How you get shot in the back: A systematical study about cryptojacking in the real world G Hong, Z Yang, S Yang, L Zhang, Y Nan, Z Zhang, M Yang, Y Zhang, ... Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 147 | 2018 |
SoK: MEV Countermeasures: Theory and Practice S Yang, F Zhang, K Huang, X Chen, Y Yang, F Zhu arXiv preprint arXiv:2212.05111, 2022 | 35 | 2022 |
Coverage-guided tensor compiler fuzzing with joint IR-pass mutation J Liu, Y Wei, S Yang, Y Deng, L Zhang Proceedings of the ACM on Programming Languages 6 (OOPSLA1), 1-26, 2022 | 27 | 2022 |
App in the middle: Demystify application virtualization in Android and its security threats L Zhang, Z Yang, Y He, M Li, S Yang, M Yang, Y Zhang, Z Qian Proceedings of the ACM on Measurement and Analysis of Computing Systems 3 (1 …, 2019 | 23 | 2019 |
Analyzing Ground-Truth Data of Mobile Gambling Scams G Hong, Z Yang, S Yang, X Liao, X Du, M Yang, H Duan 2022 IEEE Symposium on Security and Privacy (SP), 2176-2193, 2022 | 16 | 2022 |
MISO: Legacy-compatible Privacy-preserving Single Sign-on using Trusted Execution Environments R Xu, S Yang, F Zhang, Z Fang 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 352-372, 2023 | 2 | 2023 |
Decentralization of Ethereum's Builder Market S Yang, K Nayak, F Zhang arXiv preprint arXiv:2405.01329, 2024 | | 2024 |