Code injection attacks on html5-based mobile apps: Characterization, detection and mitigation X Jin, X Hu, K Ying, W Du, H Yin, GN Peri Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 245 | 2014 |
Truz-droid: Integrating trustzone with mobile operating system K Ying, A Ahlawat, B Alsharifi, Y Jiang, P Thavai, W Du Proceedings of the 16th annual international conference on mobile systems …, 2018 | 56 | 2018 |
Life after App Uninstallation: Are the Data Still Alive? Data Residue Attacks on Android. X Zhang, K Ying, Y Aafer, Z Qiu, W Du NDSS, 2016 | 44 | 2016 |
Truz-view: Developing trustzone user interface for mobile os using delegation integration model K Ying, P Thavai, W Du Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019 | 23 | 2019 |
Hey, you, get off of my image: detecting data residue in android images X Zhang, Y Aafer, K Ying, W Du Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016 | 10 | 2016 |
Integrating TrustZone Protection with Communication Paths for Mobile Operating System K Ying Syracuse University, 2019 | 2 | 2019 |
Superman Powered by Kryptonite: Turn the Adversarial Attack into Your Defense Weapon K Ying, T Luo, Z Su, X Xing | 1 | 2020 |