Author of the publication

Understanding Malicious Cross-library Data Harvesting on Android.

, , , , , , , , , , and . USENIX Security Symposium, page 4133-4150. USENIX Association, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Burglars' IoT Paradise: Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds., , , , , , and . SP, page 465-481. IEEE, (2020)RTFM! Automatic Assumption Discovery and Verification Derivation from Library Document for API Misuse Detection., , , , , , , and . CCS, page 1837-1852. ACM, (2020)InteGuard: Toward Automatic Protection of Third-Party Web Service Integrations., , , and . NDSS, The Internet Society, (2013)The Danger of Minimum Exposures: Understanding Cross-App Information Leaks on iOS through Multi-Side-Channel Learning., , , , , and . CCS, page 281-295. ACM, (2023)Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search., , , , , , , , , and 2 other author(s). IEEE Symposium on Security and Privacy, page 707-723. IEEE Computer Society, (2016)Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service., , , , , , and . CCS, page 1541-1552. ACM, (2016)Towards Privacy-Preserving Social-Media SDKs on Android., , , and . USENIX Security Symposium, USENIX Association, (2024)MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementations., , , , , , and . SP, page 2385-2403. IEEE, (2024)Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications., , , , , , and . USENIX Security Symposium, page 1307-1324. USENIX Association, (2021)How Are Your Zombie Accounts? Understanding Users' Practices and Expectations on Mobile App Account Deletion., , , , and . USENIX Security Symposium, page 863-880. USENIX Association, (2022)