-scale PHA install detection at the communication service provider level
K Chen, T Li, B Ma, P Wang, XF Wang, P Zong
Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017
42017
Minergate: A novel generic and accurate defense solution against web based cryptocurrency mining attacks
G Yu, G Yang, T Li, X Han, S Guan, J Zhang, G Gu
Cyber Security: 17th China Annual Conference, CNCERT 2020, Beijing, China …, 2020
32020
Poster: gbdt-rs: Fast and trustworthy gradient boosting decision tree
T Li, T Li, Y Ding, Y Zhang, T Wei, X Han
Posters In 2019 IEEE Symposium on Security and Privacy (SP), 2019
32019
POSTER: PT-DBG: Bypass Anti-debugging with Intel Processor Tracing
G Li, Y Chen, T Li, T Li, X Wu, C Zhang, X Han
Proceedings of the 39th IEEE Symposium on Security and Privacy, San …, 2018
22018
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20