Följ
Luyi Xing
Luyi Xing
Assistant Professor of Computer Science, Indiana University Bloomington
Verifierad e-postadress på indiana.edu - Startsida
Titel
Citeras av
Citeras av
År
Acing the ioc game: Toward automatic discovery and analysis of open-source cyber threat intelligence
X Liao, K Yuan, XF Wang, Z Li, L Xing, R Beyah
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
3302016
Upgrading your android, elevating my malware: Privilege escalation through mobile os updating
L Xing, X Pan, R Wang, K Yuan, XF Wang
2014 IEEE symposium on security and privacy, 393-408, 2014
1682014
Unauthorized origin crossing on mobile platforms: Threats and mitigation
R Wang, L Xing, XF Wang, S Chen
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1252013
Integuard: Toward automatic protection of third-party web service integrations
L Xing, Y Chen, XF Wang, S Chen
Network & Distributed System Security Symposium (NDSS), 2013
732013
Burglars’ iot paradise: Understanding and mitigating security risks of general messaging protocols on iot clouds
Y Jia, L Xing, Y Mao, D Zhao, XF Wang, S Zhao, Y Zhang
2020 IEEE Symposium on Security and Privacy (SP), 465-481, 2020
652020
Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services
XH Tongxin Li, Xiaoyong Zhou, Luyi Xing, Yeonjoon Lee, Muhammad Naveed ...
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
582014
Unleashing the walking dead: Understanding cross-app remote infections on mobile webviews
T Li, X Wang, M Zha, K Chen, XF Wang, L Xing, X Bai, N Zhang, X Han
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
522017
Evil under the sun: Understanding and discovering attacks on ethereum decentralized applications
L Su, X Shen, X Du, X Liao, XF Wang, L Xing, B Liu
30th USENIX Security Symposium (USENIX Security 21), 1307-1324, 2021
502021
Shattered Chain of Trust: Understanding Security Risks in {Cross-Cloud}{IoT} Access Delegation
B Yuan, Y Jia, L Xing, D Zhao, XF Wang, Y Zhang
29th USENIX security symposium (USENIX security 20), 1183-1200, 2020
472020
Staying secure and unprepared: Understanding and mitigating the security risks of apple zeroconf
X Bai, L Xing, N Zhang, XF Wang, X Liao, T Li, SM Hu
2016 IEEE Symposium on Security and Privacy (SP), 655-674, 2016
462016
Seeking nonsense, looking for trouble: Efficient promotional-infection detection through semantic inconsistency search
X Liao, K Yuan, XF Wang, Z Pei, H Yang, J Chen, H Duan, K Du, ...
2016 IEEE Symposium on Security and Privacy (SP), 707-723, 2016
452016
Cracking app isolation on apple: Unauthorized cross-app resource access on MAC os~ x and ios
L Xing, X Bai, T Li, XF Wang, K Chen, X Liao, SM Hu, X Han
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
452015
Demystifying resource management risks in emerging mobile app-in-app ecosystems
H Lu, L Xing, Y Xiao, Y Zhang, X Liao, XF Wang, X Wang
Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020
382020
Devils in the guidance: predicting logic vulnerabilities in payment syndication services through automated documentation analysis
Y Chen, L Xing, Y Qin, X Liao, XF Wang, K Chen, W Zou
28th USENIX Security Symposium (USENIX Security 19), 747-764, 2019
362019
Understanding malicious cross-library data harvesting on android
J Wang, Y Xiao, X Wang, Y Nan, L Xing, X Liao, JW Dong, N Serrano, ...
30th USENIX Security Symposium (USENIX Security 21), 4133-4150, 2021
242021
Rtfm! automatic assumption discovery and verification derivation from library document for api misuse detection
T Lv, R Li, Y Yang, K Chen, X Liao, XF Wang, P Hu, L Xing
Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020
232020
Lurking malice in the cloud: Understanding and detecting cloud repository as a malicious service
X Liao, S Alrwais, K Yuan, L Xing, XF Wang, S Hao, R Beyah
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
202016
Unauthorized cross-app resource access on mac os x and ios
L Xing, X Bai, T Li, XF Wang, K Chen, X Liao, SM Hu, X Han
arXiv preprint arXiv:1505.06836, 2015
202015
Who's in control? On security risks of disjointed IoT device management channels
Y Jia, B Yuan, L Xing, D Zhao, Y Zhang, XF Wang, Y Liu, K Zheng, ...
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
192021
Robbery on devops: Understanding and mitigating illicit cryptomining on continuous integration service platforms
Z Li, W Liu, H Chen, XF Wang, X Liao, L Xing, M Zha, H Jin, D Zou
2022 IEEE Symposium on Security and Privacy (SP), 2397-2412, 2022
172022
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20