Xueqiang Wang
Cited by
Cited by
Privacy loss in Apple's implementation of differential privacy on MacOS 10.12
J Tang, A Korolova, X Bai, X Wang, X Wang
arXiv preprint arXiv:1709.02753, 2017
DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices.
X Wang, K Sun, Y Wang, J Jing
NDSS, 2015
Following devil's footprints: Cross-platform analysis of potentially harmful libraries on android and ios
K Chen, X Wang, Y Chen, P Wang, Y Lee, XF Wang, B Ma, A Wang, ...
2016 IEEE Symposium on Security and Privacy (SP), 357-376, 2016
Things You May Not Know About Android (Un) Packers: A Systematic Study based on Whole-System Emulation.
Y Duan, M Zhang, AV Bhaskar, H Yin, X Pan, T Li, X Wang, XF Wang
NDSS, 2018
Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps.
X Pan, X Wang, Y Duan, XF Wang, H Yin
NDSS, 2017
ProFuzzer: On-the-fly Input Type Probing for Better Zero-Day Vulnerability Discovery
W You, X Wang, S Ma, J Huang, X Zhang, XF Wang, B Liang
IEEE Symposium on Security and Privacy 2019, 0, 2019
Unleashing the walking dead: Understanding cross-app remote infections on mobile webviews
T Li, X Wang, M Zha, K Chen, XF Wang, L Xing, X Bai, N Zhang, X Han
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Os-level side channels without procfs: Exploring cross-app information leakage on ios
X Zhang, X Wang, X Bai, Y Zhang, XF Wang
Proceedings of the Symposium on Network and Distributed System Security, 2018
Looking from the Mirror: Evaluating IoT Device Security through Mobile Companion Apps
X Wang, Y Sun, S Nanda, XF Wang
28th {USENIX} Security Symposium ({USENIX} Security 19), 1151-1167, 2019
WrapDroid: Flexible and fine-grained scheme towards regulating behaviors of Android apps
X Wang, Y Wang, L Liu, L Lei, J Jing
International Conference on Information Security and Cryptology, 255-268, 2014
Understanding iOS-based Crowdturfing Through Hidden {UI} Analysis
X Wang, Y Lee, K Lee, X Liao, XF Wang, T Li, X Mi
28th {USENIX} Security Symposium ({USENIX} Security 19), 765-781, 2019
Understanding Illicit UI in iOS apps Through Hidden UI Analysis
X Wang, Y Lee, X Liao, XF Wang
IEEE Transactions on Dependable and Secure Computing, 2019
Demystifying Resource Management Risks in Emerging Mobile App-in-App Ecosystems
H Lu, L Xing, Y Xiao, Y Zhang, X Liao, XF Wang, X Wang, Y Lee, ...
The system can't perform the operation now. Try again later.
Articles 1–13