Follow
Tongxin Li
Tongxin Li
Verified email at pku.edu.cn
Title
Cited by
Cited by
Year
VTrust: Regaining Trust on Virtual Calls.
C Zhang, SA Carr, T Li, Y Ding, C Song, M Payer, D Song
The Network and Distributed System Security Symposium 2016 (NDSS'16), 2016
1002016
Things You May Not Know About Android (Un) Packers: A Systematic Study based on Whole-System Emulation
Y Duan, M Zhang, AV Bhaskar, H Yin, X Pan, T Li, X Wang, XF Wang
The Network and Distributed System Security Symposium 2018 (NDSS'18), 2018
992018
Mayhem in the push clouds: Understanding and mitigating security hazards in mobile push-messaging services
T Li, X Zhou, L Xing, Y Lee, M Naveed, XF Wang, X Han
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
582014
Unleashing the walking dead: Understanding cross-app remote infections on mobile webviews
T Li, X Wang, M Zha, K Chen, XF Wang, L Xing, X Bai, N Zhang, X Han
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
522017
Staying secure and unprepared: Understanding and mitigating the security risks of apple zeroconf
X Bai, L Xing, N Zhang, XF Wang, X Liao, T Li, SM Hu
2016 IEEE Symposium on Security and Privacy (SP), 655-674, 2016
462016
Detecting telecommunication fraud by understanding the contents of a call
Q Zhao, K Chen, T Li, Y Yang, XF Wang
Cybersecurity 1, 1-12, 2018
452018
Cracking app isolation on apple: Unauthorized cross-app resource access on MAC os~ x and ios
L Xing, X Bai, T Li, XF Wang, K Chen, X Liao, SM Hu, X Han
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
452015
Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment
X Bai, Z Zhou, XF Wang, Z Li, X Mi, N Zhang, T Li, SM Hu, K Zhang
26th USENIX Security Symposium (USENIX Security 17), 593-608, 2017
362017
Unauthorized cross-app resource access on mac os x and ios
L Xing, X Bai, T Li, XF Wang, K Chen, X Liao, SM Hu, X Han
arXiv preprint arXiv:1505.06836, 2015
202015
Understanding {iOS-based} Crowdturfing Through Hidden {UI} Analysis
Y Lee, X Wang, K Lee, X Liao, XF Wang, T Li, X Mi
28th USENIX Security Symposium (USENIX Security 19), 765-781, 2019
142019
Building and maintaining a third-party library supply chain for productive and secure SGX enclave development
P Wang, Y Ding, M Sun, H Wang, T Li, R Zhou, Z Chen, Y Jing
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
122020
Ghost installer in the shadow: Security analysis of app installation on android
Y Lee, T Li, N Zhang, S Demetriou, M Zha, XF Wang, K Chen, X Zhou, ...
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
102017
Perplexed messengers from the cloud: Automated security analysis of push-messaging integrations
Y Chen, T Li, XF Wang, K Chen, X Han
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
102015
Apple ZeroConf holes: How hackers can steal iPhone photos
X Bai, L Xing, N Zhang, XF Wang, X Liao, T Li, SM Hu
IEEE Security & Privacy 15 (2), 42-49, 2017
82017
Towards memory safe python enclave for security sensitive computation
H Wang, M Sun, Q Feng, P Wang, T Li, Y Ding
arXiv preprint arXiv:2005.05996, 2020
52020
POSTER: AdHoneyDroid--Capture Malicious Android Advertisements
D Wang, S Dai, Y Ding, T Li, X Han
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
52014
Filtering for malice through the data ocean: Large-scale PHA install detection at the communication service provider level
K Chen, T Li, B Ma, P Wang, XF Wang, P Zong
Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017
42017
Minergate: A novel generic and accurate defense solution against web based cryptocurrency mining attacks
G Yu, G Yang, T Li, X Han, S Guan, J Zhang, G Gu
Cyber Security: 17th China Annual Conference, CNCERT 2020, Beijing, China …, 2020
32020
Poster: gbdt-rs: Fast and trustworthy gradient boosting decision tree
T Li, T Li, Y Ding, Y Zhang, T Wei, X Han
Posters In 2019 IEEE Symposium on Security and Privacy (SP), 2019
32019
POSTER: PT-DBG: Bypass Anti-debugging with Intel Processor Tracing
G Li, Y Chen, T Li, T Li, X Wu, C Zhang, X Han
Proceedings of the 39th IEEE Symposium on Security and Privacy, San …, 2018
22018
The system can't perform the operation now. Try again later.
Articles 1–20