What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Luyi Xing
Google Scholar
ORCID:
0000-0002-1036-1163
38
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
JBomAudit: Assessing the Landscape, Compliance, and Security Implications of Java SBOMs.
Yue Xiao
Dhilung Kirat
Douglas Lee Schales
Jiyong Jang
Luyi Xing
Xiaojing Liao
2025
conf/ndss
Hidden and Lost Control: on Security Design Risks in IoT User-Facing Matter Controller.
Haoqiang Wang
Yiwei Fang
Yichen Liu
Ze Jin
Emma Delph
Xiaojiang Du
Qixu Liu
Luyi Xing
2025
conf/ndss
SKILLPoV: Towards Accessible and Effective Privacy Notice for Amazon Alexa Skills.
Jingwen Yan
Song Liao
Mohammed Aldeen
Luyi Xing
Danfeng Yao
Long Cheng
2025
conf/uss
X.509DoS: Exploiting and Detecting Denial-of-Service Vulnerabilities in Cryptographic Libraries using Crafted X.509 Certificates.
Bing Shi
Wenchao Li
Yuchen Wang
Xiaolong Bai
Luyi Xing
2024
conf/ccs
Measuring Compliance Implications of Third-party Libraries' Privacy Label Disclosure Guidelines.
Yue Xiao
Chaoqi Zhang
Yue Qin
Fares Fahad S. Alharbi
Luyi Xing
Xiaojing Liao
2024
conf/ccs
SaTS '24: The 2nd ACM Workshop on Secure and Trustworthy Superapps.
Zhiqiang Lin
Luyi Xing
2024
conf/uss
Towards Privacy-Preserving Social-Media SDKs on Android.
Haoran Lu
Yichen Liu
Xiaojing Liao
Luyi Xing
2024
conf/uss
iHunter: Hunting Privacy Violations at Scale in the Software Supply Chain on iOS.
Dexin Liu
Yue Xiao
Chaoqi Zhang
Kaitao Xie
Xiaolong Bai
Shikun Zhang
Luyi Xing
2024
conf/uss
Navigating the Privacy Compliance Maze: Understanding Risks with Privacy-Configurable Mobile SDKs.
Yifan Zhang
Zhaojie Hu
Xueqiang Wang
Yuhui Hong
Yuhong Nan
XiaoFeng Wang
Jiatao Cheng
Luyi Xing
2024
conf/sp
MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementations.
Bin Yuan
Zhanxiang Song
Yan Jia
Zhenyu Lu
Deqing Zou
Hai Jin
Luyi Xing
2024
conf/ndss
Leaking the Privacy of Groups and More: Understanding Privacy Risks of Cross-App Content Sharing in Mobile Ecosystem.
Jiangrong Wu
Yuhong Nan
Luyi Xing
Jiatao Cheng
Zimin Lin
Zibin Zheng
Min Yang
2023
conf/ccs
The Danger of Minimum Exposures: Understanding Cross-App Information Leaks on iOS through Multi-Side-Channel Learning.
Zihao Wang
Jiale Guan
XiaoFeng Wang
Wenhao Wang
Luyi Xing
Fares Fahad S. Alharbi
2023
conf/uss
Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps.
Yuhong Nan
Xueqiang Wang
Luyi Xing
Xiaojing Liao
Ruoyu Wu
Jianliang Wu
Yifan Zhang
XiaoFeng Wang
2023
conf/uss
Union under Duress: Understanding Hazards of Duplicate Resource Mismediation in Android Software Supply Chain.
Xueqiang Wang
Yifan Zhang
XiaoFeng Wang
Yan Jia
Luyi Xing
2023
conf/uss
Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels.
Yue Xiao
Zhengyi Li
Yue Qin
Xiaolong Bai
Jiale Guan
Xiaojing Liao
Luyi Xing
2022
conf/ccs
Perils and Mitigation of Security Risks of Cooperation in Mobile-as-a-Gateway IoT.
Xin'an Zhou
Jiale Guan
Luyi Xing
Zhiyun Qian
2022
conf/ccs
P-Verifier: Understanding and Mitigating Security Risks in Cloud-based IoT Access Policies.
Ze Jin
Luyi Xing
Yiwei Fang
Yan Jia
Bin Yuan
Qixu Liu
2022
conf/uss
How Are Your Zombie Accounts? Understanding Users' Practices and Expectations on Mobile App Account Deletion.
Yijing Liu
Yan Jia
Qingyin Tan
Zheli Liu
Luyi Xing
2022
conf/sp
Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms.
Zhi Li
Weijie Liu
Hongbo Chen
XiaoFeng Wang
Xiaojing Liao
Luyi Xing
Mingming Zha
Hai Jin
Deqing Zou
2021
conf/ccs
Who's In Control? On Security Risks of Disjointed IoT Device Management Channels.
Yan Jia
Bin Yuan
Luyi Xing
Dongfang Zhao
Yifan Zhang
XiaoFeng Wang
Yijing Liu
Kaimin Zheng
Peyton Crnjak
Yuqing Zhang
Deqing Zou
Hai Jin
2021
conf/uss
Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications.
Liya Su
Xinyue Shen
Xiangyu Du
Xiaojing Liao
XiaoFeng Wang
Luyi Xing
Baoxu Liu
2021
conf/uss
Understanding Malicious Cross-library Data Harvesting on Android.
Jice Wang
Yue Xiao
Xueqiang Wang
Yuhong Nan
Luyi Xing
Xiaojing Liao
Jinwei Dong
Nicolás Serrano
Haoran Lu
XiaoFeng Wang
Yuqing Zhang
2020
conf/ccs
RTFM! Automatic Assumption Discovery and Verification Derivation from Library Document for API Misuse Detection.
Tao Lv
Ruishi Li
Yi Yang
Kai Chen
Xiaojing Liao
XiaoFeng Wang
Peiwei Hu
Luyi Xing
2020
conf/ccs
iDEA: Static Analysis on the Security of Apple Kernel Drivers.
Xiaolong Bai
Luyi Xing
Min Zheng
Fuping Qu
2020
conf/ccs
Demystifying Resource Management Risks in Emerging Mobile App-in-App Ecosystems.
Haoran Lu
Luyi Xing
Yue Xiao
Yifan Zhang
Xiaojing Liao
XiaoFeng Wang
Xueqiang Wang
2020
conf/uss
Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation.
Bin Yuan
Yan Jia
Luyi Xing
Dongfang Zhao
XiaoFeng Wang
Deqing Zou
Hai Jin
Yuqing Zhang
2020
conf/sp
Burglars' IoT Paradise: Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds.
Yan Jia
Luyi Xing
Yuhang Mao
Dongfang Zhao
XiaoFeng Wang
Shangru Zhao
Yuqing Zhang
2019
conf/uss
Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation Analysis.
Yi Chen
Luyi Xing
Yue Qin
Xiaojing Liao
XiaoFeng Wang
Kai Chen
Wei Zou
2017
conf/ccs
Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews.
Tongxin Li
Xueqiang Wang
Mingming Zha
Kai Chen
XiaoFeng Wang
Luyi Xing
Xiaolong Bai
Nan Zhang
Xinhui Han
2016
conf/ccs
Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service.
Xiaojing Liao
Sumayah A. Alrwais
Kan Yuan
Luyi Xing
XiaoFeng Wang
Shuang Hao
Raheem A. Beyah
2016
conf/ccs
Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence.
Xiaojing Liao
Kan Yuan
XiaoFeng Wang
Zhou Li
Luyi Xing
Raheem A. Beyah
2016
conf/sp
Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search.
Xiaojing Liao
Kan Yuan
XiaoFeng Wang
Zhongyu Pei
Hao Yang
Jianjun Chen
Hai-Xin Duan
Kun Du
Eihal Alowaisheq
Sumayah A. Alrwais
Luyi Xing
Raheem A. Beyah
2016
conf/sp
Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf.
Xiaolong Bai
Luyi Xing
Nan Zhang
XiaoFeng Wang
Xiaojing Liao
Tongxin Li
Shi-Min Hu
2015
conf/ccs
Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS.
Luyi Xing
Xiaolong Bai
Tongxin Li
XiaoFeng Wang
Kai Chen
Xiaojing Liao
Shi-Min Hu
Xinhui Han
2014
conf/ccs
Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services.
Tongxin Li
Xiao-yong Zhou
Luyi Xing
Yeonjoon Lee
Muhammad Naveed
XiaoFeng Wang
Xinhui Han
2014
conf/sp
Upgrading Your Android, Elevating My Malware: Privilege Escalation through Mobile OS Updating.
Luyi Xing
Xiaorui Pan
Rui Wang
Kan Yuan
XiaoFeng Wang
2013
conf/ccs
Unauthorized origin crossing on mobile platforms: threats and mitigation.
Rui Wang
Luyi Xing
XiaoFeng Wang
Shuo Chen
2013
conf/ndss
InteGuard: Toward Automatic Protection of Third-Party Web Service Integrations.
Luyi Xing
Yangyi Chen
XiaoFeng Wang
Shuo Chen
Coauthors
Baoxu Liu
(1)
Bin Yuan
(4)
Bing Shi
(1)
Chaoqi Zhang
(2)
Danfeng Yao
(1)
Deqing Zou
(4)
Dexin Liu
(1)
Dhilung Kirat
(1)
Dongfang Zhao
(3)
Douglas Lee Schales
(1)
Eihal Alowaisheq
(1)
Emma Delph
(1)
Fares Fahad S. Alharbi
(2)
Fuping Qu
(1)
Hai Jin
(4)
Hai-Xin Duan
(1)
Hao Yang
(1)
Haoqiang Wang
(1)
Haoran Lu
(3)
Hongbo Chen
(1)
Jiale Guan
(3)
Jiangrong Wu
(1)
Jianjun Chen
(1)
Jianliang Wu
(1)
Jiatao Cheng
(2)
Jice Wang
(1)
Jingwen Yan
(1)
Jinwei Dong
(1)
Jiyong Jang
(1)
Kai Chen
(4)
Kaimin Zheng
(1)
Kaitao Xie
(1)
Kan Yuan
(4)
Kun Du
(1)
Liya Su
(1)
Long Cheng
(1)
Luyi Xing
(38)
Min Yang
(1)
Min Zheng
(1)
Mingming Zha
(2)
Mohammed Aldeen
(1)
Muhammad Naveed
(1)
Nan Zhang
(2)
Nicolás Serrano
(1)
Peiwei Hu
(1)
Peyton Crnjak
(1)
Qingyin Tan
(1)
Qixu Liu
(2)
Raheem A. Beyah
(3)
Rui Wang
(2)
Ruishi Li
(1)
Ruoyu Wu
(1)
Shangru Zhao
(1)
Shi-Min Hu
(2)
Shikun Zhang
(1)
Shuang Hao
(1)
Shuo Chen
(2)
Song Liao
(1)
Sumayah A. Alrwais
(2)
Tao Lv
(1)
Tongxin Li
(4)
Wei Zou
(1)
Weijie Liu
(1)
Wenchao Li
(1)
Wenhao Wang
(1)
Xiangyu Du
(1)
Xiao-yong Zhou
(1)
XiaoFeng Wang
(23)
Xiaojiang Du
(1)
Xiaojing Liao
(16)
Xiaolong Bai
(7)
Xiaorui Pan
(1)
Xin'an Zhou
(1)
Xinhui Han
(3)
Xinyue Shen
(1)
Xueqiang Wang
(6)
Yan Jia
(7)
Yangyi Chen
(1)
Yeonjoon Lee
(1)
Yi Chen
(1)
Yi Yang
(1)
Yichen Liu
(2)
Yifan Zhang
(5)
Yijing Liu
(2)
Yiwei Fang
(2)
Yuchen Wang
(1)
Yue Qin
(3)
Yue Xiao
(6)
Yuhang Mao
(1)
Yuhong Nan
(4)
Yuhui Hong
(1)
Yuqing Zhang
(4)
Ze Jin
(2)
Zhanxiang Song
(1)
Zhaojie Hu
(1)
Zheli Liu
(1)
Zhengyi Li
(1)
Zhenyu Lu
(1)
Zhi Li
(1)
Zhiqiang Lin
(1)
Zhiyun Qian
(1)
Zhongyu Pei
(1)
Zhou Li
(1)
Zibin Zheng
(1)
Zihao Wang
(1)
Zimin Lin
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to