USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 26 results:
Filters: Author is XiaoFeng Wang [Clear All Filters]
Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps 32nd USENIX Security Symposium (USENIX Security 23). :6665--6682.
.
2023. Credit Karma: Understanding Security Implications of Exposed Cloud Services through Automated Capability Inference. 32nd USENIX Security Symposium (USENIX Security 23). :6007--6024.
.
2023. Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning. 32nd USENIX Security Symposium (USENIX Security 23). :3529--3545.
.
2023. Union under Duress: Understanding Hazards of Duplicate Resource Mismediation in Android Software Supply Chain. 32nd USENIX Security Symposium (USENIX Security 23). :3403--3420.
.
2023. A Verified Confidential Computing as a Service Framework for Privacy Preservation. 32nd USENIX Security Symposium (USENIX Security 23). :4733--4750.
.
2023. XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing Tomography. 32nd USENIX Security Symposium (USENIX Security 23). :2815--2832.
.
2023. Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change Requests. 31st USENIX Security Symposium (USENIX Security 22). :17--34.
.
2022. Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection. 30th USENIX Security Symposium (USENIX Security 21). :1541--1558.
.
2021. Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications. 30th USENIX Security Symposium (USENIX Security 21). :1307--1324.
.
2021. Understanding Malicious Cross-library Data Harvesting on Android. 30th USENIX Security Symposium (USENIX Security 21). :4133--4150.
.
2021. Devil’s Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices. 29th USENIX Security Symposium (USENIX Security 20). :2667--2684.
.
2020. Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation. 29th USENIX Security Symposium (USENIX Security 20). :1183--1200.
.
2020. Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation Analysis. 28th USENIX Security Symposium (USENIX Security 19). :747--764.
.
2019. Kindness is a Risky Business: On the Usage of the Accessibility APIs in Android . 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). :261--275.
.
2019. Looking from the Mirror: Evaluating IoT Device Security through Mobile Companion Apps. 28th USENIX Security Symposium (USENIX Security 19). :1151--1167.
.
2019. Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis. 28th USENIX Security Symposium (USENIX Security 19). :887--903.
.
2019. Understanding iOS-based Crowdturfing Through Hidden UI Analysis. 28th USENIX Security Symposium (USENIX Security 19). :765--781.
.
2019. CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. 27th USENIX Security Symposium (USENIX Security 18). :49--64.
.
2018. An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications. 27th USENIX Security Symposium (USENIX Security 18). :1183--1198.
.
2018. Reading Thieves' Cant: Automatically Identifying and Understanding Dark Jargons from Cybercrime Marketplaces. 27th USENIX Security Symposium (USENIX Security 18). :1027--1041.
.
2018. Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment. 26th USENIX Security Symposium (USENIX Security 17). :593--608.
.
2017. SmartAuth: User-Centered Authorization for the Internet of Things. 26th USENIX Security Symposium (USENIX Security 17). :361--378.
.
2017. Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale. 24th USENIX Security Symposium (USENIX Security 15). :659--674.
.
2015. UIPicker: User-Input Privacy Identification in Mobile Applications. 24th USENIX Security Symposium (USENIX Security 15). :993--1008.
.
2015. Understanding the Dark Side of Domain Parking. 23rd USENIX Security Symposium (USENIX Security 14). :207--222.
.
2014.