Xiangyu Liu
Xiangyu Liu
Alibaba Group
Verified email at alibaba-inc.com
Title
Cited by
Cited by
Year
When good becomes evil: Keystroke inference with smartwatch
X Liu, Z Zhou, W Diao, Z Li, K Zhang
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1352015
Your voice assistant is mine: How to abuse speakers to steal information and control your phone
W Diao, X Liu, Z Zhou, K Zhang
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014
1082014
Acoustic fingerprinting revisited: Generate stable device id stealthily with inaudible sound
Z Zhou, W Diao, X Liu, K Zhang
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
772014
No pardon for the interruption: New inference attacks on android through interrupt timing analysis
W Diao, X Liu, Z Li, K Zhang
2016 IEEE Symposium on Security and Privacy (SP), 414-432, 2016
372016
Understanding Android obfuscation techniques: A large-scale investigation in the wild
S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu, K Chen, X Wang, K Zhang
International Conference on Security and Privacy in Communication Systems …, 2018
342018
An empirical study on android for saving non-shared data on public storage
X Liu, Z Zhou, W Diao, Z Li, K Zhang
IFIP International Information Security and Privacy Conference, 542-556, 2015
18*2015
Evading android runtime analysis through detecting programmed interactions
W Diao, X Liu, Z Li, K Zhang
Proceedings of the 9th ACM conference on security & privacy in wireless and …, 2016
162016
Vulnerable gpu memory management: towards recovering raw data from gpu
Z Zhou, W Diao, X Liu, Z Li, K Zhang, R Liu
Proceedings on Privacy Enhancing Technologies 2017 (2), 57-73, 2017
132017
Invisible mask: Practical attacks on face recognition with infrared
Z Zhou, D Tang, X Wang, W Han, X Liu, K Zhang
arXiv preprint arXiv:1803.04683, 2018
102018
Protecting Mobile Networks and Devices: Challenges and Solutions
W Meng, X Luo, S Furnell, J Zhou
CRC Press, 2016
52016
Kindness is a Risky Business: On the Usage of the Accessibility APIs in Android
W Diao, Y Zhang, L Zhang, Z Li, F Xu, X Pan, X Liu, J Weng, K Zhang, ...
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
32019
Mind-reading: Privacy attacks exploiting cross-app KeyEvent injections
W Diao, X Liu, Z Zhou, K Zhang, Z Li
European Symposium on Research in Computer Security, 20-39, 2015
32015
Hardening the core: Understanding and detection of XNU kernel vulnerabilities
X Liu, M Zheng, A Pan, Q Lu
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
12018
Accessing mobile user’s privacy based on IME personalization: Understanding and practical attacks
W Diao, R Liu, X Liu, Z Zhou, Z Li, K Zhang
Journal of Computer Security 26 (3), 283-309, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–14