Goshawk: Hunting memory corruptions via structure-aware and object-centric memory operation synopsis Y Lyu, Y Fang, Y Zhang, Q Sun, S Ma, E Bertino, K Lu, J Li 2022 IEEE Symposium on Security and Privacy (SP), 2096-2113, 2022 | 13 | 2022 |
EvilScreen attack: smart TV hijacking via multi-channel remote control mimicry Y Zhang, S Ma, T Chen, J Li, RH Deng, E Bertino IEEE Transactions on Dependable and Secure Computing, 2023 | 4 | 2023 |
Kingfisher: Unveiling insecurely used credentials in iot-to-mobile communications Y Zhang, S Ma, J Li, D Gu, E Bertino 2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems …, 2022 | 4 | 2022 |
Medusa Attack: Exploring Security Hazards of {In-App}{QR} Code Scanning X Han, Y Zhang, X Zhang, Z Chen, M Wang, Y Zhang, S Ma, Y Yu, ... 32nd USENIX Security Symposium (USENIX Security 23), 4607-4624, 2023 | 1 | 2023 |
Rethinking the security of IoT from the perspective of developer customized device-cloud interaction Y Zhang, J Li, D Gu Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing, 210-213, 2022 | 1 | 2022 |
PEDroid: Automatically Extracting Patches from Android App Updates H Li, Y Wang, Y Zhang, J Li, D Gu 36th European Conference on Object-Oriented Programming (ECOOP 2022), 2022 | 1 | 2022 |