USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 18 results:
Filters: Author is Min Yang [Clear All Filters]
Exorcising "Wraith": Protecting LiDAR-based Object Detector in Automated Driving System from Appearing Attacks. 32nd USENIX Security Symposium (USENIX Security 23). :2939--2956.
.
2023. Notice the Imposter! A Study on User Tag Spoofing Attack in Mobile Apps. 32nd USENIX Security Symposium (USENIX Security 23). :5485--5501.
.
2023. Remote Code Execution from SSTI in the Sandbox: Automatically Detecting and Exploiting Template Escape Bugs. 32nd USENIX Security Symposium (USENIX Security 23). :3691--3708.
.
2023. Rethinking White-Box Watermarks on Deep Learning Models under Neural Structural Obfuscation. 32nd USENIX Security Symposium (USENIX Security 23). :2347--2364.
.
2023. Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability Patches. 31st USENIX Security Symposium (USENIX Security 22). :1993--2010.
.
2022. Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths. 31st USENIX Security Symposium (USENIX Security 22). :4365--4382.
.
2022. Hidden Trigger Backdoor Attack on NLP Models via Linguistic Style Manipulation. 31st USENIX Security Symposium (USENIX Security 22). :3611--3628.
.
2022. Identity Confusion in WebView-based Mobile App-in-app Ecosystems. 31st USENIX Security Symposium (USENIX Security 22). :1597--1613.
.
2022. Rendering Contention Channel Made Practical in Web Browsers. 31st USENIX Security Symposium (USENIX Security 22). :3183--3199.
.
2022. Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking. 30th USENIX Security Symposium (USENIX Security 21). :2471--2488.
.
2021. Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks. 30th USENIX Security Symposium (USENIX Security 21). :3201--3217.
.
2021. BScout: Direct Whole Patch Presence Test for Java Executables. 29th USENIX Security Symposium (USENIX Security 20). :1147--1164.
.
2020. TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation. 29th USENIX Security Symposium (USENIX Security 20). :1381--1398.
.
2020. An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications. 27th USENIX Security Symposium (USENIX Security 18). :1183--1198.
.
2018. We Still Don’t Have Secure Cross-Domain Requests: an Empirical Study of CORS. 27th USENIX Security Symposium (USENIX Security 18). :1079--1093.
.
2018. Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path. 27th USENIX Security Symposium (USENIX Security 18). :1113--1128.
.
2018. UIPicker: User-Input Privacy Identification in Mobile Applications. 24th USENIX Security Symposium (USENIX Security 15). :993--1008.
.
2015. ORDER: Object centRic DEterministic Replay for Java. 2011 USENIX Annual Technical Conference (USENIX ATC 11).
.
2011.