Nan Zhang
TitleCited byYear
Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale
K Chen, P Wang, Y Lee, XF Wang, N Zhang, H Huang, W Zou, P Liu
24th USENIX Security Symposium (USENIX Security 15), 659-674, 2015
1462015
The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations
X Zhou, Y Lee, N Zhang, M Naveed, XF Wang
Security and Privacy (SP), 2014 IEEE Symposium on, 409-423, 2014
992014
Leave Me Alone: App-level Protection Against Runtime Information Gathering on Android
N Zhang, K Yuan, M Naveed, X Zhou, XF Wang
Security and Privacy (SP), 2015 IEEE Symposium on, 915-930, 2015
622015
Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References
N Zhang, Y Aafer, Z Zhang, X Zhang, K Chen, XF Wang, X Zhou, W Du, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
442015
SmartAuth: User-Centered Authorization for the Internet of Things
Y Tian, N Zhang, YH Lin, XF Wang, B Ur, XZ Guo, P Tague
26th {USENIX} Security Symposium ({USENIX} Security 17), 361-378, 2017
392017
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
272017
Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf
X Bai, L Xing, N Zhang, XF Wang, X Liao, T Li, SM Hu
Security and Privacy (SP), 2016 IEEE Symposium on, 2016
222016
Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews
T Li, X Wang, M Zha, K Chen, XF Wang, L Xing, X Bai, N Zhang, X Han
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
162017
Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home
N Zhang, X Mi, X Feng, XF Wang, Y Tian, F Qian
arXiv preprint arXiv:1805.01525, 2018
142018
HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps
S Demetriou, N Zhang, Y Lee, XF Wang, CA Gunter, X Zhou, M Grace
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017
132017
Picking up my tab: Understanding and mitigating synchronized token lifting and spending in mobile payment
X Bai, Z Zhou, XF Wang, Z Li, X Mi, N Zhang, T Li, SM Hu, K Zhang
26th {USENIX} Security Symposium ({USENIX} Security 17), 593-608, 2017
82017
Modeling and Analysis of Bifurcation in a Delayed Worm Propagation Model
Y Yao, N Zhang, W Xiang, G Yu, F Gao
Journal of Applied Mathematics 2013, 2013
72013
Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems
N Zhang, X Mi, X Feng, XF Wang, Y Tian, F Qian
Dangerous Skills: Understanding and Mitigating Security Risks of Voice …, 2019
42019
Ghost installer in the shadow: Security analysis of app installation on android
Y Lee, T Li, N Zhang, S Demetriou, M Zha, XF Wang, K Chen, X Zhou, ...
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
32017
Guardian of the HAN: Thwarting Mobile Attacks on Smart-Home Devices Using OS-level Situation Awareness
S Demetriou, N Zhang, Y Lee, X Wang, C Gunter, X Zhou, M Grace
arXiv preprint arXiv:1703.01537, 2017
22017
Apple ZeroConf holes: How hackers can steal iPhone photos
X Bai, L Xing, N Zhang, XF Wang, X Liao, T Li, SM Hu
IEEE Security & Privacy 15 (2), 42-49, 2017
12017
Non-invasive Privilege Escalation through Mobile and IoT System Interface: Threats and Mitigation
N Zhang
Indiana University, 2018
2018
Bifurcation in a Delayed Worm Propagation Model with Birth and Death Rates
Y Yao, N Zhang, FX Gao, G Yu
Systems and Informatics (ICSAI), 2012 International Conference on, 1517-1521, 2012
2012
Demystifying Hidden Privacy Settings in Mobile Apps
Y Chen, M Zha, N Zhang, D Xu, Q Zhao, F Xuan, K Yuan, F Suya, Y Tian, ...
Demystifying Hidden Privacy Settings in Mobile Apps, 0, 0
The system can't perform the operation now. Try again later.
Articles 1–19