Kehuan Zhang
Titolo
Citata da
Citata da
Anno
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones.
R Schlegel, K Zhang, X Zhou, M Intwala, A Kapadia, XF Wang
Proceedings of the 18th Annual Network & Distributed System Security …, 2011
4992011
Side-channel leaks in web applications: A reality today, a challenge tomorrow
S Chen, R Wang, XF Wang, K Zhang
2010 IEEE Symposium on Security and Privacy, 191-206, 2010
4162010
Sedic: privacy-aware data intensive computing on hybrid clouds
K Zhang, X Zhou, Y Chen, XF Wang, Y Ruan
Proceedings of the 18th ACM conference on Computer and communications …, 2011
2412011
Knowing your enemy: understanding and detecting malicious web advertising
Z Li, K Zhang, Y Xie, F Yu, XF Wang
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
2182012
When good becomes evil: Keystroke inference with smartwatch
X Liu, Z Zhou, W Diao, Z Li, K Zhang
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1352015
Your voice assistant is mine: how to abuse speakers to steal information and control your phone
W Diao, X Liu, Z Zhou, K Zhang
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014
1082014
IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.
J Chen, W Diao, Q Zhao, C Zuo, Z Lin, XF Wang, WC Lau, M Sun, R Yang, ...
NDSS, 2018
982018
Peeping tom in the neighborhood: keystroke eavesdropping on multi-user systems
K Zhang, XF Wang
Proceedings of the 18th conference on USENIX security symposium, Pages 17-32, 2009
972009
Acoustic fingerprinting revisited: Generate stable device id stealthily with inaudible sound
Z Zhou, W Diao, X Liu, K Zhang
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
772014
Sidebuster: automated detection and quantification of side-channel leaks in web application development
K Zhang, Z Li, R Wang, XF Wang, S Chen
Proceedings of the 17th ACM conference on Computer and communications …, 2010
652010
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
402017
No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis
W Diao, X Liu, Z Li, K Zhang
Proceeding of the 37th IEEE Symposium on Security and Privacy (Oakland'16), 2016
372016
On Code Execution Tracking via Power Side-Channel
Y Liu, L Wei, Z Zhou, K Zhang, W Xu, Q Xu
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
362016
Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild
S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu, K Chen, X Wang, K Zhang
International Conference on Security and Privacy in Communication Systems …, 2018
342018
Mash-IF: Practical information-flow control within client-side mashups
Z Li, K Zhang, XF Wang
2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010
252010
Model-based Security Testing: An Empirical Study on OAuth 2.0 Implementations
R Yang, G Li, WC Lau, K Zhang, P Hu
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
242016
Towards automatic reverse engineering of software security configurations
R Wang, XF Wang, K Zhang, Z Li
Proceedings of the 15th ACM conference on Computer and communications …, 2008
222008
The Ever-changing Labyrinth: A Large-scale Analysis of Wildcard DNS Powered Blackhat SEO
K Du, H Yang, Z Li, H Duan, K Zhang
Proceedings of the 25th USENIX Security Symposium (USENIX Security 16), 2016
212016
Dalvik Opcode Graph Based Android Malware Variants Detection Using Global Topology Features
J Zhang, Z Qin, K Zhang, H Yin, J Zou
IEEE Access 6, 51964-51974, 2018
202018
PriWe: recommendation for privacy settings of mobile apps based on crowdsourced users' expectations
R Liu, J Cao, L Yang, K Zhang
2015 IEEE International Conference on Mobile Services, 150-157, 2015
192015
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20