Seguir
Yuhong Nan
Yuhong Nan
E-mail confirmado em mail.sysu.edu.cn - Página inicial
Título
Citado por
Citado por
Ano
UIPicker: User-Input Privacy Identification in Mobile Applications
Y Nan, M Yang, Z Yang, S Zhou, G Gu, XF Wang
24th USENIX Security Symposium (USENIX Security 15), 993--1008, 2015
1682015
How you get shot in the back: A systematical study about cryptojacking in the real world
G Hong, Z Yang, S Yang, L Zhang, Y Nan, Z Zhang, M Yang, Y Zhang, ...
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1442018
ATLAS: A Sequence-based Learning Approach for Attack Investigation
A Alsaheel, Y Nan, S Ma, L Yu, G Walkup, ZB Celik, X Zhang, D Xu
30th USENIX Security Symposium (USENIX Security 21), 2021
1182021
Finding clues for your secrets: semantics-driven, learning-based privacy discovery in mobile apps.
Y Nan, Z Yang, X Wang, Y Zhang, D Zhu, M Yang
NDSS, 2018
652018
BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy
J Wu, Y Nan, V Kumar, DJ Tian, A Bianchi, M Payer, D Xu
Proceedings of the USENIX Workshop on Offensive Technologies (WOOT), 2020
582020
BlueShield: Detecting spoofing attacks in bluetooth low energy networks
J Wu, Y Nan, V Kumar, M Payer, D Xu
23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020
272020
Understanding malicious cross-library data harvesting on android
J Wang, Y Xiao, X Wang, Y Nan, L Xing, X Liao, JW Dong, N Serrano, ...
30th USENIX Security Symposium (USENIX Security 21), 4133-4150, 2021
242021
Identifying user-input privacy in mobile applications at a large scale
Y Nan, Z Yang, M Yang, S Zhou, Y Zhang, G Gu, X Wang, L Sun
IEEE Transactions on Information Forensics and Security 12 (3), 647-661, 2016
242016
Smartdagger: a bytecode-based static analysis approach for detecting cross-contract vulnerability
Z Liao, Z Zheng, X Chen, Y Nan
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022
202022
On the insecurity of SMS one-time password messages against local attackers in modern mobile devices
Z Lei, Y Nan, Y Fratantonio, A Bianchi
Network and Distributed Systems Security (NDSS) Symposium 2021, 2021
202021
Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps
Y Nan, X Wang, L Xing, X Liao, R Wu, J Wu, Y Zhang, XF Wang
32st USENIX Security Symposium (USENIX Security 23), 2023
82023
Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems
M Zha, J Wang, Y Nan, XF Wang, Y Zhang, W Jing
Network and Distributed Systems Security (NDSS) Symposium., 2022
62022
ProFactory: Improving IoT Security via Formalized Protocol Customization
F Wang, J Wu, Y Nan, Y Aafer, X Zhang, D Xu, M Payer
31st USENIX Security Symposium (USENIX Security 22), 3879-3896, 2022
42022
AIRTAG: Towards Automated Attack Investigation by Unsupervised Learning with Log Texts
H Ding, J Zhai, Y Nan, S Ma
32nd USENIX Security Symposium (USENIX Security 23), 373-390, 2023
32023
Simulation: demystifying (insecure) cellular network based one-tap authentication services
Z Zhou, X Han, Z Chen, Y Nan, J Li, D Gu
2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems …, 2022
32022
Detecting state inconsistency bugs in dapps via on-chain transaction replay and fuzzing
M Ye, Y Nan, Z Zheng, D Wu, H Li
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
22023
Smartstate: Detecting state-reverting vulnerabilities in smart contracts via fine-grained state-dependency analysis
Z Liao, S Hao, Y Nan, Z Zheng
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
22023
PrettySmart: Detecting Permission Re-delegation Vulnerability for Token Behaviors in Smart Contracts
Z Zhong, Z Zheng, HN Dai, Q Xue, J Chen, Y Nan
2024 IEEE/ACM 46th International Conference on Software Engineering (ICSE …, 2024
2024
Understanding Dark UI Patterns in the Mobile Ecosystem: A Case Study of Apps in China
M Long, Y Xu, J Wu, Q Ou, Y Nan
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 33-40, 2023
2023
MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning
Z Jia, Y Xiong, Y Nan, Y Zhang, J Zhao, M Wen
arXiv preprint arXiv:2310.09831, 2023
2023
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20