Export 10 results:
Filters: Author is Zhemin Yang  [Clear All Filters]
Li S, Yang Z, Yang G, Zhang H, Hua N, Huang Y, Yang M.  2023.  Notice the Imposter! A Study on User Tag Spoofing Attack in Mobile Apps. 32nd USENIX Security Symposium (USENIX Security 23). :5485--5501.
Pan X, Zhang M, Yan Y, Zhu J, Yang Z.  2022.  Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity Analysis. 31st USENIX Security Symposium (USENIX Security 22). :3989--4006.
Zhou S, Yang Z, Qiao D, Liu P, Yang M, Wang Z, Wu C.  2022.  Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths. 31st USENIX Security Symposium (USENIX Security 22). :4365--4382.
Nan Y, Yang M, Yang Z, Zhou S, Gu G, Wang XF.  2015.  UIPicker: User-Input Privacy Identification in Mobile Applications. 24th USENIX Security Symposium (USENIX Security 15). :993--1008.
Yang Z, Yang M, Xu L, Chen H, Zang B.  2011.  ORDER: Object centRic DEterministic Replay for Java. 2011 USENIX Annual Technical Conference (USENIX ATC 11).