Framework for computer application analysis of sensitive information tracking OA Ismael, D Song, PT Ha, PJ Gilbert, H Xue US Patent 9,159,035, 2015 | 225 | 2015 |
Framework for efficient security coverage of mobile software applications OA Ismael, D Song, A Aziz, N Johnson, P Mohan, H Xue US Patent 9,176,843, 2015 | 223 | 2015 |
Digging for Data Structures. A Cozzie, F Stratton, H Xue, ST King OSDI 8, 255-266, 2008 | 191 | 2008 |
Framework for efficient security coverage of mobile software applications using symbolic execution to reach regions of interest within an application OA Ismael, D Song, H Xue US Patent 9,367,681, 2016 | 183 | 2016 |
Framework for efficient security coverage of mobile software applications using machine learning OA Ismael, D Song, PT Ha, PJ Gilbert, H Xue US Patent 9,594,905, 2017 | 155 | 2017 |
Framework for efficient security coverage of mobile software applications OA Ismael, D Song, A Aziz, N Johnson, P Mohan, H Xue US Patent 10,296,437, 2019 | 142 | 2019 |
Towards discovering and understanding task hijacking in android C Ren, Y Zhang, H Xue, T Wei, P Liu 24th USENIX Security Symposium (USENIX Security 15), 945-959, 2015 | 122 | 2015 |
Verifying security invariants in ExpressOS H Mai, E Pek, H Xue, ST King, P Madhusudan Proceedings of the eighteenth international conference on Architectural …, 2013 | 70 | 2013 |
Fingerprints on mobile devices: Abusing and leaking Y Zhang, Z Chen, H Xue, T Wei Black Hat Conference, 2015 | 63 | 2015 |
Using replicated execution for a more secure and reliable web browser H Xue, N Dautenhahn, ST King Proc. of the 19th Network and Distributed System Security Symposium (NDSS’12), 2012 | 23 | 2012 |
Enpublic apps: Security threats using ios enterprise and developer certificates M Zheng, H Xue, Y Zhang, T Wei, JCS Lui Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015 | 19 | 2015 |
Accurate and efficient exploit capture and classification Y Ding, T Wei, H Xue, Y Zhang, C Zhang, X Han Science China. Information Sciences 60 (5), 052110, 2017 | 12 | 2017 |
Sidewinder Targeted Attack against Android in The Golden Age of Ad Libraries T Wei, Y Zhang, H Xue, M Zheng, C Ren, D Song | 12 | 2014 |
Operation and security considerations of federated learning platform based on compute first network L Zhao, X Tang, Z You, Y Pang, H Xue, L Zhu 2020 IEEE/CIC International Conference on Communications in China (ICCC …, 2020 | 11 | 2020 |
User interface for displaying network analytics PG Murray, S Shan, Z Wu, Y Xie, H Xue, F Yu US Patent App. 15/459,664, 2017 | 11 | 2017 |
Using redundancy to improve security and testing H Xue University of Illinois at Urbana-Champaign, 2013 | 10 | 2013 |
Apple without a shell–iOS under targeted attack T Wei, M Zheng, H Xue, D Song Virus Bulletin Conference, 2014 | 6 | 2014 |
A method for information protection in collaborative assembly design H Xue, J Li Ninth International Conference on Computer Aided Design and Computer …, 2005 | 6 | 2005 |
Masque Attack: All Your iOS Apps Belong to Us H Xue, T Wei, Y Zhang FireEye Blog, 2014 | 5 | 2014 |
Monitoring Vulnaggressive Apps on Google Play Y Zhang, H Xue, T Wei, D Song FireEye Blog, 2013 | 4 | 2013 |