Appintent: Analyzing sensitive data transmission in android for privacy leakage detection Z Yang, M Yang, Y Zhang, G Gu, P Ning, XS Wang Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 501 | 2013 |
Vetting undesirable behaviors in android apps with permission use analysis Y Zhang, M Yang, B Xu, Z Yang, G Gu, P Ning, XS Wang, B Zang Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 415 | 2013 |
How you get shot in the back: A systematical study about cryptojacking in the real world G Hong, Z Yang, S Yang, L Zhang, Y Nan, Z Zhang, M Yang, Y Zhang, ... Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 93 | 2018 |
Enhancing state-of-the-art classifiers with api semantics to detect evolved android malware X Zhang, Y Zhang, M Zhong, D Ding, Y Cao, Y Zhang, M Zhang, M Yang Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020 | 64 | 2020 |
Detecting third-party libraries in android applications with high precision and recall Y Zhang, J Dai, X Zhang, S Huang, Z Yang, M Yang, H Chen 2018 IEEE 25th International Conference on Software Analysis, Evolution and …, 2018 | 49 | 2018 |
Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps Y Nan, Z Yang, X Wang, Y Zhang, D Zhu, M Yang NDSS, 2018 | 43 | 2018 |
Permission use analysis for vetting undesirable behaviors in android apps Y Zhang, M Yang, Z Yang, G Gu, P Ning, B Zang IEEE transactions on information forensics and security 9 (11), 1828-1842, 2014 | 37 | 2014 |
Invetter: Locating insecure input validations in android services L Zhang, Z Yang, Y He, Z Zhang, Z Qian, G Hong, Y Zhang, M Yang Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 20 | 2018 |
An ever-evolving game: Evaluation of real-world attacks and defenses in ethereum ecosystem S Zhou, M Möser, Z Yang, B Adida, T Holz, J Xiang, S Goldfeder, Y Cao, ... 29th USENIX Security Symposium (USENIX Security 20), 2793-2810, 2020 | 19 | 2020 |
Identifying user-input privacy in mobile applications at a large scale Y Nan, Z Yang, M Yang, S Zhou, Y Zhang, G Gu, X Wang, L Sun IEEE Transactions on Information Forensics and Security 12 (3), 647-661, 2016 | 17 | 2016 |
Rethinking permission enforcement mechanism on mobile systems Y Zhang, M Yang, G Gu, H Chen IEEE Transactions on Information Forensics and Security 11 (10), 2227-2240, 2016 | 17 | 2016 |
Hybrid malware detection approach with feedback-directed machine learning Y Zhang, Z Wang Information Sciences 63 (139103), 1-139103, 2020 | 15 | 2020 |
App in the middle: Demystify application virtualization in Android and its security threats L Zhang, Z Yang, Y He, M Li, S Yang, M Yang, Y Zhang, Z Qian Proceedings of the ACM on Measurement and Analysis of Computing Systems 3 (1 …, 2019 | 15 | 2019 |
Finedroid: Enforcing permissions with system-wide application execution context Y Zhang, M Yang, G Gu, H Chen International Conference on Security and Privacy in Communication Systems, 3-22, 2015 | 14 | 2015 |
Pdiff: Semantic-based patch presence testing for downstream kernels Z Jiang, Y Zhang, J Xu, Q Wen, Z Wang, X Zhang, X Xing, M Yang, Z Yang Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 12 | 2020 |
Appcracker: Widespread vulnerabilities in user and session authentication in mobile apps F Cai, H Chen, Y Wu, Y Zhang MoST 2015, 2015 | 12 | 2015 |
Swift: a register-based JIT compiler for embedded JVMs Y Zhang, M Yang, B Zhou, Z Yang, W Zhang, B Zang Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution …, 2012 | 12 | 2012 |
An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications. X Zhang, Y Zhang, Q Mo, H Xia, Z Yang, M Yang, X Wang, L Long, ... In Proceedings of the 27th USENIX Security Symposium, Security’18, Baltimore …, 2018 | 9 | 2018 |
How android developers handle evolution-induced api compatibility issues: A large-scale study H Xia, Y Zhang, Y Zhou, X Chen, Y Wang, X Zhang, S Cui, G Hong, ... 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE …, 2020 | 7 | 2020 |
{BScout}: Direct Whole Patch Presence Test for Java Executables J Dai, Y Zhang, Z Jiang, Y Zhou, J Chen, X Xing, X Zhang, X Tan, M Yang, ... 29th USENIX Security Symposium (USENIX Security 20), 1147-1164, 2020 | 7 | 2020 |