Publications

Filter by type:

Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation

PDF Bib

OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS

PDF Bib

Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations

PDF Bib

Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps

PDF Bib

Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews

PDF Bib

SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits

PDF Bib

Mass Discovery of Android Traffic Imprints through Instantiated Partial Execution

PDF Bib

Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX

PDF Bib

SmartAuth: User-Centered Authorization for the Internet of Things

PDF Bib

Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment

PDF Bib

An empirical characterization of IFTTT: ecosystem, usage, and performance

PDF Bib

Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search

PDF Bib

Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS

PDF Bib

Practicing oblivious access on cloud storage: the gap, the fallacy, and the new way forward

PDF Bib

Perplexed messengers from the cloud: Automated security analysis of push-messaging integrations

PDF Bib

Hare hunting in the wild android: A study on the threat of hanging attribute references

PDF Bib

Efficient genome-wide, privacy-preserving similar patient query based on private edit distance

PDF Bib

Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS

PDF Bib

Uipicker: User-input privacy identification in mobile applications

PDF Bib

Finding unknown malice in 10 seconds: Mass vetting for new threats at the google-play scale

PDF Bib

Leave me alone: App-level protection against runtime information gathering on Android

PDF Bib

What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources.

PDF Bib

Mayhem in the push clouds: Understanding and mitigating security hazards in mobile push-messaging services

PDF Bib

Controlled functional encryption

PDF Bib

Understanding the dark side of domain parking

PDF Bib

Upgrading your android, elevating my malware: Privilege escalation through mobile os updating

PDF Bib

The peril of fragmentation: Security hazards in android device driver customizations

PDF Bib

Hunting the red fox online: Understanding and detection of mass redirect-script injections

PDF Bib

The Tangled Web of Password Reuse.

PDF Bib

Screenmilker: How to Milk Your Android Screen for Secrets.

PDF Bib

Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android.

PDF Bib

Privacy Risk in Anonymized Heterogeneous Information Networks.

PDF Bib

Choosing blindly but wisely: differentially private solicitation of DNA datasets for disease marker discovery

PDF Bib

Unauthorized origin crossing on mobile platforms: Threats and mitigation

PDF Bib

Identity, location, disease and more: Inferring your secrets from android public resources

PDF Bib

InteGuard: Toward Automatic Protection of Third-Party Web Service Integrations.

PDF Bib

Knowing your enemy: understanding and detecting malicious web advertising

PDF Bib

Sedic: privacy-aware data intensive computing on hybrid clouds

PDF Bib

To release or not to release: evaluating information leaks in aggregate human-genome data

PDF Bib

Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones.

PDF Bib

Side-channel leaks in web applications: A reality today, a challenge tomorrow

PDF Bib

Privacy-preserving genomic computation through program specialization

PDF Bib

Learning your identity and disease from research papers: information leaks in genome wide association study

PDF Bib

Effective and Efficient Malware Detection at the End Host.

PDF Bib

Mitigating inadvertent insider threats with incentives

PDF Bib

Denial of service attacks and defenses in decentralized trust management

PDF Bib

Towards automatic reverse engineering of software security configurations

PDF Bib

Agis: Towards automatic generation of infection signatures

PDF Bib

PRECIP: Towards Practical and Retrofittable Confidential Information Protection.

PDF Bib

Making captchas clickable

PDF Bib

Spyshield: Preserving privacy from spy add-ons

PDF Bib

Packet vaccine: Black-box exploit detection and signature generation

PDF Bib

Deterring voluntary trace disclosure in re-encryption mix networks

PDF Bib

Building reliable mix networks with fair exchange

PDF Bib

Fragile mixing

PDF Bib

Stealth Attacks on Vehicular Wireless Networks

PDF Bib