Biblio

Export 19 results:
Filters: Author is XiaoFeng Wang  [Clear All Filters]
2021
Tang D, Wang XF, Tang H, Zhang K.  2021.  Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection. 30th {USENIX} Security Symposium ({USENIX} Security 21). :1541--1558.
Su L, Shen X, Du X, Liao X, Wang XF, Xing L, Liu B.  2021.  Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications. 30th {USENIX} Security Symposium ({USENIX} Security 21). :1307--1324.
Wang J, Xiao Y, Wang X, Nan Y, Xing L, Liao X, Dong JW, Serrano N, Lu H, Wang XF et al..  2021.  Understanding Malicious Cross-library Data Harvesting on Android. 30th {USENIX} Security Symposium ({USENIX} Security 21). :4133--4150.
2019
Chen Y, Xing L, Qin Y, Liao X, Wang XF, Chen K, Zou W.  2019.  Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation Analysis. 28th {USENIX} Security Symposium ({USENIX} Security 19). :747--764.
Diao W, Zhang Y, Zhang L, Li Z, Xu F, Pan X, Liu X, Weng J, Zhang K, Wang XF.  2019.  Kindness is a Risky Business: On the Usage of the Accessibility APIs in Android . 22nd International Symposium on Research in Attacks, Intrusions and Defenses ({RAID} 2019). :261--275.
Wang X, Sun Y, Nanda S, Wang XF.  2019.  Looking from the Mirror: Evaluating IoT Device Security through Mobile Companion Apps. 28th {USENIX} Security Symposium ({USENIX} Security 19). :1151--1167.
Feng X, Liao X, Wang XF, Wang H, Li Q, Yang K, Zhu H, Sun L.  2019.  Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis. 28th {USENIX} Security Symposium ({USENIX} Security 19). :887--903.
Lee Y, Wang X, Lee K, Liao X, Wang XF, Li T, Mi X.  2019.  Understanding iOS-based Crowdturfing Through Hidden UI Analysis. 28th {USENIX} Security Symposium ({USENIX} Security 19). :765--781.
2015
Chen K, Wang P, Lee Y, Wang XF, Zhang N, Huang H, Zou W, Liu P.  2015.  Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale. 24th {USENIX} Security Symposium ({USENIX} Security 15). :659--674.
Nan Y, Yang M, Yang Z, Zhou S, Gu G, Wang XF.  2015.  UIPicker: User-Input Privacy Identification in Mobile Applications. 24th {USENIX} Security Symposium ({USENIX} Security 15). :993--1008.
2014
Alrwais S, Yuan K, Alowaisheq E, Li Z, Wang XF.  2014.  Understanding the Dark Side of Domain Parking. 23rd {USENIX} Security Symposium ({USENIX} Security 14). :207--222.
2008
Wang R, Wang XF, Li Z.  2008.  Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software. 17th {USENIX} Security Symposium ({USENIX} Security 08).