Juanru Li
Juanru Li
在 sjtu.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Differential fault analysis on the ARIA algorithm
W Li, D Gu, J Li
Information Sciences 178 (19), 3727-3737, 2008
1042008
Appspear: Bytecode decrypting and dex reassembling for packed android malware
W Yang, Y Zhang, J Li, J Shu, B Li, W Hu, D Gu
International Symposium on Recent Advances in Intrusion Detection, 359-381, 2015
732015
From collision to exploitation: Unleashing use-after-free vulnerabilities in linux kernel
W Xu, J Li, J Shu, W Yang, T Xie, Y Zhang, D Gu
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
622015
Android malware forensics: Reconstruction of malicious events
J Li, D Gu, Y Luo
2012 32nd International Conference on Distributed Computing Systems …, 2012
522012
Vulnerability assessment of oauth implementations in android applications
H Wang, Y Zhang, J Li, H Liu, W Yang, B Li, D Gu
Proceedings of the 31st annual computer security applications conference, 61-70, 2015
422015
iCryptoTracer: Dynamic analysis on misuse of cryptography functions in iOS applications
Y Li, Y Zhang, J Li, D Gu
International Conference on Network and System Security, 349-362, 2015
372015
APKLancet: tumor payload diagnosis and purification for android applications
W Yang, J Li, Y Zhang, Y Li, J Shu, D Gu
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
312014
Detection and analysis of cryptographic data inside software
R Zhao, D Gu, J Li, R Yu
International Conference on Information Security, 182-196, 2011
232011
K-hunt: Pinpointing insecure cryptographic keys from execution traces
J Li, Z Lin, J Caballero, Y Zhang, D Gu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
222018
An extension of differential fault analysis on AES
W Li, D Gu, Y Wang, J Li, Z Liu
2009 Third International Conference on Network and System Security, 443-446, 2009
222009
Differential fault analysis on Camellia
W Li, D Gu, J Li, Z Liu, Y Liu
Journal of Systems and Software 83 (5), 844-851, 2010
212010
Smart solution, poor protection: An empirical study of security and privacy issues in developing and deploying smart home devices
H Liu, C Li, X Jin, J Li, Y Zhang, D Gu
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy …, 2017
202017
Show Me the Money! Finding Flawed Implementations of Third-party In-app Payment in Android Apps.
W Yang, Y Zhang, J Li, H Liu, Q Wang, Y Zhang, D Gu
NDSS, 2017
182017
Cross-architecture binary semantics understanding via similar code comparison
Y Hu, Y Zhang, J Li, D Gu
2016 IEEE 23rd International Conference on Software Analysis, Evolution, and …, 2016
182016
AppSpear: automating the hidden-code extraction and reassembling of packed android malware
B Li, Y Zhang, J Li, W Yang, D Gu
Journal of Systems and Software 140, 3-16, 2018
172018
The achilles heel of OAuth: a multi-platform study of OAuth-based authentication
H Wang, Y Zhang, J Li, D Gu
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
152016
Android app protection via interpretation obfuscation
J Shu, J Li, Y Zhang, D Gu
2014 IEEE 12th International Conference on Dependable, Autonomic and Secure …, 2014
152014
Embroidery: Patching vulnerable binary code of fragmentized android devices
X Zhang, Y Zhang, J Li, Y Hu, H Li, D Gu
2017 IEEE International Conference on Software Maintenance and Evolution …, 2017
132017
Differential fault analysis on lightweight blockciphers with statistical cryptanalysis techniques
D Gu, J Li, S Li, Z Ma, Z Guo, J Liu
2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, 27-33, 2012
132012
Binmatch: A semantics-based hybrid approach on binary code clone analysis
Y Hu, Y Zhang, J Li, H Wang, B Li, D Gu
2018 IEEE International Conference on Software Maintenance and Evolution …, 2018
122018
系统目前无法执行此操作,请稍后再试。
文章 1–20