Yeonjoon Lee
Yeonjoon Lee
Assistant Professor of College of Computing, Hanyang University
Verified email at - Homepage
Cited by
Cited by
Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale
K Chen, P Wang, Y Lee, XF Wang, N Zhang, H Huang, W Zou, P Liu
24th USENIX Security Symposium (USENIX Security 15), 2015
The peril of fragmentation: Security hazards in android device driver customizations
X Zhou, Y Lee, N Zhang, M Naveed, XF Wang
2014 IEEE Symposium on Security and Privacy, 409-423, 2014
What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources
S Demetriou, X Zhou, M Naveed, Y Lee, X Yuan, W Kan, C Gunter
NDSS, 2015
Following devil's footprints: Cross-platform analysis of potentially harmful libraries on android and ios
K Chen, X Wang, Y Chen, P Wang, Y Lee, XF Wang, B Ma, A Wang, ...
2016 IEEE Symposium on Security and Privacy (SP), 357-376, 2016
Mayhem in the push clouds: Understanding and mitigating security hazards in mobile push-messaging services
T Li, X Zhou, L Xing, Y Lee, M Naveed, XF Wang, X Han
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps
S Demetriou, N Zhang, Y Lee, XF Wang, CA Gunter, X Zhou, M Grace
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017
Mass discovery of android traffic imprints through instantiated partial execution
Y Chen, W You, Y Lee, K Chen, XF Wang, W Zou
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Ghost Installer in the Shadow: Security Analysis of App Installation on Android
Y Lee, T Li, N Zhang, S Demetriou, M Zha, XF Wang, K Chen, X Zhou, ...
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
Understanding iOS-based Crowdturfing Through Hidden {UI} Analysis
Y Lee, X Wang, K Lee, X Liao, XF Wang, T Li, X Mi
28th {USENIX} Security Symposium ({USENIX} Security 19), 765-781, 2019
Using Sonar for Liveness Detection to Protect Smart Speakers against Remote Attackers
Y Lee, Y Zhao, J Zeng, K Lee, N Zhang, FH Shezan, Y Tian, K Chen, ...
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2020
Understanding Illicit UI in iOS apps Through Hidden UI Analysis
Y Lee, X Wang, X Liao, XF Wang
IEEE Transactions on Dependable and Secure Computing, 2019
Demystifying Resource Management Risks in Emerging Mobile App-in-App Ecosystems
H Lu, L Xing, Y Xiao, Y Zhang, X Liao, XF Wang, X Wang, Y Lee, ...
The system can't perform the operation now. Try again later.
Articles 1–12