Segueix
Xueqiang Wang
Títol
Citada per
Citada per
Any
Privacy loss in Apple's implementation of differential privacy on MacOS 10.12
J Tang, A Korolova, X Bai, X Wang, X Wang
arXiv preprint arXiv:1709.02753, 2017
3162017
Following devil's footprints: Cross-platform analysis of potentially harmful libraries on android and ios
K Chen, X Wang, Y Chen, P Wang, Y Lee, XF Wang, B Ma, A Wang, ...
2016 IEEE Symposium on Security and Privacy (SP), 357-376, 2016
1342016
ProFuzzer: On-the-fly Input Type Probing for Better Zero-Day Vulnerability Discovery
W You, X Wang, S Ma, J Huang, X Zhang, XF Wang, B Liang
IEEE Symposium on Security and Privacy 2019, 0, 2019
1322019
DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices.
X Wang, K Sun, Y Wang, J Jing
Ndss, 2015
1222015
Things You May Not Know About Android (Un) Packers: A Systematic Study based on Whole-System Emulation.
Y Duan, M Zhang, AV Bhaskar, H Yin, X Pan, T Li, X Wang, XF Wang
NDSS, 2018
992018
Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps.
X Pan, X Wang, Y Duan, XF Wang, H Yin
NDSS 17, 10.14722, 2017
80*2017
Looking from the Mirror: Evaluating IoT Device Security through Mobile Companion Apps
X Wang, Y Sun, S Nanda, XF Wang
28th {USENIX} Security Symposium ({USENIX} Security 19), 1151-1167, 2019
662019
Unleashing the walking dead: Understanding cross-app remote infections on mobile webviews
T Li, X Wang, M Zha, K Chen, XF Wang, L Xing, X Bai, N Zhang, X Han
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
522017
Demystifying Resource Management Risks in Emerging Mobile App-in-App Ecosystems
H Lu, L Xing, Y Xiao, Y Zhang, X Liao, XF Wang, X Wang
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
382020
Os-level side channels without procfs: Exploring cross-app information leakage on ios
X Zhang, X Wang, X Bai, Y Zhang, XF Wang
Proceedings of the Symposium on Network and Distributed System Security, 2018
352018
Understanding malicious cross-library data harvesting on android
J Wang, Y Xiao, X Wang, Y Nan, L Xing, X Liao, JW Dong, N Serrano, ...
30th USENIX Security Symposium (USENIX Security 21), 4133-4150, 2021
242021
Understanding iOS-based Crowdturfing Through Hidden {UI} Analysis
X Wang, Y Lee, K Lee, X Liao, XF Wang, T Li, X Mi
28th {USENIX} Security Symposium ({USENIX} Security 19), 765-781, 2019
142019
Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps
Y Nan, X Wang, L Xing, X Liao, R Wu, J Wu, Y Zhang, XF Wang
32nd USENIX Security Symposium (USENIX Security 23), 2023
82023
Understanding Illicit UI in iOS apps Through Hidden UI Analysis
X Wang, Y Lee, X Liao, XF Wang
IEEE Transactions on Dependable and Secure Computing, 2019
52019
WrapDroid: Flexible and fine-grained scheme towards regulating behaviors of Android apps
X Wang, Y Wang, L Liu, L Lei, J Jing
International Conference on Information Security and Cryptology, 255-268, 2015
32015
Credit Karma: Understanding Security Implications of Exposed Cloud Services through Automated Capability Inference
X Wang, Y Sun, S Nanda, XF Wang
32nd USENIX Security Symposium (USENIX Security 23), 2023
12023
DARPA: Combating Asymmetric Dark UI Patterns on Android with Run-time View Decorator
Z Cai, Y Nan, X Wang, M Long, Q Ou, M Yang, Z Zheng
2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2023
2023
Union under Duress: Understanding Hazards of Duplicate Resource Mismediation in Android Software Supply Chain
X Wang, Y Zhang, XF Wang, Y Jia, L Xing
32nd USENIX Security Symposium (USENIX Security 23), 3403-3420, 2023
2023
Determining security vulnerabilities of Internet of Things devices
PE Yuqiong Sun, Xueqiang Wang, Susanta K. Nanda
2019
Systems and methods for fingerprinting devices
PE Yuqiong Sun, Xueqiang Wang, Susanta Nanda, Yun Shen, Pierre-Antoine Vervier
2018
En aquests moments el sistema no pot dur a terme l'operació. Torneu-ho a provar més tard.
Articles 1–20