Issue Date |
Title |
Author(s) |
2014 |
AdHoneyDroid-Capture malicious android advertisements |
Wang, Dongqi;Dai, Shuaifu;Ding, Yu;Li, Tongxin;Han, Xinhui |
2017 |
Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos |
Bai, Xiaolong;Xing, Luyi;Zhang, Nan;Wang, XiaoFeng;Liao, Xiaojing;Li, Tongxin;Hu, Shi-Min |
2015 |
Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS X and iOS |
Xing, Luyi;Bai, Xiaolong;Li, Tongxin;Wang, XiaoFeng;Chen, Kai;Liao, Xiaojing;Hu, Shi-Min;Han, Xinhui |
2017 |
Filtering for Malice Through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level |
Chen, Kai;Li, Tongxin;Ma, Bin;Wang, Peng;Wang, Xiao Feng;Zong, Peiyuan |
2017 |
Ghost Installer in the Shadow: Security Analysis of App Installation on Android |
Lee, Yeonjoon;Li, Tongxin;Zhang, Nan;Demetriou, Soteris;Zha, Mingming;Wang, XiaoFeng;Chen, Kai;Zhou, Xiaoyong;Han, Xinhui;Grace, Michael |
2014 |
Mayhem in the push clouds: Understanding and mitigating security hazards in mobile push-messaging services |
Li, Tongxin;Zhou, Xiaoyong;Xing, Luyi;Lee, Yeonjoon;Naveed, Muhammad;Wang, Xiao Feng;Han, Xinhui |
2015 |
Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging Integrations |
Chen, Yangyi;Li, Tongxin;Wang, XiaoFeng;Chen, Kai;Han, Xinhui |
2017 |
Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment |
Bai, Xiaolong;Zhou, Zhe;Wang, XiaoFeng;Li, Zhou;Mi, Xianghang;Zhang, Nan;Li, Tongxin;Hui, Shi-Min;Zhang, Kehuan |
2020 |
ReDex: Unpacking Android Packed Apps by Executing Every Method |
Cai, Jiajin;Li, Tongxin;Huang, Can;Han, Xinhui |
2016 |
Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf |
Bai, Xiaolong;Xing, Luyi;Zhang, Nan;Wang, XiaoFeng;Liao, Xiaojing;Li, Tongxin;Hu, Shi-Min |