Follow
Yuhong Nan
Yuhong Nan
Verified email at mail.sysu.edu.cn - Homepage
Title
Cited by
Cited by
Year
UIPicker: User-Input Privacy Identification in Mobile Applications
Y Nan, M Yang, Z Yang, S Zhou, G Gu, XF Wang
24th USENIX Security Symposium (USENIX Security 15), 993--1008, 2015
1232015
How you get shot in the back: A systematical study about cryptojacking in the real world
G Hong, Z Yang, S Yang, L Zhang, Y Nan, Z Zhang, M Yang, Y Zhang, ...
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
922018
Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps.
Y Nan, Z Yang, X Wang, Y Zhang, D Zhu, M Yang
NDSS, 2018
382018
BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy
J Wu, Y Nan, V Kumar, DJ Tian, A Bianchi, M Payer, D Xu
14th USENIX Workshop on Offensive Technologies ({WOOT} 20), 2020
242020
Identifying user-input privacy in mobile applications at a large scale
Y Nan, Z Yang, M Yang, S Zhou, Y Zhang, G Gu, X Wang, L Sun
IEEE Transactions on Information Forensics and Security 12 (3), 647-661, 2016
172016
ATLAS: A Sequence-based Learning Approach for Attack Investigation
A Alsaheel, Y Nan, S Ma, L Yu, G Walkup, ZB Celik, X Zhang, D Xu
30th USENIX Security Symposium (USENIX Security 21), 2021
142021
{BlueShield}: Detecting Spoofing Attacks in Bluetooth Low Energy Networks
J Wu, Y Nan, V Kumar, M Payer, D Xu
23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020
82020
On the insecurity of SMS one-time password messages against local attackers in modern mobile devices
Z Lei, Y Nan, Y Fratantonio, A Bianchi
Proceedings of the 2021 Network and Distributed System Security (NDSS) Symposium, 2021
62021
Understanding malicious cross-library data harvesting on android
J Wang, Y Xiao, X Wang, Y Nan, L Xing, X Liao, JW Dong, N Serrano, ...
30th USENIX Security Symposium (USENIX Security 21), 4133-4150, 2021
32021
PROFACTORY: Improving IoT Security via Formalized Protocol Customization
F Wang, J Wu, Y Nan, Y Aafer, X Zhang, D Xu, M Payer
Proc. of USENIX Security’22, 2022
12022
SIMulation: Demystifying (Insecure) Cellular Network based One-Tap Authentication Services
Z Zhou, Y Nan, X Han, J Li, Z Chen, D Gu
The system can't perform the operation now. Try again later.
Articles 1–11