Cloak and dagger: from two permissions to complete control of the UI feedback loop Y Fratantonio, C Qian, SP Chung, W Lee 2017 IEEE Symposium on Security and Privacy (SP), 1041-1057, 2017 | 157 | 2017 |
Towards a scalable resource-driven approach for detecting repackaged android applications Y Shao, X Luo, C Qian, P Zhu, L Zhang Proceedings of the 30th Annual Computer Security Applications Conference, 56-65, 2014 | 144 | 2014 |
Enforcing unique code target property for control-flow integrity H Hu, C Qian, C Yagemann, SPH Chung, WR Harris, T Kim, W Lee Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 137 | 2018 |
Efficient Protection of {Path-Sensitive} Control Security R Ding, C Qian, C Song, B Harris, T Kim, W Lee 26th USENIX Security Symposium (USENIX Security 17), 131-148, 2017 | 127 | 2017 |
{RAZOR}: A framework for post-deployment software debloating C Qian, H Hu, M Alharthi, PH Chung, T Kim, W Lee 28th USENIX security symposium (USENIX Security 19), 1733-1750, 2019 | 119 | 2019 |
On tracking information flows through jni in android applications C Qian, X Luo, Y Shao, ATS Chan 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014 | 113 | 2014 |
Toward engineering a secure android ecosystem: A survey of existing techniques M Xu, C Song, Y Ji, MW Shih, K Lu, C Zheng, R Duan, Y Jang, B Lee, ... ACM Computing Surveys (CSUR) 49 (2), 1-47, 2016 | 110 | 2016 |
Precise and scalable detection of double-fetch bugs in OS kernels M Xu, C Qian, K Lu, M Backes, T Kim 2018 IEEE Symposium on Security and Privacy (SP), 661-678, 2018 | 89 | 2018 |
Enhancing the description-to-behavior fidelity in android apps with privacy policy L Yu, X Luo, C Qian, S Wang, HKN Leung IEEE Transactions on Software Engineering 44 (9), 834-854, 2017 | 71 | 2017 |
Rootguard: Protecting rooted android phones Y Shao, X Luo, C Qian Computer 47 (6), 32-40, 2014 | 61 | 2014 |
NDroid: Toward tracking information flows across multiple Android contexts L Xue, C Qian, H Zhou, X Luo, Y Zhou, Y Shao, ATS Chan IEEE Transactions on Information Forensics and Security 14 (3), 814-828, 2018 | 59 | 2018 |
Vulhunter: toward discovering vulnerabilities in android applications C Qian, X Luo, Y Le, G Gu IEEE Micro 35 (1), 44-53, 2015 | 54 | 2015 |
Revisiting the description-to-behavior fidelity in android applications L Yu, X Luo, C Qian, S Wang 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and …, 2016 | 40 | 2016 |
Slimium: Debloating the chromium browser with feature subsetting C Qian, H Koo, CS Oh, T Kim, W Lee Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 38 | 2020 |
Rampart: Protecting Web Applications from {CPU-Exhaustion}{Denial-of-Service} Attacks W Meng, C Qian, S Hao, K Borgolte, G Vigna, C Kruegel, W Lee 27th USENIX Security Symposium (USENIX Security 18), 393-410, 2018 | 35 | 2018 |
Androidperf: A cross-layer profiling system for android applications L Xue, C Qian, X Luo 2015 IEEE 23rd International Symposium on Quality of Service (IWQoS), 115-124, 2015 | 19 | 2015 |
On measuring one-way path metrics from a web server X Luo, L Xue, C Shi, Y Shao, C Qian, EWW Chan 2014 IEEE 22nd International Conference on Network Protocols, 203-208, 2014 | 7 | 2014 |
CydiOS: A Model-Based Testing Framework for iOS Apps S Wu, J Li, H Zhou, Y Fang, K Zhao, H Wang, C Qian, X Luo Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023 | 3 | 2023 |
Revisiting Automotive Attack Surfaces: a Practitioners' Perspective P Jing, Z Cai, Y Cao, L Yu, Y Du, W Zhang, C Qian, X Luo, S Nie, S Wu 2024 IEEE Symposium on Security and Privacy (SP), 80-80, 2023 | 2 | 2023 |
Deview: Confining progressive web applications by debloating web apis CS Oh, S Lee, C Qian, H Koo, W Lee Proceedings of the 38th Annual Computer Security Applications Conference …, 2022 | 2 | 2022 |