What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
XiaoFeng Wang
Google Scholar
129
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Rigging the Foundation: Manipulating Pre-training for Advanced Membership Inference Attacks.
Zihao Wang
Rui Zhu
Zhikun Zhang
Haixu Tang
Xiaofeng Wang
2025
conf/ndss
The Road to Trust: Building Enclaves within Confidential VMs.
Wenhao Wang
Linke Song
Benshan Mei
Shuang Liu
Shijun Zhao
Shoumeng Yan
XiaoFeng Wang
Dan Meng
Rui Hou
2025
conf/uss
Topic-FlipRAG: Topic-Orientated Adversarial Opinion Manipulation Attacks to Retrieval-Augmented Generation Models.
Yuyang Gong
Zhuo Chen
Jiawei Liu
Miaokun Chen
Fengchang Yu
Wei Lu
XiaoFeng Wang
Xiaozhong Liu
2025
conf/uss
PICACHV: Formally Verified Data Use Policy Enforcement for Secure Data Analytics.
Haobin Hiroki Chen
Hongbo Chen
Mingshen Sun
Chenghong Wang
XiaoFeng Wang
2025
conf/uss
Sharpness-Aware Initialization: Improving Differentially Private Machine Learning from First Principles.
Zihao Wang
Rui Zhu
Dongruo Zhou
Zhikun Zhang
XiaoFeng Wang
Haixu Tang
2025
journals/tifs
The Early Bird Catches the Leak: Unveiling Timing Side Channels in LLM Serving Systems.
Linke Song
Zixuan Pang
Wenhao Wang
Zihao Wang
XiaoFeng Wang
Hongbo Chen
Wei Song
Yier Jin
Dan Meng
Rui Hou
2024
conf/ccs
Understanding Cross-Platform Referral Traffic for Illicit Drug Promotion.
Mingming Zha
Zilong Lin
Siyuan Tang
Xiaojing Liao
Yuhong Nan
XiaoFeng Wang
2024
conf/uss
Tossing in the Dark: Practical Bit-Flipping on Gray-box Deep Neural Networks for Runtime Trojan Injection.
Zihao Wang
Di Tang
XiaoFeng Wang
Wei He
Zhaoyang Geng
Wenhao Wang
2024
conf/uss
Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples.
Dandan Xu
Di Tang
Yi Chen
XiaoFeng Wang
Kai Chen
Haixu Tang
Longxing Li
2024
conf/uss
Malla: Demystifying Real-world Large Language Model Integrated Malicious Services.
Zilong Lin
Jian Cui
Xiaojing Liao
XiaoFeng Wang
2024
conf/uss
DPAdapter: Improving Differentially Private Deep Learning through Noise Tolerance Pre-training.
Zihao Wang
Rui Zhu
Dongruo Zhou
Zhikun Zhang
John Mitchell
Haixu Tang
XiaoFeng Wang
2024
conf/uss
Navigating the Privacy Compliance Maze: Understanding Risks with Privacy-Configurable Mobile SDKs.
Yifan Zhang
Zhaojie Hu
Xueqiang Wang
Yuhui Hong
Yuhong Nan
XiaoFeng Wang
Jiatao Cheng
Luyi Xing
2024
conf/sp
MAWSEO: Adversarial Wiki Search Poisoning for Illicit Online Promotion.
Zilong Lin
Zhengyi Li
Xiaojing Liao
XiaoFeng Wang
Xiaozhong Liu
2024
conf/asiaccs
Security Of AI, By AI and For AI: Charting New Territories in AI-Centered Cybersecurity Research.
XiaoFeng Wang
2024
conf/ndss
Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering.
Rui Zhu
Di Tang
Siyuan Tang
Zihao Wang
Guanhong Tao
Shiqing Ma
XiaoFeng Wang
Haixu Tang
2024
conf/dsn
Stealthy Peers: Understanding Security and Privacy Risks of Peer-Assisted Video Streaming.
Siyuan Tang
Eihal Alowaisheq
Xianghang Mi
Yi Chen
XiaoFeng Wang
Yanzhi Dou
2023
conf/ccs
Lost along the Way: Understanding and Mitigating Path-Misresolution Threats to Container Isolation.
Zhi Li
Weijie Liu
XiaoFeng Wang
Bin Yuan
Hongliang Tian
Hai Jin
Shoumeng Yan
2023
conf/ccs
The Danger of Minimum Exposures: Understanding Cross-App Information Leaks on iOS through Multi-Side-Channel Learning.
Zihao Wang
Jiale Guan
XiaoFeng Wang
Wenhao Wang
Luyi Xing
Fares Fahad S. Alharbi
2023
conf/uss
Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps.
Yuhong Nan
Xueqiang Wang
Luyi Xing
Xiaojing Liao
Ruoyu Wu
Jianliang Wu
Yifan Zhang
XiaoFeng Wang
2023
conf/uss
XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing Tomography.
Zhiyuan Yu
Yuanhaur Chang
Shixuan Zhai
Nicholas Deily
Tao Ju
XiaoFeng Wang
Uday Jammalamadaka
Ning Zhang
2023
conf/uss
Union under Duress: Understanding Hazards of Duplicate Resource Mismediation in Android Software Supply Chain.
Xueqiang Wang
Yifan Zhang
XiaoFeng Wang
Yan Jia
Luyi Xing
2023
conf/uss
Credit Karma: Understanding Security Implications of Exposed Cloud Services through Automated Capability Inference.
Xueqiang Wang
Yuqiong Sun
Susanta Nanda
XiaoFeng Wang
2023
conf/uss
Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning.
Yi Chen
Di Tang
Yepeng Yao
Mingming Zha
XiaoFeng Wang
Xiaozhong Liu
Haixu Tang
Baoxu Liu
2023
conf/uss
A Verified Confidential Computing as a Service Framework for Privacy Preservation.
Hongbo Chen
Haobin Hiroki Chen
Mingshen Sun
Kang Li
Zhaofeng Chen
XiaoFeng Wang
2023
conf/eurosp
Understanding the Security Risks of Decentralized Exchanges by Uncovering Unfair Trades in the Wild.
Jiaqi Chen
Yibo Wang
Yuxuan Zhou
Wanning Ding
Yuzhe Tang
XiaoFeng Wang
Kai Li
2022
conf/ccs
Clues in Tweets: Twitter-Guided Discovery and Analysis of SMS Spam.
Siyuan Tang
Xianghang Mi
Ying Li
XiaoFeng Wang
Kai Chen
2022
conf/ccs
When Evil Calls: Targeted Adversarial Voice over IP Network.
Han Liu
Zhiyuan Yu
Mingming Zha
XiaoFeng Wang
William Yeoh
Yevgeniy Vorobeychik
Ning Zhang
2022
conf/uss
Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change Requests.
Yi Chen
Di Tang
Yepeng Yao
Mingming Zha
XiaoFeng Wang
Xiaozhong Liu
Haixu Tang
Dongfang Zhao
2022
conf/sp
Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms.
Zhi Li
Weijie Liu
Hongbo Chen
XiaoFeng Wang
Xiaojing Liao
Luyi Xing
Mingming Zha
Hai Jin
Deqing Zou
2022
conf/ndss
Demystifying Local Business Search Poisoning for Illicit Drug Promotion.
Peng Wang
Zilong Lin
Xiaojing Liao
XiaoFeng Wang
2021
conf/ccs
Who's In Control? On Security Risks of Disjointed IoT Device Management Channels.
Yan Jia
Bin Yuan
Luyi Xing
Dongfang Zhao
Yifan Zhang
XiaoFeng Wang
Yijing Liu
Kaimin Zheng
Peyton Crnjak
Yuqing Zhang
Deqing Zou
Hai Jin
2021
conf/uss
Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications.
Liya Su
Xinyue Shen
Xiangyu Du
Xiaojing Liao
XiaoFeng Wang
Luyi Xing
Baoxu Liu
2021
conf/uss
Understanding Malicious Cross-library Data Harvesting on Android.
Jice Wang
Yue Xiao
Xueqiang Wang
Yuhong Nan
Luyi Xing
Xiaojing Liao
Jinwei Dong
Nicolás Serrano
Haoran Lu
XiaoFeng Wang
Yuqing Zhang
2021
conf/uss
Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection.
Di Tang
XiaoFeng Wang
Haixu Tang
Kehuan Zhang
2021
conf/sp
Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis.
Yi Chen
Yepeng Yao
XiaoFeng Wang
Dandan Xu
Chang Yue
Xiaozhong Liu
Kai Chen
Haixu Tang
Baoxu Liu
2021
conf/ndss
As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service.
Kai Li
Jiaqi Chen
Xianghong Liu
Yuzhe Richard Tang
XiaoFeng Wang
Xiapu Luo
2021
conf/ndss
Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks.
Xianghang Mi
Siyuan Tang
Zhengyi Li
Xiaojing Liao
Feng Qian
XiaoFeng Wang
2020
conf/ccs
RTFM! Automatic Assumption Discovery and Verification Derivation from Library Document for API Misuse Detection.
Tao Lv
Ruishi Li
Yi Yang
Kai Chen
Xiaojing Liao
XiaoFeng Wang
Peiwei Hu
Luyi Xing
2020
conf/ccs
Demystifying Resource Management Risks in Emerging Mobile App-in-App Ecosystems.
Haoran Lu
Luyi Xing
Yue Xiao
Yifan Zhang
Xiaojing Liao
XiaoFeng Wang
Xueqiang Wang
2020
conf/ccs
Zombie Awakening: Stealthy Hijacking of Active Domains through DNS Hosting Referral.
Eihal Alowaisheq
Siyuan Tang
Zhihao Wang
Fatemah Alharbi
Xiaojing Liao
XiaoFeng Wang
2020
conf/uss
Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation.
Bin Yuan
Yan Jia
Luyi Xing
Dongfang Zhao
XiaoFeng Wang
Deqing Zou
Hai Jin
Yuqing Zhang
2020
conf/uss
Devil's Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices.
Yuxuan Chen
Xuejing Yuan
Jiangshan Zhang
Yue Zhao
Shengzhi Zhang
Kai Chen
XiaoFeng Wang
2020
conf/sp
Enabling Rack-scale Confidential Computing using Heterogeneous Trusted Execution Environment.
Jianping Zhu
Rui Hou
XiaoFeng Wang
Wenhao Wang
Jiangfeng Cao
Boyan Zhao
Zhongpu Wang
Yuhui Zhang
Jiameng Ying
Lixin Zhang
Dan Meng
2020
conf/sp
Burglars' IoT Paradise: Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds.
Yan Jia
Luyi Xing
Yuhang Mao
Dongfang Zhao
XiaoFeng Wang
Shangru Zhao
Yuqing Zhang
2020
conf/eurosp
A Pragmatic Approach to Membership Inferences on Machine Learning Models.
Yunhui Long
Lei Wang
Diyue Bu
Vincent Bindschaedler
XiaoFeng Wang
Haixu Tang
Carl A. Gunter
Kai Chen
2020
conf/ndss
Into the Deep Web: Understanding E-commerce Fraud from Autonomous Chat with Cybercriminals.
Peng Wang
Xiaojing Liao
Yue Qin
XiaoFeng Wang
2019
conf/uss
Looking from the Mirror: Evaluating IoT Device Security through Mobile Companion Apps.
Xueqiang Wang
Yuqiong Sun
Susanta Nanda
XiaoFeng Wang
2019
conf/uss
Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation Analysis.
Yi Chen
Luyi Xing
Yue Qin
Xiaojing Liao
XiaoFeng Wang
Kai Chen
Wei Zou
2019
conf/uss
Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis.
Xuan Feng
Xiaojing Liao
XiaoFeng Wang
Haining Wang
Qiang Li
Kai Yang
Hongsong Zhu
Limin Sun
2019
conf/uss
Understanding iOS-based Crowdturfing Through Hidden UI Analysis.
Yeonjoon Lee
Xueqiang Wang
Kwangwuk Lee
Xiaojing Liao
XiaoFeng Wang
Tongxin Li
Xianghang Mi
2019
conf/sp
Resident Evil: Understanding Residential IP Proxy as a Dark Service.
Xianghang Mi
Xuan Feng
Xiaojing Liao
Baojun Liu
XiaoFeng Wang
Feng Qian
Zhou Li
Sumayah A. Alrwais
Limin Sun
Ying Liu
2019
conf/sp
Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems.
Nan Zhang
Xianghang Mi
Xuan Feng
XiaoFeng Wang
Yuan Tian
Feng Qian
2019
conf/sp
Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion.
Kan Yuan
Di Tang
Xiaojing Liao
XiaoFeng Wang
Xuan Feng
Yi Chen
Menghan Sun
Haoran Lu
Kehuan Zhang
2019
conf/sp
ProFuzzer: On-the-fly Input Type Probing for Better Zero-Day Vulnerability Discovery.
Wei You
Xueqiang Wang
Shiqing Ma
Jianjun Huang
Xiangyu Zhang
XiaoFeng Wang
Bin Liang
2019
conf/sp
Demystifying Hidden Privacy Settings in Mobile Apps.
Yi Chen
Mingming Zha
Nan Zhang
Dandan Xu
Qianqian Zhao
Xuan Feng
Kan Yuan
Fnu Suya
Yuan Tian
Kai Chen
XiaoFeng Wang
Wei Zou
2019
conf/eurosp
TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis.
Baojun Liu
Zhou Li
Peiyuan Zong
Chaoyi Lu
Hai-Xin Duan
Ying Liu
Sumayah A. Alrwais
XiaoFeng Wang
Shuang Hao
Yaoqi Jia
Yiming Zhang
Kai Chen
Zaifeng Zhang
2019
conf/ndss
MBeacon: Privacy-Preserving Beacons for DNA Methylation Data.
Inken Hagestedt
Yang Zhang
Mathias Humbert
Pascal Berrang
Haixu Tang
XiaoFeng Wang
Michael Backes
2019
conf/ndss
Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs.
Eihal Alowaisheq
Peng Wang
Sumayah A. Alrwais
Xiaojing Liao
XiaoFeng Wang
Tasneem Alowaisheq
Xianghang Mi
Siyuan Tang
Baojun Liu
2018
conf/ccs
Leveraging Hardware Transactional Memory for Cache Side-Channel Defenses.
Sanchuan Chen
Fangfei Liu
Zeyu Mi
Yinqian Zhang
Ruby B. Lee
Haibo Chen
XiaoFeng Wang
2018
conf/uss
Reading Thieves' Cant: Automatically Identifying and Understanding Dark Jargons from Cybercrime Marketplaces.
Kan Yuan
Haoran Lu
Xiaojing Liao
XiaoFeng Wang
2018
conf/sp
Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races.
Guoxing Chen
Wenhao Wang
Tianyu Chen
Sanchuan Chen
Yinqian Zhang
XiaoFeng Wang
Ten-Hwang Lai
Dongdai Lin
2018
conf/ndss
Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations.
Peng Wang
Xianghang Mi
Xiaojing Liao
XiaoFeng Wang
Kan Yuan
Feng Qian
Raheem A. Beyah
2018
conf/ndss
IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.
Jiongyi Chen
Wenrui Diao
Qingchuan Zhao
Chaoshun Zuo
Zhiqiang Lin
XiaoFeng Wang
Wing Cheong Lau
Menghan Sun
Ronghai Yang
Kehuan Zhang
2018
conf/ndss
Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation.
Yue Duan
Mu Zhang
Abhishek Vasisht Bhaskar
Heng Yin
Xiaorui Pan
Tongxin Li
Xueqiang Wang
XiaoFeng Wang
2018
conf/ndss
OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS.
Xiaokuan Zhang
Xueqiang Wang
Xiaolong Bai
Yinqian Zhang
XiaoFeng Wang
2017
conf/ccs
SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits.
Wei You
Peiyuan Zong
Kai Chen
XiaoFeng Wang
Xiaojing Liao
Pan Bian
Bin Liang
2017
conf/ccs
Binary Code Retrofitting and Hardening Using SGX.
Shuai Wang
Wenhao Wang
Qinkun Bao
Pei Wang
XiaoFeng Wang
Dinghao Wu
2017
conf/ccs
Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews.
Tongxin Li
Xueqiang Wang
Mingming Zha
Kai Chen
XiaoFeng Wang
Luyi Xing
Xiaolong Bai
Nan Zhang
Xinhui Han
2017
conf/ccs
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX.
Wenhao Wang
Guoxing Chen
Xiaorui Pan
Yinqian Zhang
XiaoFeng Wang
Vincent Bindschaedler
Haixu Tang
Carl A. Gunter
2017
conf/ccs
Mass Discovery of Android Traffic Imprints through Instantiated Partial Execution.
Yi Chen
Wei You
Yeonjoon Lee
Kai Chen
XiaoFeng Wang
Wei Zou
2017
conf/uss
SmartAuth: User-Centered Authorization for the Internet of Things.
Yuan Tian
Nan Zhang
Yue-Hsun Lin
XiaoFeng Wang
Blase Ur
Xianzheng Guo
Patrick Tague
2017
conf/uss
Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment.
Xiaolong Bai
Zhe Zhou
XiaoFeng Wang
Zhou Li
Xianghang Mi
Nan Zhang
Tongxin Li
Shi-Min Hu
Kehuan Zhang
2017
conf/ndss
Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps.
Xiaorui Pan
Xueqiang Wang
Yue Duan
XiaoFeng Wang
Heng Yin
2017
conf/dsn
Ghost Installer in the Shadow: Security Analysis of App Installation on Android.
Yeonjoon Lee
Tongxin Li
Nan Zhang
Soteris Demetriou
Mingming Zha
XiaoFeng Wang
Kai Chen
Xiao-yong Zhou
Xinhui Han
Michael Grace
2017
conf/wisec
HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps.
Soteris Demetriou
Nan Zhang
Yeonjoon Lee
XiaoFeng Wang
Carl A. Gunter
Xiao-yong Zhou
Michael Grace
2016
conf/ccs
Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service.
Xiaojing Liao
Sumayah A. Alrwais
Kan Yuan
Luyi Xing
XiaoFeng Wang
Shuang Hao
Raheem A. Beyah
2016
conf/ccs
Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence.
Xiaojing Liao
Kan Yuan
XiaoFeng Wang
Zhou Li
Luyi Xing
Raheem A. Beyah
2016
conf/sp
Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search.
Xiaojing Liao
Kan Yuan
XiaoFeng Wang
Zhongyu Pei
Hao Yang
Jianjun Chen
Hai-Xin Duan
Kun Du
Eihal Alowaisheq
Sumayah A. Alrwais
Luyi Xing
Raheem A. Beyah
2016
conf/sp
Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf.
Xiaolong Bai
Luyi Xing
Nan Zhang
XiaoFeng Wang
Xiaojing Liao
Tongxin Li
Shi-Min Hu
2016
conf/sp
Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS.
Kai Chen
Xueqiang Wang
Yi Chen
Peng Wang
Yeonjoon Lee
XiaoFeng Wang
Bin Ma
Aohui Wang
Yingjun Zhang
Wei Zou
2016
conf/acsac
Catching predators at watering holes: finding and understanding strategically compromised websites.
Sumayah A. Alrwais
Kan Yuan
Eihal Alowaisheq
Xiaojing Liao
Alina Oprea
XiaoFeng Wang
Zhou Li
2015
conf/ccs
Efficient Genome-Wide, Privacy-Preserving Similar Patient Query based on Private Edit Distance.
Xiao Shaun Wang
Yan Huang
Yongan Zhao
Haixu Tang
XiaoFeng Wang
Diyue Bu
2015
conf/ccs
Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References.
Yousra Aafer
Nan Zhang
Zhongwen Zhang
Xiao Zhang
Kai Chen
XiaoFeng Wang
Xiao-yong Zhou
Wenliang Du
Michael Grace
2015
conf/ccs
Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS.
Luyi Xing
Xiaolong Bai
Tongxin Li
XiaoFeng Wang
Kai Chen
Xiaojing Liao
Shi-Min Hu
Xinhui Han
2015
conf/ccs
Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging Integrations.
Yangyi Chen
Tongxin Li
XiaoFeng Wang
Kai Chen
Xinhui Han
2015
conf/ccs
Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward.
Vincent Bindschaedler
Muhammad Naveed
Xiaorui Pan
XiaoFeng Wang
Yan Huang
2015
conf/uss
Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale.
Kai Chen
Peng Wang
Yeonjoon Lee
XiaoFeng Wang
Nan Zhang
Heqing Huang
Wei Zou
Peng Liu
2015
conf/sp
Leave Me Alone: App-Level Protection against Runtime Information Gathering on Android.
Nan Zhang
Kan Yuan
Muhammad Naveed
Xiao-yong Zhou
XiaoFeng Wang
2015
conf/ndss
What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources.
Soteris Demetriou
Xiao-yong Zhou
Muhammad Naveed
Yeonjoon Lee
Kan Yuan
XiaoFeng Wang
Carl A. Gunter
2014
conf/ccs
Controlled Functional Encryption.
Muhammad Naveed
Shashank Agrawal
Manoj Prabhakaran
XiaoFeng Wang
Erman Ayday
Jean-Pierre Hubaux
Carl A. Gunter
2014
conf/ccs
Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services.
Tongxin Li
Xiao-yong Zhou
Luyi Xing
Yeonjoon Lee
Muhammad Naveed
XiaoFeng Wang
Xinhui Han
2014
conf/uss
Understanding the Dark Side of Domain Parking.
Sumayah A. Alrwais
Kan Yuan
Eihal Alowaisheq
Zhou Li
XiaoFeng Wang
2014
conf/sp
Hunting the Red Fox Online: Understanding and Detection of Mass Redirect-Script Injections.
Zhou Li
Sumayah A. Alrwais
XiaoFeng Wang
Eihal Alowaisheq
2014
conf/sp
Upgrading Your Android, Elevating My Malware: Privilege Escalation through Mobile OS Updating.
Luyi Xing
Xiaorui Pan
Rui Wang
Kan Yuan
XiaoFeng Wang
2014
conf/sp
The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations.
Xiao-yong Zhou
Yeonjoon Lee
Nan Zhang
Muhammad Naveed
XiaoFeng Wang
2014
conf/ndss
Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android.
Muhammad Naveed
Xiao-yong Zhou
Soteris Demetriou
XiaoFeng Wang
Carl A. Gunter
2014
conf/ndss
The Tangled Web of Password Reuse.
Anupam Das
Joseph Bonneau
Matthew Caesar
Nikita Borisov
XiaoFeng Wang
2014
conf/ndss
Screenmilker: How to Milk Your Android Screen for Secrets.
Chia-Chi Lin
Hongyang Li
Xiao-yong Zhou
XiaoFeng Wang
2013
conf/ccs
Identity, location, disease and more: inferring your secrets from android public resources.
Xiao-yong Zhou
Soteris Demetriou
Dongjing He
Muhammad Naveed
Xiaorui Pan
XiaoFeng Wang
Carl A. Gunter
Klara Nahrstedt
2013
conf/ccs
Unauthorized origin crossing on mobile platforms: threats and mitigation.
Rui Wang
Luyi Xing
XiaoFeng Wang
Shuo Chen
2013
conf/sp
Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures.
Zhou Li
Sumayah A. Alrwais
Yinglian Xie
Fang Yu
XiaoFeng Wang
2013
conf/ndss
InteGuard: Toward Automatic Protection of Third-Party Web Service Integrations.
Luyi Xing
Yangyi Chen
XiaoFeng Wang
Shuo Chen
2012
conf/ccs
Knowing your enemy: understanding and detecting malicious web advertising.
Zhou Li
Kehuan Zhang
Yinglian Xie
Fang Yu
XiaoFeng Wang
2012
conf/sp
Signing Me onto Your Accounts through Facebook and Google: A Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services.
Rui Wang
Shuo Chen
XiaoFeng Wang
2012
conf/ndss
Large-Scale Privacy-Preserving Mapping of Human Genomic Sequences on Hybrid Clouds.
Yangyi Chen
Bo Peng
XiaoFeng Wang
Haixu Tang
2011
conf/ccs
Sedic: privacy-aware data intensive computing on hybrid clouds.
Kehuan Zhang
Xiao-yong Zhou
Yangyi Chen
XiaoFeng Wang
Yaoping Ruan
2011
conf/fc
Beyond Risk-Based Access Control: Towards Incentive-Based Access Control.
Debin Liu
Ninghui Li
XiaoFeng Wang
L. Jean Camp
2011
conf/sp
How to Shop for Free Online - Security Analysis of Cashier-as-a-Service Based Web Stores.
Rui Wang
Shuo Chen
XiaoFeng Wang
Shaz Qadeer
2011
conf/esorics
To Release or Not to Release: Evaluating Information Leaks in Aggregate Human-Genome Data.
Xiao-yong Zhou
Bo Peng
Yong Fuga Li
Yangyi Chen
Haixu Tang
XiaoFeng Wang
2011
conf/ndss
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones.
Roman Schlegel
Kehuan Zhang
Xiao-yong Zhou
Mehool Intwala
Apu Kapadia
XiaoFeng Wang
2010
conf/ccs
Sidebuster: automated detection and quantification of side-channel leaks in web application development.
Kehuan Zhang
Zhou Li
Rui Wang
XiaoFeng Wang
Shuo Chen
2010
conf/sp
Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow.
Shuo Chen
Rui Wang
XiaoFeng Wang
Kehuan Zhang
2010
conf/dsn
Mash-IF: Practical information-flow control within client-side mashups.
Zhou Li
Kehuan Zhang
XiaoFeng Wang
2010
conf/acsac
FIRM: capability-based inline mediation of Flash behaviors.
Zhou Li
XiaoFeng Wang
2009
conf/ccs
Learning your identity and disease from research papers: information leaks in genome wide association study.
Rui Wang
Yong Fuga Li
XiaoFeng Wang
Haixu Tang
Xiao-yong Zhou
2009
conf/ccs
Privacy-preserving genomic computation through program specialization.
Rui Wang
XiaoFeng Wang
Zhou Li
Haixu Tang
Michael K. Reiter
Zheng Dong
2009
conf/uss
Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems.
Kehuan Zhang
XiaoFeng Wang
2009
conf/uss
Effective and Efficient Malware Detection at the End Host.
Clemens Kolbitsch
Paolo Milani Comparetti
Christopher Kruegel
Engin Kirda
Xiao-yong Zhou
XiaoFeng Wang
2009
conf/fc
Mitigating Inadvertent Insider Threats with Incentives.
Debin Liu
XiaoFeng Wang
L. Jean Camp
2008
conf/ccs
Towards automatic reverse engineering of software security configurations.
Rui Wang
XiaoFeng Wang
Kehuan Zhang
Zhuowei Li
2008
conf/uss
Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software .
Rui Wang
XiaoFeng Wang
Zhuowei Li
2008
conf/ndss
PRECIP: Towards Practical and Retrofittable Confidential Information Protection.
XiaoFeng Wang
Zhuowei Li
Ninghui Li
Jong Youl Choi
2008
conf/dsn
AGIS: Towards automatic generation of infection signatures.
Zhuowei Li
XiaoFeng Wang
Zhenkai Liang
Michael K. Reiter
2006
conf/ccs
Packet vaccine: black-box exploit detection and signature generation.
XiaoFeng Wang
Zhuowei Li
Jun Xu
Michael K. Reiter
Chongkyung Kil
Jong Youl Choi
2006
conf/sp
Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks.
Philippe Golle
XiaoFeng Wang
Markus Jakobsson
Alex Tsow
2005
conf/acns
Building Reliable Mix Networks with Fair Exchange.
Michael K. Reiter
XiaoFeng Wang
Matthew K. Wright
2004
conf/ccs
Fragile mixing.
Michael K. Reiter
XiaoFeng Wang
2004
conf/ccs
Mitigating bandwidth-exhaustion attacks using congestion puzzles.
XiaoFeng Wang
Michael K. Reiter
2003
conf/sp
Defending Against Denial-of-Service Attacks with Puzzle Auction.
XiaoFeng Wang
Michael K. Reiter
Coauthors
Abhishek Vasisht Bhaskar
(1)
Alex Tsow
(1)
Alina Oprea
(1)
Anupam Das
(1)
Aohui Wang
(1)
Apu Kapadia
(1)
Baojun Liu
(3)
Baoxu Liu
(3)
Benshan Mei
(1)
Bin Liang
(2)
Bin Ma
(1)
Bin Yuan
(3)
Blase Ur
(1)
Bo Peng
(2)
Boyan Zhao
(1)
Carl A. Gunter
(7)
Chang Yue
(1)
Chaoshun Zuo
(1)
Chaoyi Lu
(1)
Chenghong Wang
(1)
Chia-Chi Lin
(1)
Chongkyung Kil
(1)
Christopher Kruegel
(1)
Clemens Kolbitsch
(1)
Dan Meng
(3)
Dandan Xu
(3)
Debin Liu
(2)
Deqing Zou
(3)
Di Tang
(7)
Dinghao Wu
(1)
Diyue Bu
(2)
Dongdai Lin
(1)
Dongfang Zhao
(4)
Dongjing He
(1)
Dongruo Zhou
(2)
Eihal Alowaisheq
(7)
Engin Kirda
(1)
Erman Ayday
(1)
Fang Yu
(2)
Fangfei Liu
(1)
Fares Fahad S. Alharbi
(1)
Fatemah Alharbi
(1)
Feng Qian
(4)
Fengchang Yu
(1)
Fnu Suya
(1)
Guanhong Tao
(1)
Guoxing Chen
(2)
Hai Jin
(4)
Hai-Xin Duan
(2)
Haibo Chen
(1)
Haining Wang
(1)
Haixu Tang
(17)
Han Liu
(1)
Hao Yang
(1)
Haobin Hiroki Chen
(2)
Haoran Lu
(4)
Heng Yin
(2)
Heqing Huang
(1)
Hongbo Chen
(4)
Hongliang Tian
(1)
Hongsong Zhu
(1)
Hongyang Li
(1)
Inken Hagestedt
(1)
Jean-Pierre Hubaux
(1)
Jiale Guan
(1)
Jiameng Ying
(1)
Jian Cui
(1)
Jiangfeng Cao
(1)
Jiangshan Zhang
(1)
Jianjun Chen
(1)
Jianjun Huang
(1)
Jianliang Wu
(1)
Jianping Zhu
(1)
Jiaqi Chen
(2)
Jiatao Cheng
(1)
Jiawei Liu
(1)
Jice Wang
(1)
Jinwei Dong
(1)
Jiongyi Chen
(1)
John Mitchell
(1)
Jong Youl Choi
(2)
Joseph Bonneau
(1)
Jun Xu
(1)
Kai Chen
(18)
Kai Li
(2)
Kai Yang
(1)
Kaimin Zheng
(1)
Kan Yuan
(12)
Kang Li
(1)
Kehuan Zhang
(12)
Klara Nahrstedt
(1)
Kun Du
(1)
Kwangwuk Lee
(1)
L. Jean Camp
(2)
Lei Wang
(1)
Limin Sun
(2)
Linke Song
(2)
Lixin Zhang
(1)
Liya Su
(1)
Longxing Li
(1)
Luyi Xing
(23)
Manoj Prabhakaran
(1)
Markus Jakobsson
(1)
Mathias Humbert
(1)
Matthew Caesar
(1)
Matthew K. Wright
(1)
Mehool Intwala
(1)
Menghan Sun
(2)
Miaokun Chen
(1)
Michael Backes
(1)
Michael Grace
(3)
Michael K. Reiter
(7)
Mingming Zha
(8)
Mingshen Sun
(2)
Mu Zhang
(1)
Muhammad Naveed
(8)
Nan Zhang
(12)
Nicholas Deily
(1)
Nicolás Serrano
(1)
Nikita Borisov
(1)
Ning Zhang
(2)
Ninghui Li
(2)
Pan Bian
(1)
Paolo Milani Comparetti
(1)
Pascal Berrang
(1)
Patrick Tague
(1)
Pei Wang
(1)
Peiwei Hu
(1)
Peiyuan Zong
(2)
Peng Liu
(1)
Peng Wang
(6)
Peyton Crnjak
(1)
Philippe Golle
(1)
Qiang Li
(1)
Qianqian Zhao
(1)
Qingchuan Zhao
(1)
Qinkun Bao
(1)
Raheem A. Beyah
(4)
Roman Schlegel
(1)
Ronghai Yang
(1)
Ruby B. Lee
(1)
Rui Hou
(3)
Rui Wang
(10)
Rui Zhu
(4)
Ruishi Li
(1)
Ruoyu Wu
(1)
Sanchuan Chen
(2)
Shangru Zhao
(1)
Shashank Agrawal
(1)
Shaz Qadeer
(1)
Shengzhi Zhang
(1)
Shi-Min Hu
(3)
Shijun Zhao
(1)
Shiqing Ma
(2)
Shixuan Zhai
(1)
Shoumeng Yan
(2)
Shuai Wang
(1)
Shuang Hao
(2)
Shuang Liu
(1)
Shuo Chen
(6)
Siyuan Tang
(7)
Soteris Demetriou
(5)
Sumayah A. Alrwais
(9)
Susanta Nanda
(2)
Tao Ju
(1)
Tao Lv
(1)
Tasneem Alowaisheq
(1)
Ten-Hwang Lai
(1)
Tianyu Chen
(1)
Tongxin Li
(9)
Uday Jammalamadaka
(1)
Vincent Bindschaedler
(3)
Wanning Ding
(1)
Wei He
(1)
Wei Lu
(1)
Wei Song
(1)
Wei You
(3)
Wei Zou
(5)
Weijie Liu
(2)
Wenhao Wang
(8)
Wenliang Du
(1)
Wenrui Diao
(1)
William Yeoh
(1)
Wing Cheong Lau
(1)
Xianghang Mi
(9)
Xianghong Liu
(1)
Xiangyu Du
(1)
Xiangyu Zhang
(1)
Xianzheng Guo
(1)
Xiao Shaun Wang
(1)
Xiao Zhang
(1)
Xiao-yong Zhou
(15)
XiaoFeng Wang
(129)
Xiaojing Liao
(28)
Xiaokuan Zhang
(1)
Xiaolong Bai
(5)
Xiaorui Pan
(6)
Xiaozhong Liu
(5)
Xiapu Luo
(1)
Xinhui Han
(5)
Xinyue Shen
(1)
Xuan Feng
(5)
Xuejing Yuan
(1)
Xueqiang Wang
(14)
Yan Huang
(2)
Yan Jia
(4)
Yang Zhang
(1)
Yangyi Chen
(5)
Yanzhi Dou
(1)
Yaoping Ruan
(1)
Yaoqi Jia
(1)
Yeonjoon Lee
(9)
Yepeng Yao
(3)
Yevgeniy Vorobeychik
(1)
Yi Chen
(10)
Yi Yang
(1)
Yibo Wang
(1)
Yier Jin
(1)
Yifan Zhang
(5)
Yijing Liu
(1)
Yiming Zhang
(1)
Ying Li
(1)
Ying Liu
(2)
Yingjun Zhang
(1)
Yinglian Xie
(2)
Yinqian Zhang
(4)
Yong Fuga Li
(2)
Yongan Zhao
(1)
Yousra Aafer
(1)
Yuan Tian
(3)
Yuanhaur Chang
(1)
Yue Duan
(2)
Yue Qin
(2)
Yue Xiao
(2)
Yue Zhao
(1)
Yue-Hsun Lin
(1)
Yuhang Mao
(1)
Yuhong Nan
(4)
Yuhui Hong
(1)
Yuhui Zhang
(1)
Yunhui Long
(1)
Yuqing Zhang
(4)
Yuqiong Sun
(2)
Yuxuan Chen
(1)
Yuxuan Zhou
(1)
Yuyang Gong
(1)
Yuzhe Richard Tang
(1)
Yuzhe Tang
(1)
Zaifeng Zhang
(1)
Zeyu Mi
(1)
Zhaofeng Chen
(1)
Zhaojie Hu
(1)
Zhaoyang Geng
(1)
Zhe Zhou
(1)
Zheng Dong
(1)
Zhengyi Li
(2)
Zhenkai Liang
(1)
Zhi Li
(2)
Zhihao Wang
(1)
Zhikun Zhang
(3)
Zhiqiang Lin
(1)
Zhiyuan Yu
(2)
Zhongpu Wang
(1)
Zhongwen Zhang
(1)
Zhongyu Pei
(1)
Zhou Li
(13)
Zhuo Chen
(1)
Zhuowei Li
(5)
Zihao Wang
(7)
Zilong Lin
(4)
Zixuan Pang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to