default search action
XiaoFeng Wang 0001
Person information
- affiliation: Indiana University Bloomington, School of Informatics and Computing, IN, USA
Other persons with the same name
- Xiaofeng Wang (aka: Xiao-Feng Wang) — disambiguation page
- Xiaofeng Wang 0001 — Free University of Bozen-Bolzano, Faculty of Computer Science, Italy
- Xiaofeng Wang 0002 — National University of Defense Technology, School of Computer Science, Changsha, China
- Xiaofeng Wang 0003 — Bohai University, School of Mathematics and Physics, Jinzhou, China (and 1 more)
- Xiaofeng Wang 0004 — Shanghai Jiao Tong University, School of Eectronic Information and Electrical Engineering, China
- Xiaofeng Wang 0005 — Louisiana Tech University, Department of Mathematics, Ruston, LA, USA (and 2 more)
- Xiaofeng Wang 0007 — University of South Carolina, Department of Electrical Engineering, Columbia, SC, USA (and 2 more)
- Xiaofeng Wang 0008 — Ryerson University, Department of Electrical and Computer Engineering, Toronto, ON, Canada
- Xiaofeng Wang 0009 (aka: Xiao-Feng Wang 0009) — Hefei University, Big Data Technology Application for Urban Infrastructure, School of Artificial Intelligence and Big Data, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Dandan Xu, Kai Chen, Miaoqian Lin, Chaoyang Lin, Xiaofeng Wang:
AutoPwn: Artifact-Assisted Heap Exploit Generation for CTF PWN Competitions. IEEE Trans. Inf. Forensics Secur. 19: 293-306 (2024) - [c160]XiaoFeng Wang:
Security Of AI, By AI and For AI: Charting New Territories in AI-Centered Cybersecurity Research. AsiaCCS 2024 - [c159]Mingming Zha, Zilong Lin, Siyuan Tang, Xiaojing Liao, Yuhong Nan, XiaoFeng Wang:
Understanding Cross-Platform Referral Traffic for Illicit Drug Promotion. CCS 2024: 2132-2146 - [c158]Siyuan Tang, Eihal Alowaisheq, Xianghang Mi, Yi Chen, XiaoFeng Wang, Yanzhi Dou:
Stealthy Peers: Understanding Security and Privacy Risks of Peer-Assisted Video Streaming. DSN 2024: 324-337 - [c157]Yuhui Zhang, Lutan Zhao, Cheng Che, XiaoFeng Wang, Dan Meng, Rui Hou:
SpecFL: An Efficient Speculative Federated Learning System for Tree-based Model Training. HPCA 2024: 817-831 - [c156]Yuehan Zhang, Yongqiang Ma, Jiawei Liu, Xiaozhong Liu, XiaoFeng Wang, Wei Lu:
Detection Vs. Anti-detection: Is Text Generated by AI Detectable? iConference (1) 2024: 209-222 - [c155]Tu Le, Dongfang Zhao, Zihao Wang, XiaoFeng Wang, Yuan Tian:
Alexa, is the skill always safe? Uncover Lenient Skill Vetting Process and Protect User Privacy at Run Time. ICSE (SEIS) 2024: 34-45 - [c154]Rui Zhu, Di Tang, Siyuan Tang, Zihao Wang, Guanhong Tao, Shiqing Ma, XiaoFeng Wang, Haixu Tang:
Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering. NDSS 2024 - [c153]Zilong Lin, Zhengyi Li, Xiaojing Liao, XiaoFeng Wang, Xiaozhong Liu:
MAWSEO: Adversarial Wiki Search Poisoning for Illicit Online Promotion. SP 2024: 388-406 - [c152]Yifan Zhang, Zhaojie Hu, Xueqiang Wang, Yuhui Hong, Yuhong Nan, XiaoFeng Wang, Jiatao Cheng, Luyi Xing:
Navigating the Privacy Compliance Maze: Understanding Risks with Privacy-Configurable Mobile SDKs. USENIX Security Symposium 2024 - [c151]Zilong Lin, Jian Cui, Xiaojing Liao, XiaoFeng Wang:
Malla: Demystifying Real-world Large Language Model Integrated Malicious Services. USENIX Security Symposium 2024 - [c150]Huanyao Rong, Wei You, Xiaofeng Wang, Tianhao Mao:
Toward Unbiased Multiple-Target Fuzzing with Path Diversity. USENIX Security Symposium 2024 - [c149]Zihao Wang, Di Tang, XiaoFeng Wang, Wei He, Zhaoyang Geng, Wenhao Wang:
Tossing in the Dark: Practical Bit-Flipping on Gray-box Deep Neural Networks for Runtime Trojan Injection. USENIX Security Symposium 2024 - [c148]Zihao Wang, Rui Zhu, Dongruo Zhou, Zhikun Zhang, John Mitchell, Haixu Tang, XiaoFeng Wang:
DPAdapter: Improving Differentially Private Deep Learning through Noise Tolerance Pre-training. USENIX Security Symposium 2024 - [c147]Dandan Xu, Di Tang, Yi Chen, XiaoFeng Wang, Kai Chen, Haixu Tang, Longxing Li:
Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples. USENIX Security Symposium 2024 - [i42]Zilong Lin, Jian Cui, Xiaojing Liao, XiaoFeng Wang:
Malla: Demystifying Real-world Large Language Model Integrated Malicious Services. CoRR abs/2401.03315 (2024) - [i41]Jiaqi Chen, Yibo Wang, Yuxuan Zhou, Wanning Ding, Yuzhe Tang, Xiaofeng Wang, Kai Li:
Understanding the Security Risks of Decentralized Exchanges by Uncovering Unfair Trades in the Wild. CoRR abs/2401.11547 (2024) - [i40]Wenhao Wang, Linke Song, Benshan Mei, Shuang Liu, Shijun Zhao, Shoumeng Yan, XiaoFeng Wang, Dan Meng, Rui Hou:
NestedSGX: Bootstrapping Trust to Enclaves within Confidential VMs. CoRR abs/2402.11438 (2024) - [i39]Ronghong Huang, Dongfang Zhao, Xianghang Mi, XiaoFeng Wang:
Shining Light into the Tunnel: Understanding and Classifying Network Traffic of Residential Proxies. CoRR abs/2404.10610 (2024) - [i38]Hongbo Chen, Yifan Zhang, Xing Han, Huanyao Rong, Yuheng Zhang, Tianhao Mao, Hang Zhang, XiaoFeng Wang, Luyi Xing, Xun Chen:
WitheredLeaf: Finding Entity-Inconsistency Bugs with LLMs. CoRR abs/2405.01668 (2024) - [i37]Huanyao Rong, Yue Duan, Hang Zhang, XiaoFeng Wang, Hongbo Chen, Shengchen Duan, Shen Wang:
Disassembling Obfuscated Executables with LLM. CoRR abs/2407.08924 (2024) - [i36]Hongbo Chen, Quan Zhou, Sen Yang, Xing Han, Fan Zhang, Danfeng Zhang, XiaoFeng Wang:
AGORA: Open More and Trust Less in Binary Verification Service. CoRR abs/2407.15062 (2024) - [i35]Jinhong Yu, Yi Chen, Di Tang, Xiaozhong Liu, XiaoFeng Wang, Chen Wu, Haixu Tang:
LLM-Enhanced Software Patch Localization. CoRR abs/2409.06816 (2024) - [i34]Linke Song, Zixuan Pang, Wenhao Wang, Zihao Wang, XiaoFeng Wang, Hongbo Chen, Wei Song, Yier Jin, Dan Meng, Rui Hou:
The Early Bird Catches the Leak: Unveiling Timing Side Channels in LLM Serving Systems. CoRR abs/2409.20002 (2024) - 2023
- [j28]Wenhao Wang, Weijie Liu, Hongbo Chen, XiaoFeng Wang, Hongliang Tian, Dongdai Lin:
Trust Beyond Border: Lightweight, Verifiable User Isolation for Protecting In-Enclave Services. IEEE Trans. Dependable Secur. Comput. 20(1): 522-538 (2023) - [j27]Zhiwei Wang, Peinan Li, Rui Hou, Zhihao Li, Jiangfeng Cao, XiaoFeng Wang, Dan Meng:
HE-Booster: An Efficient Polynomial Arithmetic Acceleration on GPUs for Fully Homomorphic Encryption. IEEE Trans. Parallel Distributed Syst. 34(4): 1067-1081 (2023) - [c146]Zihao Wang, Jiale Guan, XiaoFeng Wang, Wenhao Wang, Luyi Xing, Fares Fahad S. Alharbi:
The Danger of Minimum Exposures: Understanding Cross-App Information Leaks on iOS through Multi-Side-Channel Learning. CCS 2023: 281-295 - [c145]Zhi Li, Weijie Liu, XiaoFeng Wang, Bin Yuan, Hongliang Tian, Hai Jin, Shoumeng Yan:
Lost along the Way: Understanding and Mitigating Path-Misresolution Threats to Container Isolation. CCS 2023: 3063-3077 - [c144]Jiaqi Chen, Yibo Wang, Yuxuan Zhou, Wanning Ding, Yuzhe Tang, XiaoFeng Wang, Kai Li:
Understanding the Security Risks of Decentralized Exchanges by Uncovering Unfair Trades in the Wild. EuroS&P 2023: 332-351 - [c143]Ting Chen, Zihao Li, Xiapu Luo, Xiaofeng Wang, Ting Wang, Zheyuan He, Kezhao Fang, Yufei Zhang, Hang Zhu, Hongwei Li, Yan Cheng, Xiaosong Zhang:
Poster: SigRec - Automatic Recovery of Function Signatures in Smart Contracts. ICDCS 2023: 1065-1066 - [c142]Rui Zhu, Di Tang, Siyuan Tang, Xiaofeng Wang, Haixu Tang:
Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models. SP 2023: 1-19 - [c141]Zhiyuan Yu, Yuanhaur Chang, Shixuan Zhai, Nicholas Deily, Tao Ju, XiaoFeng Wang, Uday Jammalamadaka, Ning Zhang:
XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing Tomography. USENIX Security Symposium 2023: 2815-2832 - [c140]Xueqiang Wang, Yifan Zhang, XiaoFeng Wang, Yan Jia, Luyi Xing:
Union under Duress: Understanding Hazards of Duplicate Resource Mismediation in Android Software Supply Chain. USENIX Security Symposium 2023: 3403-3420 - [c139]Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, Baoxu Liu:
Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning. USENIX Security Symposium 2023: 3529-3545 - [c138]Hongbo Chen, Haobin Hiroki Chen, Mingshen Sun, Kang Li, Zhaofeng Chen, XiaoFeng Wang:
A Verified Confidential Computing as a Service Framework for Privacy Preservation. USENIX Security Symposium 2023: 4733-4750 - [c137]Xueqiang Wang, Yuqiong Sun, Susanta Nanda, XiaoFeng Wang:
Credit Karma: Understanding Security Implications of Exposed Cloud Services through Automated Capability Inference. USENIX Security Symposium 2023: 6007-6024 - [c136]Yuhong Nan, Xueqiang Wang, Luyi Xing, Xiaojing Liao, Ruoyu Wu, Jianliang Wu, Yifan Zhang, XiaoFeng Wang:
Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps. USENIX Security Symposium 2023: 6665-6682 - [e8]Mehdi Tibouchi, Xiaofeng Wang:
Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part I. Lecture Notes in Computer Science 13905, Springer 2023, ISBN 978-3-031-33487-0 [contents] - [e7]Mehdi Tibouchi, Xiaofeng Wang:
Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part II. Lecture Notes in Computer Science 13906, Springer 2023, ISBN 978-3-031-33490-0 [contents] - [i33]Rui Zhu, Di Tang, Siyuan Tang, Guanhong Tao, Shiqing Ma, XiaoFeng Wang, Haixu Tang:
Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering. CoRR abs/2301.12318 (2023) - [i32]Zilong Lin, Zhengyi Li, Xiaojing Liao, XiaoFeng Wang, Xiaozhong Liu:
MAWSEO: Adversarial Wiki Search Poisoning for Illicit Online Promotion. CoRR abs/2304.11300 (2023) - [i31]Ting Chen, Zihao Li, Xiapu Luo, Xiaofeng Wang, Ting Wang, Zheyuan He, Kezhao Fang, Yufei Zhang, Hang Zhu, Hongwei Li, Yan Cheng, Xiaosong Zhang:
SigRec: Automatic Recovery of Function Signatures in Smart Contracts. CoRR abs/2305.07067 (2023) - [i30]Huanyao Rong, Wei You, XiaoFeng Wang, Tianhao Mao:
Toward Unbiased Multiple-Target Fuzzing with Path Diversity. CoRR abs/2310.12419 (2023) - [i29]Xiaoyi Chen, Siyuan Tang, Rui Zhu, Shijun Yan, Lei Jin, Zihao Wang, Liya Su, XiaoFeng Wang, Haixu Tang:
The Janus Interface: How Fine-Tuning in Large Language Models Amplifies the Privacy Risks. CoRR abs/2310.15469 (2023) - [i28]Ting Chen, Zihao Li, Xiapu Luo, Xiaofeng Wang, Ting Wang, Zheyuan He, Kezhao Fang, Yufei Zhang, Hang Zhu, Hongwei Li, Yan Cheng, Xiaosong Zhang:
SigRec: Automatic Recovery of Function Signatures in Smart Contracts. IACR Cryptol. ePrint Arch. 2023: 672 (2023) - 2022
- [j26]Tsung-Ting Kuo, Xiaoqian Jiang, Haixu Tang, XiaoFeng Wang, Arif Ozgun Harmanci, Miran Kim, Kai W. Post, Diyue Bu, Tyler Bath, Jihoon Kim, Weijie Liu, Hongbo Chen, Lucila Ohno-Machado:
The evolving privacy and security concerns for genomic data analysis and sharing as observed from the iDASH competition. J. Am. Medical Informatics Assoc. 29(12): 2182-2190 (2022) - [j25]Yuxuan Chen, Jiangshan Zhang, Xuejing Yuan, Shengzhi Zhang, Kai Chen, Xiaofeng Wang, Shanqing Guo:
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems. ACM Trans. Priv. Secur. 25(3): 17:1-17:31 (2022) - [j24]Ting Chen, Zihao Li, Xiapu Luo, Xiaofeng Wang, Ting Wang, Zheyuan He, Kezhao Fang, Yufei Zhang, Hang Zhu, Hongwei Li, Yan Cheng, Xiaosong Zhang:
SigRec: Automatic Recovery of Function Signatures in Smart Contracts. IEEE Trans. Software Eng. 48(8): 3066-3086 (2022) - [c135]Han Liu, Zhiyuan Yu, Mingming Zha, XiaoFeng Wang, William Yeoh, Yevgeniy Vorobeychik, Ning Zhang:
When Evil Calls: Targeted Adversarial Voice over IP Network. CCS 2022: 2009-2023 - [c134]Jiawei Liu, Yangyang Kang, Di Tang, Kaisong Song, Changlong Sun, Xiaofeng Wang, Wei Lu, Xiaozhong Liu:
Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models. CCS 2022: 2025-2039 - [c133]Siyuan Tang, Xianghang Mi, Ying Li, XiaoFeng Wang, Kai Chen:
Clues in Tweets: Twitter-Guided Discovery and Analysis of SMS Spam. CCS 2022: 2751-2764 - [c132]Peng Wang, Zilong Lin, Xiaojing Liao, XiaoFeng Wang:
Demystifying Local Business Search Poisoning for Illicit Drug Promotion. NDSS 2022 - [c131]Mingming Zha, Jice Wang, Yuhong Nan, Xiaofeng Wang, Yuqing Zhang, Zelin Yang:
Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems. NDSS 2022 - [c130]Zhi Li, Weijie Liu, Hongbo Chen, XiaoFeng Wang, Xiaojing Liao, Luyi Xing, Mingming Zha, Hai Jin, Deqing Zou:
Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms. SP 2022: 2397-2412 - [c129]Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, Dongfang Zhao:
Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change Requests. USENIX Security Symposium 2022: 17-34 - [i27]Siyuan Tang, Xianghang Mi, Ying Li, XiaoFeng Wang, Kai Chen:
Clues in Tweets: Twitter-Guided Discovery and Analysis of SMS Spam. CoRR abs/2204.01233 (2022) - [i26]Jiawei Liu, Yangyang Kang, Di Tang, Kaisong Song, Changlong Sun, Xiaofeng Wang, Wei Lu, Xiaozhong Liu:
Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models. CoRR abs/2209.06506 (2022) - [i25]Di Tang, Rui Zhu, XiaoFeng Wang, Haixu Tang, Yi Chen:
Understanding Impacts of Task Similarity on Backdoor Attack and Detection. CoRR abs/2210.06509 (2022) - [i24]Siyuan Tang, Eihal Alowaisheq, Xianghang Mi, Yi Chen, XiaoFeng Wang, Yanzhi Dou:
Stealthy Peers: Understanding Security Risks of WebRTC-Based Peer-Assisted Video Streaming. CoRR abs/2212.02740 (2022) - [i23]Rui Zhu, Di Tang, Siyuan Tang, XiaoFeng Wang, Haixu Tang:
Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models. CoRR abs/2212.04687 (2022) - 2021
- [j23]Diyue Bu, XiaoFeng Wang, Haixu Tang:
Haplotype-based membership inference from summary genomic data. Bioinform. 37(Supplement): 161-168 (2021) - [j22]Bin Liang, Hongcheng Li, Miaoqiang Su, Xirong Li, Wenchang Shi, Xiaofeng Wang:
Detecting Adversarial Image Examples in Deep Neural Networks with Adaptive Noise Reduction. IEEE Trans. Dependable Secur. Comput. 18(1): 72-85 (2021) - [j21]Yeonjoon Lee, Xueqiang Wang, Xiaojing Liao, XiaoFeng Wang:
Understanding Illicit UI in iOS Apps Through Hidden UI Analysis. IEEE Trans. Dependable Secur. Comput. 18(5): 2390-2402 (2021) - [c128]Chathura Widanage, Weijie Liu, Jiayu Li, Hongbo Chen, XiaoFeng Wang, Haixu Tang, Judy Fox:
HySec-Flow: Privacy-Preserving Genomic Computing with SGX-based Big-Data Analytics Framework. CLOUD 2021: 733-743 - [c127]Yan Jia, Bin Yuan, Luyi Xing, Dongfang Zhao, Yifan Zhang, XiaoFeng Wang, Yijing Liu, Kaimin Zheng, Peyton Crnjak, Yuqing Zhang, Deqing Zou, Hai Jin:
Who's In Control? On Security Risks of Disjointed IoT Device Management Channels. CCS 2021: 1289-1305 - [c126]Weijie Liu, Wenhao Wang, Hongbo Chen, Xiaofeng Wang, Yaosong Lu, Kai Chen, Xinyu Wang, Qintao Shen, Yi Chen, Haixu Tang:
Practical and Efficient in-Enclave Verification of Privacy Compliance. DSN 2021: 413-425 - [c125]Dominic Seyler, Wei Liu, XiaoFeng Wang, ChengXiang Zhai:
Towards Dark Jargon Interpretation in Underground Forums. ECIR (2) 2021: 393-400 - [c124]Kai Li, Jiaqi Chen, Xianghong Liu, Yuzhe Richard Tang, XiaoFeng Wang, Xiapu Luo:
As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service. NDSS 2021 - [c123]Xianghang Mi, Siyuan Tang, Zhengyi Li, Xiaojing Liao, Feng Qian, XiaoFeng Wang:
Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks. NDSS 2021 - [c122]Dominic Seyler, Wei Liu, Yunan Zhang, XiaoFeng Wang, ChengXiang Zhai:
DarkJargon.net: A Platform for Understanding Underground Conversation with Latent Meaning. SIGIR 2021: 2526-2530 - [c121]Yi Chen, Yepeng Yao, XiaoFeng Wang, Dandan Xu, Chang Yue, Xiaozhong Liu, Kai Chen, Haixu Tang, Baoxu Liu:
Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis. SP 2021: 1197-1214 - [c120]Liya Su, Xinyue Shen, Xiangyu Du, Xiaojing Liao, XiaoFeng Wang, Luyi Xing, Baoxu Liu:
Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications. USENIX Security Symposium 2021: 1307-1324 - [c119]Di Tang, XiaoFeng Wang, Haixu Tang, Kehuan Zhang:
Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection. USENIX Security Symposium 2021: 1541-1558 - [c118]Jice Wang, Yue Xiao, Xueqiang Wang, Yuhong Nan, Luyi Xing, Xiaojing Liao, Jinwei Dong, Nicolás Serrano, Haoran Lu, XiaoFeng Wang, Yuqing Zhang:
Understanding Malicious Cross-library Data Harvesting on Android. USENIX Security Symposium 2021: 4133-4150 - [i22]Yuxuan Chen, Jiangshan Zhang, Xuejing Yuan, Shengzhi Zhang, Kai Chen, XiaoFeng Wang, Shanqing Guo:
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems. CoRR abs/2103.10651 (2021) - [i21]Chathura Widanage, Weijie Liu, Jiayu Li, Hongbo Chen, XiaoFeng Wang, Haixu Tang, Judy Fox:
HySec-Flow: Privacy-Preserving Genomic Computing with SGX-based Big-Data Analytics Framework. CoRR abs/2107.12423 (2021) - [i20]Weijie Liu, Hongbo Chen, XiaoFeng Wang, Zhi Li, Danfeng Zhang, Wenhao Wang, Haixu Tang:
Understanding TEE Containers, Easy to Use? Hard to Trust. CoRR abs/2109.01923 (2021) - 2020
- [j20]Rui Zhu, Chao Jiang, Xiaofeng Wang, Shuang Wang, Hao Zheng, Haixu Tang:
Privacy-preserving construction of generalized linear mixed model for biomedical computation. Bioinform. 36(Supplement-1): i128-i135 (2020) - [j19]Yeonjoon Lee, Yue Zhao, Jiutian Zeng, Kwangwuk Lee, Nan Zhang, Faysal Hossain Shezan, Yuan Tian, Kai Chen, XiaoFeng Wang:
Using Sonar for Liveness Detection to Protect Smart Speakers against Remote Attackers. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 4(1): 16:1-16:28 (2020) - [j18]Zeyu Mi, Haibo Chen, Yinqian Zhang, ShuangHe Peng, Xiaofeng Wang, Michael K. Reiter:
CPU Elasticity to Mitigate Cross-VM Runtime Monitoring. IEEE Trans. Dependable Secur. Comput. 17(5): 1094-1108 (2020) - [c117]Haoran Lu, Luyi Xing, Yue Xiao, Yifan Zhang, Xiaojing Liao, XiaoFeng Wang, Xueqiang Wang:
Demystifying Resource Management Risks in Emerging Mobile App-in-App Ecosystems. CCS 2020: 569-585 - [c116]Eihal Alowaisheq, Siyuan Tang, Zhihao Wang, Fatemah Alharbi, Xiaojing Liao, XiaoFeng Wang:
Zombie Awakening: Stealthy Hijacking of Active Domains through DNS Hosting Referral. CCS 2020: 1307-1322 - [c115]Tao Lv, Ruishi Li, Yi Yang, Kai Chen, Xiaojing Liao, XiaoFeng Wang, Peiwei Hu, Luyi Xing:
RTFM! Automatic Assumption Discovery and Verification Derivation from Library Document for API Misuse Detection. CCS 2020: 1837-1852 - [c114]Yunhui Long, Lei Wang, Diyue Bu, Vincent Bindschaedler, XiaoFeng Wang, Haixu Tang, Carl A. Gunter, Kai Chen:
A Pragmatic Approach to Membership Inferences on Machine Learning Models. EuroS&P 2020: 521-534 - [c113]Peng Wang, Xiaojing Liao, Yue Qin, XiaoFeng Wang:
Into the Deep Web: Understanding E-commerce Fraud from Autonomous Chat with Cybercriminals. NDSS 2020 - [c112]Yan Jia, Luyi Xing, Yuhang Mao, Dongfang Zhao, XiaoFeng Wang, Shangru Zhao, Yuqing Zhang:
Burglars' IoT Paradise: Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds. SP 2020: 465-481 - [c111]Jianping Zhu, Rui Hou, XiaoFeng Wang, Wenhao Wang, Jiangfeng Cao, Boyan Zhao, Zhongpu Wang, Yuhui Zhang, Jiameng Ying, Lixin Zhang, Dan Meng:
Enabling Rack-scale Confidential Computing using Heterogeneous Trusted Execution Environment. SP 2020: 1450-1465 - [c110]Bin Yuan, Yan Jia, Luyi Xing, Dongfang Zhao, XiaoFeng Wang, Deqing Zou, Hai Jin, Yuqing Zhang:
Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation. USENIX Security Symposium 2020: 1183-1200 - [c109]Yuxuan Chen, Xuejing Yuan, Jiangshan Zhang, Yue Zhao, Shengzhi Zhang, Kai Chen, XiaoFeng Wang:
Devil's Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices. USENIX Security Symposium 2020: 2667-2684 - [i19]Weijie Liu, Wenhao Wang, XiaoFeng Wang, Xiaozhu Meng, Yaosong Lu, Hongbo Chen, Xinyu Wang, Qingtao Shen, Kai Chen, Haixu Tang, Yi Chen, Luyi Xing:
Confidential Attestation: Efficient in-Enclave Verification of Privacy Policy Compliance. CoRR abs/2007.10513 (2020) - [i18]Dominic Seyler, Wei Liu, XiaoFeng Wang, ChengXiang Zhai:
Towards Dark Jargon Interpretation in Underground Forums. CoRR abs/2011.03011 (2020)
2010 – 2019
- 2019
- [c108]Baojun Liu, Zhou Li, Peiyuan Zong, Chaoyi Lu, Hai-Xin Duan, Ying Liu, Sumayah A. Alrwais, XiaoFeng Wang, Shuang Hao, Yaoqi Jia, Yiming Zhang, Kai Chen, Zaifeng Zhang:
TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis. EuroS&P 2019: 560-575 - [c107]Hao Wu, Jinghao Feng, Xuejin Tian, Fengyuan Xu, Yunxin Liu, XiaoFeng Wang, Sheng Zhong:
secGAN: A Cycle-Consistent GAN for Securely-Recoverable Video Transformation. HotEdgeVideo@MobiCom 2019: 33-38 - [c106]Eihal Alowaisheq, Peng Wang, Sumayah A. Alrwais, Xiaojing Liao, XiaoFeng Wang, Tasneem Alowaisheq, Xianghang Mi, Siyuan Tang, Baojun Liu:
Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs. NDSS 2019 - [c105]Inken Hagestedt, Yang Zhang, Mathias Humbert, Pascal Berrang, Haixu Tang, XiaoFeng Wang, Michael Backes:
MBeacon: Privacy-Preserving Beacons for DNA Methylation Data. NDSS 2019 - [c104]Wenrui Diao, Yue Zhang, Li Zhang, Zhou Li, Fenghao Xu, Xiaorui Pan, Xiangyu Liu, Jian Weng, Kehuan Zhang, XiaoFeng Wang:
Kindness is a Risky Business: On the Usage of the Accessibility APIs in Android. RAID 2019: 261-275 - [c103]Yi Chen, Mingming Zha, Nan Zhang, Dandan Xu, Qianqian Zhao, Xuan Feng, Kan Yuan, Fnu Suya, Yuan Tian, Kai Chen, XiaoFeng Wang, Wei Zou:
Demystifying Hidden Privacy Settings in Mobile Apps. IEEE Symposium on Security and Privacy 2019: 570-586 - [c102]Wei You, Xueqiang Wang, Shiqing Ma, Jianjun Huang, Xiangyu Zhang, XiaoFeng Wang, Bin Liang:
ProFuzzer: On-the-fly Input Type Probing for Better Zero-Day Vulnerability Discovery. IEEE Symposium on Security and Privacy 2019: 769-786 - [c101]Kan Yuan, Di Tang, Xiaojing Liao, XiaoFeng Wang, Xuan Feng, Yi Chen, Menghan Sun, Haoran Lu, Kehuan Zhang:
Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion. IEEE Symposium on Security and Privacy 2019: 952-966 - [c100]Xianghang Mi, Xuan Feng, Xiaojing Liao, Baojun Liu, XiaoFeng Wang, Feng Qian, Zhou Li, Sumayah A. Alrwais, Limin Sun, Ying Liu:
Resident Evil: Understanding Residential IP Proxy as a Dark Service. IEEE Symposium on Security and Privacy 2019: 1185-1201 - [c99]Nan Zhang, Xianghang Mi, Xuan Feng, XiaoFeng Wang, Yuan Tian, Feng Qian:
Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems. IEEE Symposium on Security and Privacy 2019: 1381-1396 - [c98]Yi Chen, Luyi Xing, Yue Qin, Xiaojing Liao, XiaoFeng Wang, Kai Chen, Wei Zou:
Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation Analysis. USENIX Security Symposium 2019: 747-764 - [c97]Yeonjoon Lee, Xueqiang Wang, Kwangwuk Lee, Xiaojing Liao, XiaoFeng Wang, Tongxin Li, Xianghang Mi:
Understanding iOS-based Crowdturfing Through Hidden UI Analysis. USENIX Security Symposium 2019: 765-781 - [c96]Xuan Feng, Xiaojing Liao, XiaoFeng Wang, Haining Wang, Qiang Li, Kai Yang, Hongsong Zhu, Limin Sun:
Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis. USENIX Security Symposium 2019: 887-903 - [c95]Xueqiang Wang, Yuqiong Sun, Susanta Nanda, XiaoFeng Wang:
Looking from the Mirror: Evaluating IoT Device Security through Mobile Companion Apps. USENIX Security Symposium 2019: 1151-1167 - [e6]Lorenzo Cavallaro, Johannes Kinder, XiaoFeng Wang, Jonathan Katz:
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019. ACM 2019, ISBN 978-1-4503-6747-9 [contents] - [i17]Jianping Zhu, Rui Hou, XiaoFeng Wang, Wenhao Wang, Jiangfeng Cao, Lutan Zhao, Fengkai Yuan, Peinan Li, Zhongpu Wang, Boyan Zhao, Lixin Zhang, Dan Meng:
Enabling Privacy-Preserving, Compute- and Data-Intensive Computing using Heterogeneous Trusted Execution Environment. CoRR abs/1904.04782 (2019) - [i16]Wenhao Wang, Yichen Jiang, Qintao Shen, Weihao Huang, Hao Chen, Shuang Wang, Xiaofeng Wang, Haixu Tang, Kai Chen, Kristin E. Lauter, Dongdai Lin:
Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance. CoRR abs/1905.07766 (2019) - [i15]Di Tang, Xiaofeng Wang, Haixu Tang, Kehuan Zhang:
Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection. CoRR abs/1908.00686 (2019) - 2018
- [j17]Qianqian Zhao, Kai Chen, Tongxin Li, Yi Yang, XiaoFeng Wang:
Detecting telecommunication fraud by understanding the contents of a call. Cybersecur. 1(1): 8 (2018) - [j16]Xiaojing Liao, Sumayah A. Alrwais, Kan Yuan, Luyi Xing, XiaoFeng Wang, Shuang Hao, Raheem Beyah:
Cloud repository as a malicious service: challenge, identification and implication. Cybersecur. 1(1): 14 (2018) - [j15]Yongan Zhao, Xiaofeng Wang, Haixu Tang:
A Secure Alignment Algorithm for Mapping Short Reads to Human Genome. J. Comput. Biol. 25(6): 529-540 (2018) - [c94]Zhe Zhou, Di Tang, Wenhao Wang, Xiaofeng Wang, Zhou Li, Kehuan Zhang:
Beware of Your Screen: Anonymous Fingerprinting of Device Screens for Off-line Payment Protection. ACSAC 2018: 77-88 - [c93]Sanchuan Chen, Fangfei Liu, Zeyu Mi, Yinqian Zhang, Ruby B. Lee, Haibo Chen, XiaoFeng Wang:
Leveraging Hardware Transactional Memory for Cache Side-Channel Defenses. AsiaCCS 2018: 601-608 - [c92]Jiongyi Chen, Wenrui Diao, Qingchuan Zhao, Chaoshun Zuo, Zhiqiang Lin, XiaoFeng Wang, Wing Cheong Lau, Menghan Sun, Ronghai Yang, Kehuan Zhang:
IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing. NDSS 2018 - [c91]Yue Duan, Mu Zhang, Abhishek Vasisht Bhaskar, Heng Yin, Xiaorui Pan, Tongxin Li, Xueqiang Wang, XiaoFeng Wang:
Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation. NDSS 2018 - [c90]Yuhong Nan, Zhemin Yang, Xiaofeng Wang, Yuan Zhang, Donglai Zhu, Min Yang:
Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps. NDSS 2018 - [c89]Peng Wang, Xianghang Mi, Xiaojing Liao, XiaoFeng Wang, Kan Yuan, Feng Qian, Raheem A. Beyah:
Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations. NDSS 2018 - [c88]Xiaokuan Zhang, Xueqiang Wang, Xiaolong Bai, Yinqian Zhang, XiaoFeng Wang:
OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS. NDSS 2018 - [c87]Shuaike Dong, Menghao Li, Wenrui Diao, Xiangyu Liu, Jian Liu, Zhou Li, Fenghao Xu, Kai Chen, Xiaofeng Wang, Kehuan Zhang:
Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild. SecureComm (1) 2018: 172-192 - [c86]Guoxing Chen, Wenhao Wang, Tianyu Chen, Sanchuan Chen, Yinqian Zhang, XiaoFeng Wang, Ten-Hwang Lai, Dongdai Lin:
Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races. IEEE Symposium on Security and Privacy 2018: 178-194 - [c85]Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, Carl A. Gunter:
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. USENIX Security Symposium 2018: 49-64 - [c84]Kan Yuan, Haoran Lu, Xiaojing Liao, XiaoFeng Wang:
Reading Thieves' Cant: Automatically Identifying and Understanding Dark Jargons from Cybercrime Marketplaces. USENIX Security Symposium 2018: 1027-1041 - [c83]Xiaohan Zhang, Yuan Zhang, Qianqian Mo, Hao Xia, Zhemin Yang, Min Yang, Xiaofeng Wang, Long Lu, Hai-Xin Duan:
An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications. USENIX Security Symposium 2018: 1183-1198 - [e5]David Lie, Mohammad Mannan, Michael Backes, XiaoFeng Wang:
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, October 15-19, 2018. ACM 2018, ISBN 978-1-4503-5693-0 [contents] - [i14]Shuaike Dong, Menghao Li, Wenrui Diao, Xiangyu Liu, Jian Liu, Zhou Li, Fenghao Xu, Kai Chen, Xiaofeng Wang, Kehuan Zhang:
Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild. CoRR abs/1801.01633 (2018) - [i13]Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, Carl A. Gunter:
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. CoRR abs/1801.08535 (2018) - [i12]Yunhui Long, Vincent Bindschaedler, Lei Wang, Diyue Bu, Xiaofeng Wang, Haixu Tang, Carl A. Gunter, Kai Chen:
Understanding Membership Inferences on Well-Generalized Learning Models. CoRR abs/1802.04889 (2018) - [i11]Di Tang, XiaoFeng Wang, Kehuan Zhang:
Query-Free Attacks on Industry-Grade Face Recognition Systems under Resource Constraints. CoRR abs/1802.09900 (2018) - [i10]Zhe Zhou, Di Tang, Xiaofeng Wang, Weili Han, Xiangyu Liu, Kehuan Zhang:
Invisible Mask: Practical Attacks on Face Recognition with Infrared. CoRR abs/1803.04683 (2018) - [i9]Nan Zhang, Xianghang Mi, Xuan Feng, XiaoFeng Wang, Yuan Tian, Feng Qian:
Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home. CoRR abs/1805.01525 (2018) - 2017
- [j14]Xiaolong Bai, Luyi Xing, Nan Zhang, XiaoFeng Wang, Xiaojing Liao, Tongxin Li, Shi-Min Hu:
Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos. IEEE Secur. Priv. 15(2): 42-49 (2017) - [j13]Jean Louis Raisaro, Florian Tramèr, Zhanglong Ji, Diyue Bu, Yongan Zhao, W. Knox Carey, David D. Lloyd, Heidi Sofia, Dixie Baker, Paul Flicek, Suyash S. Shringarpure, Carlos D. Bustamante, Shuang Wang, Xiaoqian Jiang, Lucila Ohno-Machado, Haixu Tang, XiaoFeng Wang, Jean-Pierre Hubaux:
Addressing Beacon re-identification attacks: quantification and mitigation of privacy risks. J. Am. Medical Informatics Assoc. 24(4): 799-805 (2017) - [j12]Yuhong Nan, Zhemin Yang, Min Yang, Shunfan Zhou, Yuan Zhang, Guofei Gu, Xiaofeng Wang, Limin Sun:
Identifying User-Input Privacy in Mobile Applications at a Large Scale. IEEE Trans. Inf. Forensics Secur. 12(3): 647-661 (2017) - [c82]Shuai Wang, Wenhao Wang, Qinkun Bao, Pei Wang, XiaoFeng Wang, Dinghao Wu:
Binary Code Retrofitting and Hardening Using SGX. FEAST@CCS 2017: 43-49 - [c81]Yi Chen, Wei You, Yeonjoon Lee, Kai Chen, XiaoFeng Wang, Wei Zou:
Mass Discovery of Android Traffic Imprints through Instantiated Partial Execution. CCS 2017: 815-828 - [c80]Tongxin Li, Xueqiang Wang, Mingming Zha, Kai Chen, XiaoFeng Wang, Luyi Xing, Xiaolong Bai, Nan Zhang, Xinhui Han:
Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews. CCS 2017: 829-844 - [c79]Wei You, Peiyuan Zong, Kai Chen, XiaoFeng Wang, Xiaojing Liao, Pan Bian, Bin Liang:
SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits. CCS 2017: 2139-2154 - [c78]Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, Carl A. Gunter:
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX. CCS 2017: 2421-2434 - [c77]Yeonjoon Lee, Tongxin Li, Nan Zhang, Soteris Demetriou, Mingming Zha, XiaoFeng Wang, Kai Chen, Xiao-yong Zhou, Xinhui Han, Michael Grace:
Ghost Installer in the Shadow: Security Analysis of App Installation on Android. DSN 2017: 403-414 - [c76]Xianghang Mi, Feng Qian, Ying Zhang, XiaoFeng Wang:
An empirical characterization of IFTTT: ecosystem, usage, and performance. Internet Measurement Conference 2017: 398-404 - [c75]Xing Liu, Tianyu Chen, Feng Qian, Zhixiu Guo, Felix Xiaozhu Lin, Xiaofeng Wang, Kai Chen:
Characterizing Smartwatch Usage in the Wild. MobiSys 2017: 385-398 - [c74]Xiaorui Pan, Xueqiang Wang, Yue Duan, XiaoFeng Wang, Heng Yin:
Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps. NDSS 2017 - [c73]Kai Chen, Tongxin Li, Bin Ma, Peng Wang, XiaoFeng Wang, Peiyuan Zong:
Filtering for Malice Through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level. RAID 2017: 167-191 - [c72]Sumayah A. Alrwais, Xiaojing Liao, Xianghang Mi, Peng Wang, Xiaofeng Wang, Feng Qian, Raheem A. Beyah, Damon McCoy:
Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks. IEEE Symposium on Security and Privacy 2017: 805-823 - [c71]Yuan Tian, Nan Zhang, Yue-Hsun Lin, XiaoFeng Wang, Blase Ur, Xianzheng Guo, Patrick Tague:
SmartAuth: User-Centered Authorization for the Internet of Things. USENIX Security Symposium 2017: 361-378 - [c70]Xiaolong Bai, Zhe Zhou, XiaoFeng Wang, Zhou Li, Xianghang Mi, Nan Zhang, Tongxin Li, Shi-Min Hu, Kehuan Zhang:
Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment. USENIX Security Symposium 2017: 593-608 - [c69]Soteris Demetriou, Nan Zhang, Yeonjoon Lee, XiaoFeng Wang, Carl A. Gunter, Xiao-yong Zhou, Michael Grace:
HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps. WISEC 2017: 122-133 - [i8]Soteris Demetriou, Nan Zhang, Yeonjoon Lee, XiaoFeng Wang, Carl A. Gunter, Xiao-yong Zhou, Michael Grace:
Guardian of the HAN: Thwarting Mobile Attacks on Smart-Home Devices Using OS-level Situation Awareness. CoRR abs/1703.01537 (2017) - [i7]Nan Zhang, Soteris Demetriou, Xianghang Mi, Wenrui Diao, Kan Yuan, Peiyuan Zong, Feng Qian, XiaoFeng Wang, Kai Chen, Yuan Tian, Carl A. Gunter, Kehuan Zhang, Patrick Tague, Yue-Hsun Lin:
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be. CoRR abs/1703.09809 (2017) - [i6]Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, Carl A. Gunter:
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX. CoRR abs/1705.07289 (2017) - [i5]Bin Liang, Hongcheng Li, Miaoqiang Su, Xirong Li, Wenchang Shi, Xiaofeng Wang:
Detecting Adversarial Examples in Deep Networks with Adaptive Noise Reduction. CoRR abs/1705.08378 (2017) - [i4]Jun Tang, Aleksandra Korolova, Xiaolong Bai, Xueqiang Wang, XiaoFeng Wang:
Privacy Loss in Apple's Implementation of Differential Privacy on MacOS 10.12. CoRR abs/1709.02753 (2017) - 2016
- [c68]Sumayah A. Alrwais, Kan Yuan, Eihal Alowaisheq, Xiaojing Liao, Alina Oprea, XiaoFeng Wang, Zhou Li:
Catching predators at watering holes: finding and understanding strategically compromised websites. ACSAC 2016: 153-166 - [c67]Xiaojing Liao, Kan Yuan, XiaoFeng Wang, Zhou Li, Luyi Xing, Raheem A. Beyah:
Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence. CCS 2016: 755-766 - [c66]Xiaojing Liao, Sumayah A. Alrwais, Kan Yuan, Luyi Xing, XiaoFeng Wang, Shuang Hao, Raheem A. Beyah:
Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service. CCS 2016: 1541-1552 - [c65]Xianghang Mi, Feng Qian, Xiaofeng Wang:
SMig: Stream Migration Extension for HTTP/2. CoNEXT 2016: 121-128 - [c64]Sujun Li, Nuno Bandeira, XiaoFeng Wang, Haixu Tang:
On the Privacy Risks of Sharing Clinical Proteomics Data. CRI 2016 - [c63]Kai Chen, Xueqiang Wang, Yi Chen, Peng Wang, Yeonjoon Lee, XiaoFeng Wang, Bin Ma, Aohui Wang, Yingjun Zhang, Wei Zou:
Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS. IEEE Symposium on Security and Privacy 2016: 357-376 - [c62]Xiaolong Bai, Luyi Xing, Nan Zhang, XiaoFeng Wang, Xiaojing Liao, Tongxin Li, Shi-Min Hu:
Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf. IEEE Symposium on Security and Privacy 2016: 655-674 - [c61]Xiaojing Liao, Kan Yuan, XiaoFeng Wang, Zhongyu Pei, Hao Yang, Jianjun Chen, Hai-Xin Duan, Kun Du, Eihal Alowaisheq, Sumayah A. Alrwais, Luyi Xing, Raheem A. Beyah:
Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search. IEEE Symposium on Security and Privacy 2016: 707-723 - [e4]Xiaofeng Chen, XiaoFeng Wang, Xinyi Huang:
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016. ACM 2016, ISBN 978-1-4503-4233-9 [contents] - [e3]Dongdai Lin, XiaoFeng Wang, Moti Yung:
Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9589, Springer 2016, ISBN 978-3-319-38897-7 [contents] - 2015
- [j11]Muhammad Naveed, Erman Ayday, Ellen Wright Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang:
Privacy in the Genomic Era. ACM Comput. Surv. 48(1): 6:1-6:44 (2015) - [j10]Yongan Zhao, XiaoFeng Wang, Xiaoqian Jiang, Lucila Ohno-Machado, Haixu Tang:
Choosing blindly but wisely: differentially private solicitation of DNA datasets for disease marker discovery. J. Am. Medical Informatics Assoc. 22(1): 100-108 (2015) - [c60]Luyi Xing, Xiaolong Bai, Tongxin Li, XiaoFeng Wang, Kai Chen, Xiaojing Liao, Shi-Min Hu, Xinhui Han:
Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS. CCS 2015: 31-43 - [c59]Xiao Shaun Wang, Yan Huang, Yongan Zhao, Haixu Tang, XiaoFeng Wang, Diyue Bu:
Efficient Genome-Wide, Privacy-Preserving Similar Patient Query based on Private Edit Distance. CCS 2015: 492-503 - [c58]Vincent Bindschaedler, Muhammad Naveed, Xiaorui Pan, XiaoFeng Wang, Yan Huang:
Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward. CCS 2015: 837-849 - [c57]Yousra Aafer, Nan Zhang, Zhongwen Zhang, Xiao Zhang, Kai Chen, XiaoFeng Wang, Xiao-yong Zhou, Wenliang Du, Michael Grace:
Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References. CCS 2015: 1248-1259 - [c56]Yangyi Chen, Tongxin Li, XiaoFeng Wang, Kai Chen, Xinhui Han:
Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging Integrations. CCS 2015: 1260-1272 - [c55]Soteris Demetriou, Xiao-yong Zhou, Muhammad Naveed, Yeonjoon Lee, Kan Yuan, XiaoFeng Wang, Carl A. Gunter:
What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources. NDSS 2015 - [c54]Yangyi Chen, Vincent Bindschaedler, XiaoFeng Wang, Stefan Berger, Dimitrios E. Pendarakis:
Elite: Automatic Orchestration of Elastic Detection Services to Secure Cloud Hosting. RAID 2015: 588-614 - [c53]Nan Zhang, Kan Yuan, Muhammad Naveed, Xiao-yong Zhou, XiaoFeng Wang:
Leave Me Alone: App-Level Protection against Runtime Information Gathering on Android. IEEE Symposium on Security and Privacy 2015: 915-930 - [c52]Kai Chen, Peng Wang, Yeonjoon Lee, XiaoFeng Wang, Nan Zhang, Heqing Huang, Wei Zou, Peng Liu:
Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale. USENIX Security Symposium 2015: 659-674 - [c51]Yuhong Nan, Min Yang, Zhemin Yang, Shunfan Zhou, Guofei Gu, Xiaofeng Wang:
UIPicker: User-Input Privacy Identification in Mobile Applications. USENIX Security Symposium 2015: 993-1008 - [e2]Bhavani Thuraisingham, XiaoFeng Wang, Vinod Yegneswaran:
Security and Privacy in Communication Networks - 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 164, Springer 2015, ISBN 978-3-319-28864-2 [contents] - [i3]Luyi Xing, Xiaolong Bai, Tongxin Li, XiaoFeng Wang, Kai Chen, Xiaojing Liao, Shi-Min Hu, Xinhui Han:
Unauthorized Cross-App Resource Access on MAC OS X and iOS. CoRR abs/1505.06836 (2015) - [i2]Muhammad Naveed, Erman Ayday, Ellen Wright Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang:
Privacy in the Genomic Era. IACR Cryptol. ePrint Arch. 2015: 563 (2015) - 2014
- [j9]Fan Zhang, Wenbo He, Yangyi Chen, Zhou Li, XiaoFeng Wang, Shuo Chen, Xue Liu:
Thwarting Wi-Fi Side-Channel Analysis through Traffic Demultiplexing. IEEE Trans. Wirel. Commun. 13(1): 86-98 (2014) - [c50]Tongxin Li, Xiao-yong Zhou, Luyi Xing, Yeonjoon Lee, Muhammad Naveed, XiaoFeng Wang, Xinhui Han:
Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services. CCS 2014: 978-989 - [c49]Muhammad Naveed, Shashank Agrawal, Manoj Prabhakaran, XiaoFeng Wang, Erman Ayday, Jean-Pierre Hubaux, Carl A. Gunter:
Controlled Functional Encryption. CCS 2014: 1280-1291 - [c48]Aston Zhang, Xing Xie, Kevin Chen-Chuan Chang, Carl A. Gunter, Jiawei Han, XiaoFeng Wang:
Privacy Risk in Anonymized Heterogeneous Information Networks. EDBT 2014: 595-606 - [c47]Anupam Das, Joseph Bonneau, Matthew Caesar, Nikita Borisov, XiaoFeng Wang:
The Tangled Web of Password Reuse. NDSS 2014 - [c46]Chia-Chi Lin, Hongyang Li, Xiao-yong Zhou, XiaoFeng Wang:
Screenmilker: How to Milk Your Android Screen for Secrets. NDSS 2014 - [c45]Muhammad Naveed, Xiao-yong Zhou, Soteris Demetriou, XiaoFeng Wang, Carl A. Gunter:
Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android. NDSS 2014 - [c44]Zhou Li, Sumayah A. Alrwais, XiaoFeng Wang, Eihal Alowaisheq:
Hunting the Red Fox Online: Understanding and Detection of Mass Redirect-Script Injections. IEEE Symposium on Security and Privacy 2014: 3-18 - [c43]Luyi Xing, Xiaorui Pan, Rui Wang, Kan Yuan, XiaoFeng Wang:
Upgrading Your Android, Elevating My Malware: Privilege Escalation through Mobile OS Updating. IEEE Symposium on Security and Privacy 2014: 393-408 - [c42]Xiao-yong Zhou, Yeonjoon Lee, Nan Zhang, Muhammad Naveed, XiaoFeng Wang:
The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations. IEEE Symposium on Security and Privacy 2014: 409-423 - [c41]Sumayah A. Alrwais, Kan Yuan, Eihal Alowaisheq, Zhou Li, XiaoFeng Wang:
Understanding the Dark Side of Domain Parking. USENIX Security Symposium 2014: 207-222 - [i1]Muhammad Naveed, Erman Ayday, Ellen Wright Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang:
Privacy and Security in the Genomic Era. CoRR abs/1405.1891 (2014) - 2013
- [c40]Rui Wang, Luyi Xing, XiaoFeng Wang, Shuo Chen:
Unauthorized origin crossing on mobile platforms: threats and mitigation. CCS 2013: 635-646 - [c39]Xiao-yong Zhou, Soteris Demetriou, Dongjing He, Muhammad Naveed, Xiaorui Pan, XiaoFeng Wang, Carl A. Gunter, Klara Nahrstedt:
Identity, location, disease and more: inferring your secrets from android public resources. CCS 2013: 1017-1028 - [c38]Luyi Xing, Yangyi Chen, XiaoFeng Wang, Shuo Chen:
InteGuard: Toward Automatic Protection of Third-Party Web Service Integrations. NDSS 2013 - [c37]Zhou Li, Sumayah A. Alrwais, Yinglian Xie, Fang Yu, XiaoFeng Wang:
Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures. IEEE Symposium on Security and Privacy 2013: 112-126 - [e1]Yan Chen, XiaoFeng Wang:
Proceedings of the first international workshop on Security in embedded systems and smartphones, SESP 2013, Hangzhou, China, May 8, 2013. ACM 2013, ISBN 978-1-4503-2068-9 [contents] - 2012
- [c36]Zhou Li, Kehuan Zhang, Yinglian Xie, Fang Yu, XiaoFeng Wang:
Knowing your enemy: understanding and detecting malicious web advertising. CCS 2012: 674-686 - [c35]XiaoFeng Wang, Haixu Tang:
Privacy Protection in Sharing Personal Genome Sequencing Data. HISB 2012: 143 - [c34]Yangyi Chen, Bo Peng, XiaoFeng Wang, Haixu Tang:
Large-Scale Privacy-Preserving Mapping of Human Genomic Sequences on Hybrid Clouds. NDSS 2012 - [c33]Rui Wang, Shuo Chen, XiaoFeng Wang:
Signing Me onto Your Accounts through Facebook and Google: A Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services. IEEE Symposium on Security and Privacy 2012: 365-379 - 2011
- [j8]Debin Liu, Ninghui Li, XiaoFeng Wang, L. Jean Camp:
Security Risk Management Using Incentives. IEEE Secur. Priv. 9(6): 20-28 (2011) - [c32]Kehuan Zhang, Xiao-yong Zhou, Yangyi Chen, XiaoFeng Wang, Yaoping Ruan:
Sedic: privacy-aware data intensive computing on hybrid clouds. CCS 2011: 515-526 - [c31]Apu Kapadia, Steven A. Myers, XiaoFeng Wang, Geoffrey C. Fox:
Toward securing sensor clouds. CTS 2011: 280-289 - [c30]Xiao-yong Zhou, Bo Peng, Yong Fuga Li, Yangyi Chen, Haixu Tang, XiaoFeng Wang:
To Release or Not to Release: Evaluating Information Leaks in Aggregate Human-Genome Data. ESORICS 2011: 607-627 - [c29]Debin Liu, Ninghui Li, XiaoFeng Wang, L. Jean Camp:
Beyond Risk-Based Access Control: Towards Incentive-Based Access Control. Financial Cryptography 2011: 102-112 - [c28]Roman Schlegel, Kehuan Zhang, Xiao-yong Zhou, Mehool Intwala, Apu Kapadia, XiaoFeng Wang:
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. NDSS 2011 - [c27]Rui Wang, Shuo Chen, XiaoFeng Wang, Shaz Qadeer:
How to Shop for Free Online - Security Analysis of Cashier-as-a-Service Based Web Stores. IEEE Symposium on Security and Privacy 2011: 465-480 - [r2]XiaoFeng Wang:
Computational Puzzles. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 244-245 - [r1]XiaoFeng Wang:
Memory and State Exhaustion Denial of Service. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 773-774 - 2010
- [j7]Debin Liu, L. Jean Camp, XiaoFeng Wang, Lusha Wang:
Using Budget-Based Access Control to Manage Operational Risks Caused by Insiders. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(1): 29-45 (2010) - [j6]XiaoFeng Wang, Michael K. Reiter:
Using Web-Referral Architectures to Mitigate Denial-of-Service Threats. IEEE Trans. Dependable Secur. Comput. 7(2): 203-216 (2010) - [j5]XiaoFeng Wang, Philippe Golle, Markus Jakobsson, Alex Tsow:
Deterring voluntary trace disclosure in re-encryption mix-networks. ACM Trans. Inf. Syst. Secur. 13(2): 18:1-18:24 (2010) - [c26]Zhou Li, XiaoFeng Wang:
FIRM: capability-based inline mediation of Flash behaviors. ACSAC 2010: 181-190 - [c25]Kehuan Zhang, Zhou Li, Rui Wang, XiaoFeng Wang, Shuo Chen:
Sidebuster: automated detection and quantification of side-channel leaks in web application development. CCS 2010: 595-606 - [c24]Apu Kapadia, Steven A. Myers, XiaoFeng Wang, Geoffrey C. Fox:
Secure cloud computing with brokered trusted sensor networks. CTS 2010: 581-592 - [c23]Zhou Li, Kehuan Zhang, XiaoFeng Wang:
Mash-IF: Practical information-flow control within client-side mashups. DSN 2010: 251-260 - [c22]Fengyu Wang, Bin Gong, Shanqing Guo, Xiaofeng Wang:
Monitoring Heavy-Hitter Flows in High-Speed Network Concurrently. NSS 2010: 160-166 - [c21]Shuo Chen, Rui Wang, XiaoFeng Wang, Kehuan Zhang:
Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow. IEEE Symposium on Security and Privacy 2010: 191-206
2000 – 2009
- 2009
- [j4]Jiangtao Li, Ninghui Li, XiaoFeng Wang, Ting Yu:
Denial of service attacks and defenses in decentralized trust management. Int. J. Inf. Sec. 8(2): 89-101 (2009) - [c20]Rui Wang, XiaoFeng Wang, Zhou Li, Haixu Tang, Michael K. Reiter, Zheng Dong:
Privacy-preserving genomic computation through program specialization. CCS 2009: 338-347 - [c19]Rui Wang, Yong Fuga Li, XiaoFeng Wang, Haixu Tang, Xiao-yong Zhou:
Learning your identity and disease from research papers: information leaks in genome wide association study. CCS 2009: 534-544 - [c18]Debin Liu, XiaoFeng Wang, L. Jean Camp:
Mitigating Inadvertent Insider Threats with Incentives. Financial Cryptography 2009: 1-16 - [c17]Kehuan Zhang, XiaoFeng Wang:
Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems. USENIX Security Symposium 2009: 17-32 - [c16]Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Xiao-yong Zhou, XiaoFeng Wang:
Effective and Efficient Malware Detection at the End Host. USENIX Security Symposium 2009: 351-366 - 2008
- [j3]Debin Liu, XiaoFeng Wang, L. Jean Camp:
Game-theoretic modeling and analysis of insider threats. Int. J. Crit. Infrastructure Prot. 1: 75-80 (2008) - [j2]XiaoFeng Wang, Michael K. Reiter:
A multi-layer framework for puzzle-based denial-of-service defense. Int. J. Inf. Sec. 7(4): 243-263 (2008) - [j1]XiaoFeng Wang, Zhuowei Li, Jong Youl Choi, Jun Xu, Michael K. Reiter, Chongkyung Kil:
Fast and Black-box Exploit Detection and Signature Generation for Commodity Software. ACM Trans. Inf. Syst. Secur. 12(2): 11:1-11:35 (2008) - [c15]Rui Wang, XiaoFeng Wang, Kehuan Zhang, Zhuowei Li:
Towards automatic reverse engineering of software security configurations. CCS 2008: 245-256 - [c14]Zhuowei Li, XiaoFeng Wang, Zhenkai Liang, Michael K. Reiter:
AGIS: Towards automatic generation of infection signatures. DSN 2008: 237-246 - [c13]XiaoFeng Wang, Zhuowei Li, Ninghui Li, Jong Youl Choi:
PRECIP: Towards Practical and Retrofittable Confidential Information Protection. NDSS 2008 - [c12]Rui Wang, XiaoFeng Wang, Zhuowei Li:
Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software . USENIX Security Symposium 2008: 291-306 - [c11]Richard Chow, Philippe Golle, Markus Jakobsson, Lusha Wang, XiaoFeng Wang:
Making CAPTCHAs clickable. HotMobile 2008: 91-94 - 2007
- [c10]Zhuowei Li, XiaoFeng Wang, Jong Youl Choi:
SpyShield: Preserving Privacy from Spy Add-Ons. RAID 2007: 296-316 - 2006
- [c9]XiaoFeng Wang, Zhuowei Li, Jun Xu, Michael K. Reiter, Chongkyung Kil, Jong Youl Choi:
Packet vaccine: black-box exploit detection and signature generation. CCS 2006: 37-46 - [c8]Jiangtao Li, Ninghui Li, XiaoFeng Wang, Ting Yu:
Denial of Service Attacks and Defenses in Decentralized Trust Management. SecureComm 2006: 1-12 - [c7]Philippe Golle, XiaoFeng Wang, Markus Jakobsson, Alex Tsow:
Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks. S&P 2006: 121-131 - [c6]XiaoFeng Wang, Michael K. Reiter:
WRAPS: Denial-of-Service Defense through Web Referrals. SRDS 2006: 51-60 - 2005
- [c5]Michael K. Reiter, XiaoFeng Wang, Matthew K. Wright:
Building Reliable Mix Networks with Fair Exchange. ACNS 2005: 378-392 - 2004
- [c4]Michael K. Reiter, XiaoFeng Wang:
Fragile mixing. CCS 2004: 227-235 - [c3]XiaoFeng Wang, Michael K. Reiter:
Mitigating bandwidth-exhaustion attacks using congestion puzzles. CCS 2004: 257-267 - [c2]Markus Jakobsson, XiaoFeng Wang, Susanne Wetzel:
Stealth attacks in vehicular technologies. VTC Fall (2) 2004: 1218-1222 - 2003
- [c1]XiaoFeng Wang, Michael K. Reiter:
Defending Against Denial-of-Service Attacks with Puzzle Auction. S&P 2003: 78-92
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-17 21:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint