Home
People
Publications
Join US
Contact
1
Easy As Child’s Play: An Empirical Study on Age Verification of Adult-Oriented Android Apps
Click the Cite button above to demo the feature to enable visitors to import publication metadata into their reference management software. Supplementary notes can be added here, including [code and math](https://wowchemy.
Yifan Yao
,
Shawn McCollum
,
Zhibo (Eric) Sun
,
Yue Zhang
PDF
Cite
From Victims to Defenders: An Exploration of the Phishing Attack Reporting Ecosystem
Click the Cite button above to demo the feature to enable visitors to import publication metadata into their reference management software. Supplementary notes can be added here, including [code and math](https://wowchemy.
Zhibo (Eric) Sun
,
Faris Bugra Kokulu
,
Penghui Zhang
,
Adam Oest
,
Gianluca Stringhini
,
Tiffany Bao
,
Ruoyu Wang
,
Yan Shoshitaishvili
,
Adam Doupe
,
Gail-Joon Ahn
PDF
Cite
Nothing Personal: Understanding the Theft, Spread, and Use of Personally Identifiable Information in the Financial Ecosystem
Click the Cite button above to demo the feature to enable visitors to import publication metadata into their reference management software. Supplementary notes can be added here, including [code and math](https://wowchemy.
Mehrnoosh Zaeifi
,
Faezeh Kalantari
,
Adam Oest
,
Zhibo (Eric) Sun
,
Gail-Joon Ahn
,
Yan Shoshitaishvili
,
Tiffany Bao
,
Ruoyu Wang
,
Adam Doupe
PDF
Cite
A Friends Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Driver
Click the Cite button above to demo the feature to enable visitors to import publication metadata into their reference management software. Supplementary notes can be added here, including [code and math](https://wowchemy.
Chongqing Lei
,
Zhen Ling
,
Yue Zhang
,
Yan Yang
,
Junzhou Luo
,
Xinwen Fu
PDF
Cite
Don’t Leak Your Keys: Understanding, Measuring, and Exploiting the AppSecret Leaks in Mini-Programs
Click the Cite button above to demo the feature to enable visitors to import publication metadata into their reference management software. Supplementary notes can be added here, including [code and math](https://wowchemy.
Yue Zhang
,
Yuqing Yang
,
Zhiqiang Lin
PDF
Cite
Uncovering and Exploiting Hidden APIs in Mobile Super Apps
Click the Cite button above to demo the feature to enable visitors to import publication metadata into their reference management software. Supplementary notes can be added here, including [code and math](https://wowchemy.
Chao Wang
,
Yue Zhang
,
Zhiqiang Lin
PDF
Cite
One Size Does Not Fit All: Uncovering and Exploiting Cross Platform Discrepant APIs in WeChat
Click the Cite button above to demo the feature to enable visitors to import publication metadata into their reference management software. Supplementary notes can be added here, including [code and math](https://wowchemy.
Chao Wang
,
Yue Zhang
,
Zhiqiang Lin
PDF
Cite
Do Not Give a Dog Bread Every Time He Wags His Tail: Stealing Passwords through Content Queries (CONQUER) Attacks
Click the Cite button above to demo the feature to enable visitors to import publication metadata into their reference management software. Supplementary notes can be added here, including [code and math](https://wowchemy.
Chongqing Lei
,
Zhen Ling
,
Yue Zhang
,
Kai Dong
,
Kaizheng Liu
,
Junzhou Luo
,
Xinwen Fu
PDF
Cite
Extrapolating Formal Analysis to Uncover Attacks in Bluetooth Passkey Entry Pairing
Click the Cite button above to demo the feature to enable visitors to import publication metadata into their reference management software. Supplementary notes can be added here, including [code and math](https://wowchemy.
Mohit K. Jangid
,
Yue Zhang
,
Zhiqiang Lin
PDF
Cite
Fusion: Efficient and Secure Inference Resilient to Malicious Servers
Click the Cite button above to demo the feature to enable visitors to import publication metadata into their reference management software. Supplementary notes can be added here, including [code and math](https://wowchemy.
Caiqin Dong
,
Jian Weng
,
Jia-Nan Liu
,
Yue Zhang
,
Yao Tong
,
Anjia Yang
,
Yudan Cheng
,
Shun Hu
PDF
Cite
»
Cite
×