Biblio

Export 9 results:
Filters: Author is Kehuan Zhang  [Clear All Filters]
2023
Huang K, Zhou YT, Zhang K, Xu J, Chen J, Tang D, Zhang K.  2023.  HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVs. 32nd USENIX Security Symposium (USENIX Security 23). :4553--4570.
Li R, Diao W, Yang S, Liu X, Guo S, Zhang K.  2023.  Lost in Conversion: Exploit Data Structure Conversion with Attribute Loss to Break Android Systems. 32nd USENIX Security Symposium (USENIX Security 23). :5503--5520.
Yang F, Xu J, Xiong C, Li Z, Zhang K.  2023.  PROGRAPHER: An Anomaly Detection System based on Provenance Graph Embedding. 32nd USENIX Security Symposium (USENIX Security 23). :4355--4372.
2019
Zhang L, Chen J, Diao W, Guo S, Weng J, Zhang K.  2019.  CryptoREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices. 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). :151--164.
Diao W, Zhang Y, Zhang L, Li Z, Xu F, Pan X, Liu X, Weng J, Zhang K, Wang XF.  2019.  Kindness is a Risky Business: On the Usage of the Accessibility APIs in Android . 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). :261--275.
2018
Yang R, Lau WCheong, Chen J, Zhang K.  2018.  Vetting Single Sign-On SDK Implementations via Symbolic Reasoning. 27th USENIX Security Symposium (USENIX Security 18). :1459--1474.
2016
Du K, Yang H, Li Z, Duan H, Zhang K.  2016.  The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO. 25th USENIX Security Symposium (USENIX Security 16). :245--262.