Asdroid: Detecting stealthy behaviors in android applications by user interface and program behavior contradiction J Huang, X Zhang, L Tan, P Wang, B Liang Proceedings of the 36th international conference on software engineering …, 2014 | 291 | 2014 |
Finding unknown malice in 10 seconds: Mass vetting for new threats at the {Google-Play} scale K Chen, P Wang, Y Lee, XF Wang, N Zhang, H Huang, W Zou, P Liu 24th USENIX Security Symposium (USENIX Security 15), 659-674, 2015 | 281 | 2015 |
Following devil's footprints: Cross-platform analysis of potentially harmful libraries on android and ios K Chen, X Wang, Y Chen, P Wang, Y Lee, XF Wang, B Ma, A Wang, ... 2016 IEEE Symposium on Security and Privacy (SP), 357-376, 2016 | 137 | 2016 |
Taintman: An art-compatible dynamic taint analysis framework on unmodified and non-rooted android devices W You, B Liang, W Shi, P Wang, X Zhang IEEE Transactions on Dependable and Secure Computing 17 (1), 209-222, 2017 | 60 | 2017 |
Under the shadow of sunshine: Understanding and detecting bulletproof hosting on legitimate service provider networks S Alrwais, X Liao, X Mi, P Wang, XF Wang, F Qian, R Beyah, D McCoy 2017 IEEE Symposium on Security and Privacy (SP), 805-823, 2017 | 58 | 2017 |
Cracking wall of confinement: Understanding and analyzing malicious domain takedowns E Alowaisheq The Network and Distributed System Security Symposium (NDSS), 2019 | 43 | 2019 |
Automatic Android GUI traversal with high coverage P Wang, B Liang, W You, J Li, W Shi 2014 Fourth International Conference on Communication Systems and Network …, 2014 | 38 | 2014 |
Reference hijacking: Patching, protecting and analyzing on unmodified and non-rooted android devices W You, B Liang, W Shi, S Zhu, P Wang, S Xie, X Zhang Proceedings of the 38th International Conference on Software Engineering …, 2016 | 35 | 2016 |
Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations P Wang, X Mi, X Liao, XF Wang, K Yuan, F Qian, R Beyah Proceedings of The 25th Annual Network And Distributed System Security Symposium, 2018 | 23 | 2018 |
Into the Deep Web: Understanding E-commerce Fraud from Autonomous Chat with Cybercriminals P Wang, X Liao, Y Qin, XF Wang The Network and Distributed System Security Symposium, 2020 | 13 | 2020 |
Price tag: towards semi-automatically discovery tactics, techniques and procedures of E-commerce cyber threat intelligence Y Wu, Q Liu, X Liao, S Ji, P Wang, X Wang, C Wu, Z Li IEEE Transactions on Dependable and Secure Computing, 2021 | 10 | 2021 |
Filtering for malice through the data ocean: Large-scale PHA install detection at the communication service provider level K Chen, T Li, B Ma, P Wang, XF Wang, P Zong Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017 | 4 | 2017 |
Demystifying local business search poisoning for illicit drug promotion P Wang, Z Lin, X Liao, XF Wang Proceeding of ISOC Network and Distributed System Security Symposium (NDSS …, 2022 | 2 | 2022 |
Control dependency analyses for detecting remote control Android malware LI Jingzhe, B LIANG, YOU Wei, W Peng, SHI Wenchang Journal of Tsinghua University (Science and Technology) 54 (1), 8-13, 2014 | | 2014 |
一种在Android中植入动态污点分析模块的方法 梁彬, 游伟, 王鹏, 石文昌 CN Patent CN103,177,210 A, 2013 | | 2013 |