Follow
Peng Wang
Title
Cited by
Cited by
Year
Asdroid: Detecting stealthy behaviors in android applications by user interface and program behavior contradiction
J Huang, X Zhang, L Tan, P Wang, B Liang
Proceedings of the 36th international conference on software engineering …, 2014
2902014
Finding unknown malice in 10 seconds: Mass vetting for new threats at the {Google-Play} scale
K Chen, P Wang, Y Lee, XF Wang, N Zhang, H Huang, W Zou, P Liu
24th USENIX Security Symposium (USENIX Security 15), 659-674, 2015
2792015
Following devil's footprints: Cross-platform analysis of potentially harmful libraries on android and ios
K Chen, X Wang, Y Chen, P Wang, Y Lee, XF Wang, B Ma, A Wang, ...
2016 IEEE Symposium on Security and Privacy (SP), 357-376, 2016
1342016
Taintman: An art-compatible dynamic taint analysis framework on unmodified and non-rooted android devices
W You, B Liang, W Shi, P Wang, X Zhang
IEEE Transactions on Dependable and Secure Computing 17 (1), 209-222, 2017
592017
Under the shadow of sunshine: Understanding and detecting bulletproof hosting on legitimate service provider networks
S Alrwais, X Liao, X Mi, P Wang, XF Wang, F Qian, R Beyah, D McCoy
2017 IEEE Symposium on Security and Privacy (SP), 805-823, 2017
532017
Cracking wall of confinement: Understanding and analyzing malicious domain takedowns
E Alowaisheq
The Network and Distributed System Security Symposium (NDSS), 2019
412019
Automatic Android GUI traversal with high coverage
P Wang, B Liang, W You, J Li, W Shi
2014 Fourth International Conference on Communication Systems and Network …, 2014
382014
Reference hijacking: Patching, protecting and analyzing on unmodified and non-rooted android devices
W You, B Liang, W Shi, S Zhu, P Wang, S Xie, X Zhang
Proceedings of the 38th International Conference on Software Engineering …, 2016
352016
Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations
P Wang, X Mi, X Liao, XF Wang, K Yuan, F Qian, R Beyah
Proceedings of The 25th Annual Network And Distributed System Security Symposium, 2018
192018
Into the Deep Web: Understanding E-commerce Fraud from Autonomous Chat with Cybercriminals
P Wang, X Liao, Y Qin, XF Wang
The Network and Distributed System Security Symposium, 2020
112020
Price tag: towards semi-automatically discovery tactics, techniques and procedures of E-commerce cyber threat intelligence
Y Wu, Q Liu, X Liao, S Ji, P Wang, X Wang, C Wu, Z Li
IEEE Transactions on Dependable and Secure Computing, 2021
92021
Filtering for malice through the data ocean: Large-scale PHA install detection at the communication service provider level
K Chen, T Li, B Ma, P Wang, XF Wang, P Zong
Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017
42017
Demystifying local business search poisoning for illicit drug promotion
P Wang, Z Lin, X Liao, XF Wang
Proceeding of ISOC Network and Distributed System Security Symposium (NDSS …, 2022
12022
Control dependency analyses for detecting remote control Android malware
LI Jingzhe, B LIANG, YOU Wei, W Peng, SHI Wenchang
Journal of Tsinghua University (Science and Technology) 54 (1), 8-13, 2014
2014
一种在Android中植入动态污点分析模块的方法
梁彬, 游伟, 王鹏, 石文昌
CN Patent CN103,177,210 A, 2013
2013
The system can't perform the operation now. Try again later.
Articles 1–15