From collision to exploitation: Unleashing use-after-free vulnerabilities in linux kernel W Xu, J Li, J Shu, W Yang, T Xie, Y Zhang, D Gu Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 110 | 2015 |
Binary code clone detection across architectures and compiling configurations Y Hu, Y Zhang, J Li, D Gu Proceedings of the 25th International Conference on Program Comprehension, 88-98, 2017 | 102 | 2017 |
Appspear: Bytecode decrypting and dex reassembling for packed android malware W Yang, Y Zhang, J Li, J Shu, B Li, W Hu, D Gu International Workshop on Recent Advances in Intrusion Detection, 359-381, 2015 | 99 | 2015 |
Vulnerability assessment of oauth implementations in android applications H Wang, Y Zhang, J Li, H Liu, W Yang, B Li, D Gu Proceedings of the 31st Annual Computer Security Applications Conference, 61-70, 2015 | 67 | 2015 |
icryptotracer: Dynamic analysis on misuse of cryptography functions in ios applications Y Li, Y Zhang, J Li, D Gu International Conference on Network and System Security, 349-362, 2014 | 62 | 2014 |
Cross-Architecture Binary Semantics Understanding via Similar Code Comparison Y Hu, Y Zhang, J Li, D Gu Software Analysis, Evolution, and Reengineering (SANER), 2016 IEEE 23rd …, 2016 | 53 | 2016 |
Show Me the Money! Finding Flawed Implementations of Third-party In-app Payment in Android Apps W Yang, Y Zhang, J Li, H Liu, Q Wang, Y Zhang, D Gu | 52 | 2017 |
Smart solution, poor protection: An empirical study of security and privacy issues in developing and deploying smart home devices H Liu, C Li, X Jin, J Li, Y Zhang, D Gu Proceedings of the 2017 Workshop on Internet of Things Security and Privacy …, 2017 | 41 | 2017 |
APKLancet: tumor payload diagnosis and purification for android applications W Yang, J Li, Y Zhang, Y Li, J Shu, D Gu Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 41 | 2014 |
The Achilles heel of OAuth: a multi-platform study of OAuth-based authentication H Wang, Y Zhang, J Li, D Gu Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016 | 37 | 2016 |
SGOR: Secure and scalable geographic opportunistic routing with received signal strength in WSNs C Lyu, D Gu, X Zhang, S Sun, Y Zhang, A Pande Computer Communications 59, 37-51, 2015 | 36 | 2015 |
Towards efficient, secure, and fine-grained access control system in msns with flexible revocations SF Sun, C Lyu, D Gu, Y Zhang, Y Ren International Journal of Distributed Sensor Networks, 2015 | 33* | 2015 |
AppSpear: Automating the hidden-code extraction and reassembling of packed android malware B Li, Y Zhang, J Li, W Yang, D Gu Journal of Systems and Software 140, 3-16, 2018 | 26 | 2018 |
Why data deletion fails? A study on deletion flaws and data remanence in Android systems J Shu, Y Zhang, J Li, B Li, D Gu ACM Transactions on Embedded Computing Systems (TECS) 16 (2), 61, 2017 | 25 | 2017 |
Android app protection via interpretation obfuscation J Shu, J Li, Y Zhang, D Gu Dependable, Autonomic and Secure Computing (DASC), 2014 IEEE 12th …, 2014 | 23 | 2014 |
Embroidery: Patching Vulnerable Binary Code of Fragmentized Android Devices X Zhang, Y Zhang, J Li, Y Hu, H Li, D Gu Software Maintenance and Evolution (ICSME), 2017 IEEE International …, 2017 | 20 | 2017 |
Passwords in the Air: Harvesting Wi-Fi Credentials from SmartCfg Provisioning C Li, Q Cai, J Li, H Liu, Y Zhang, D Gu, Y Yu | 19 | 2018 |
Security analysis of vendor customized code in firmware of embedded device M Liu, Y Zhang, J Li, J Shu, D Gu International Conference on Security and Privacy in Communication Systems …, 2016 | 16 | 2016 |
Oh-Pwn-VPN! Security Analysis of OpenVPN-based Android Apps⋆ Q Zhang, J Li, Y Zhang, H Wang, D Gu the 16th International Conference on Cryptology And Network Security (CANS 2017), 2017 | 14 | 2017 |
Selective Forwarding Attacks against Data and ACK Flows in Network Coding and Countermeasures Y Zhang, M Minier Journal of Computer Networks and Communications 2012, 2012 | 13 | 2012 |