What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Chaoshun Zuo
Google Scholar
22
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/compsec
CSFuzzer: A grey-box fuzzer for network protocol using context-aware state feedback.
Xiangpu Song
Yingpei Zeng
Jianliang Wu
Hao Li
Chaoshun Zuo
Qingchuan Zhao
Shanqing Guo
2025
conf/uss
AUTOVR: Automated UI Exploration for Detecting Sensitive Data Flow Exposures in Virtual Reality Apps.
John Y. Kim
Chaoshun Zuo
Yanjie Zhao
Zhiqiang Lin
2025
conf/uss
MBFuzzer: A Multi-Party Protocol Fuzzer for MQTT Brokers.
Xiangpu Song
Jianliang Wu
Yingpei Zeng
Hao Pan
Chaoshun Zuo
Qingchuan Zhao
Shanqing Guo
2025
conf/uss
A Thorough Security Analysis of BLE Proximity Tracking Protocols.
Xiaofeng Liu
Chaoshun Zuo
Qinsheng Hou
Pengcheng Ren
Jianliang Wu
Qingchuan Zhao
Shanqing Guo
2023
conf/uss
A Peek into the Metaverse: Detecting 3D Model Clones in Mobile Games.
Chaoshun Zuo
Chao Wang
Zhiqiang Lin
2023
conf/sp
Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels.
Tao Ni
Xiaokuan Zhang
Chaoshun Zuo
Jianfeng Li
Zhenyu Yan
Wubing Wang
Weitao Xu
Xiapu Luo
Qingchuan Zhao
2023
conf/asiaccs
Uncovering Vulnerabilities of Bluetooth Low Energy IoT from Companion Mobile Apps with Ble-Guuide.
Pallavi Sivakumaran
Chaoshun Zuo
Zhiqiang Lin
Jorge Blasco
2022
conf/ccs
Detecting and Measuring Misconfigured Manifests in Android Apps.
Yuqing Yang
Mohamed Elsabagh
Chaoshun Zuo
Ryan Johnson
Angelos Stavrou
Zhiqiang Lin
2022
conf/uss
Playing Without Paying: Detecting Vulnerable Payment Verification in Native Binaries of Unity Mobile Games.
Chaoshun Zuo
Zhiqiang Lin
2022
conf/asiaccs
PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals.
Qingchuan Zhao
Chaoshun Zuo
Jorge Blasco
Zhiqiang Lin
2020
conf/uss
FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware.
Mohamed Elsabagh
Ryan Johnson
Angelos Stavrou
Chaoshun Zuo
Qingchuan Zhao
Zhiqiang Lin
2020
conf/sp
Automatic Uncovering of Hidden Behaviors From Input Validation in Mobile Apps.
Qingchuan Zhao
Chaoshun Zuo
Brendan Dolan-Gavitt
Giancarlo Pellegrino
Zhiqiang Lin
2020
conf/wisec
An empirical study of potentially malicious third-party libraries in Android apps.
Zicheng Zhang
Wenrui Diao
Chengyu Hu
Shanqing Guo
Chaoshun Zuo
Li Li
2019
conf/ccs
Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps.
Chaoshun Zuo
Haohuang Wen
Zhiqiang Lin
Yinqian Zhang
2019
conf/uss
The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends.
Omar Alrawi
Chaoshun Zuo
Ruian Duan
Ranjita Pai Kasturi
Zhiqiang Lin
Brendan Saltaformaggio
2019
conf/sp
Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps.
Chaoshun Zuo
Zhiqiang Lin
Yinqian Zhang
2019
conf/ndss
Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services.
Qingchuan Zhao
Chaoshun Zuo
Giancarlo Pellegrino
Zhiqiang Lin
2019
conf/dsn
Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users.
Jiongyi Chen
Chaoshun Zuo
Wenrui Diao
Shuaike Dong
Qingchuan Zhao
Menghan Sun
Zhiqiang Lin
Yinqian Zhang
Kehuan Zhang
2018
conf/ndss
IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.
Jiongyi Chen
Wenrui Diao
Qingchuan Zhao
Chaoshun Zuo
Zhiqiang Lin
XiaoFeng Wang
Wing Cheong Lau
Menghan Sun
Ronghai Yang
Kehuan Zhang
2017
conf/ccs
AUTHSCOPE: Towards Automatic Discovery of Vulnerable Authorizations in Online Services.
Chaoshun Zuo
Qingchuan Zhao
Zhiqiang Lin
2016
conf/ndss
Automatic Forgery of Cryptographically Consistent Messages to Identify Security Vulnerabilities in Mobile Services.
Chaoshun Zuo
Wubing Wang
Zhiqiang Lin
Rui Wang
2015
conf/ccs
Automatically Detecting SSL Error-Handling Vulnerabilities in Hybrid Mobile Web Apps.
Chaoshun Zuo
Jianliang Wu
Shanqing Guo
Coauthors
Angelos Stavrou
(2)
Brendan Dolan-Gavitt
(1)
Brendan Saltaformaggio
(1)
Chao Wang
(1)
Chaoshun Zuo
(22)
Chengyu Hu
(1)
Giancarlo Pellegrino
(2)
Hao Li
(1)
Hao Pan
(1)
Haohuang Wen
(1)
Jianfeng Li
(1)
Jianliang Wu
(4)
Jiongyi Chen
(2)
John Y. Kim
(1)
Jorge Blasco
(2)
Kehuan Zhang
(2)
Li Li
(1)
Menghan Sun
(2)
Mohamed Elsabagh
(2)
Omar Alrawi
(1)
Pallavi Sivakumaran
(1)
Pengcheng Ren
(1)
Qingchuan Zhao
(11)
Qinsheng Hou
(1)
Ranjita Pai Kasturi
(1)
Ronghai Yang
(1)
Rui Wang
(1)
Ruian Duan
(1)
Ryan Johnson
(2)
Shanqing Guo
(5)
Shuaike Dong
(1)
Tao Ni
(1)
Weitao Xu
(1)
Wenrui Diao
(3)
Wing Cheong Lau
(1)
Wubing Wang
(2)
Xiangpu Song
(2)
Xiaofeng Liu
(1)
XiaoFeng Wang
(1)
Xiaokuan Zhang
(1)
Xiapu Luo
(1)
Yanjie Zhao
(1)
Yingpei Zeng
(2)
Yinqian Zhang
(3)
Yuqing Yang
(1)
Zhenyu Yan
(1)
Zhiqiang Lin
(16)
Zicheng Zhang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to