Author of the publication

How Are Your Zombie Accounts? Understanding Users' Practices and Expectations on Mobile App Account Deletion.

, , , , and . USENIX Security Symposium, page 863-880. USENIX Association, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications., , , , , , and . USENIX Security Symposium, page 1307-1324. USENIX Association, (2021)How Are Your Zombie Accounts? Understanding Users' Practices and Expectations on Mobile App Account Deletion., , , , and . USENIX Security Symposium, page 863-880. USENIX Association, (2022)Cloud repository as a malicious service: challenge, identification and implication., , , , , , and . Cybersecur., 1 (1): 14 (2018)WitheredLeaf: Finding Entity-Inconsistency Bugs with LLMs., , , , , , , , , and . CoRR, (2024)Leaking the Privacy of Groups and More: Understanding Privacy Risks of Cross-App Content Sharing in Mobile Ecosystem., , , , , , and . NDSS, The Internet Society, (2024)P-Verifier: Understanding and Mitigating Security Risks in Cloud-based IoT Access Policies., , , , , and . CCS, page 1647-1661. ACM, (2022)Perils and Mitigation of Security Risks of Cooperation in Mobile-as-a-Gateway IoT., , , and . CCS, page 3285-3299. ACM, (2022)Understanding Malicious Cross-library Data Harvesting on Android., , , , , , , , , and 1 other author(s). USENIX Security Symposium, page 4133-4150. USENIX Association, (2021)Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation., , , , , , , and . USENIX Security Symposium, page 1183-1200. USENIX Association, (2020)Union under Duress: Understanding Hazards of Duplicate Resource Mismediation in Android Software Supply Chain., , , , and . USENIX Security Symposium, page 3403-3420. USENIX Association, (2023)