The impact of vendor customizations on android security L Wu, M Grace, Y Zhou, C Wu, X Jiang Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 257 | 2013 |
Honeypot detection in advanced botnet attacks P Wang, L Wu, R Cunningham, CC Zou International Journal of Information and Computer Security 4 (1), 30-51, 2010 | 157 | 2010 |
A systematic study on peer-to-peer botnets P Wang, L Wu, B Aslam, CC Zou 2009 Proceedings of 18th International Conference on Computer Communications …, 2009 | 141 | 2009 |
Characterizing cryptocurrency exchange scams P Xia, H Wang, B Zhang, R Ji, B Gao, L Wu, X Luo, G Xu Computers & Security 98, 101993, 2020 | 103 | 2020 |
Towards a first step to understand flash loan and its applications in defi ecosystem D Wang, S Wu, Z Lin, L Wu, X Yuan, Y Zhou, H Wang, K Ren Proceedings of the Ninth International Workshop on Security in Blockchain …, 2021 | 89 | 2021 |
Characterizing code clones in the ethereum smart contract ecosystem N He, L Wu, H Wang, Y Guo, X Jiang Financial Cryptography and Data Security: 24th International Conference, FC …, 2020 | 88 | 2020 |
{EOSAFE}: security analysis of {EOSIO} smart contracts N He, R Zhang, H Wang, L Wu, X Luo, Y Guo, T Yu, X Jiang 30th USENIX security symposium (USENIX Security 21), 1271-1288, 2021 | 69 | 2021 |
Defiranger: Detecting price manipulation attacks on defi applications S Wu, D Wang, J He, Y Zhou, L Wu, X Yuan, Q He, K Ren arXiv preprint arXiv:2104.15068, 2021 | 67 | 2021 |
Towards understanding and demystifying bitcoin mixing services L Wu, Y Hu, Y Zhou, H Wang, X Luo, Z Wang, F Zhang, K Ren Proceedings of the Web Conference 2021, 33-44, 2021 | 63 | 2021 |
Sadponzi: Detecting and characterizing ponzi schemes in ethereum smart contracts W Chen, X Li, Y Sui, N He, H Wang, L Wu, X Luo Proceedings of the ACM on Measurement and Analysis of Computing Systems 5 (2 …, 2021 | 59 | 2021 |
Harvesting developer credentials in android apps Y Zhou, L Wu, Z Wang, X Jiang Proceedings of the 8th ACM conference on security & privacy in wireless and …, 2015 | 59 | 2015 |
Understanding (mis) behavior on the eosio blockchain Y Huang, H Wang, L Wu, G Tyson, X Luo, R Zhang, X Liu, G Huang, ... Proceedings of the ACM on Measurement and Analysis of Computing Systems 4 (2 …, 2020 | 55 | 2020 |
Don’t fish in troubled waters! characterizing coronavirus-themed cryptocurrency scams P Xia, H Wang, X Luo, L Wu, Y Zhou, G Bai, G Xu, G Huang, X Liu 2020 APWG Symposium on Electronic Crime Research (eCrime), 1-14, 2020 | 52 | 2020 |
Mobile app squatting Y Hu, H Wang, R He, L Li, G Tyson, I Castro, Y Guo, L Wu, G Xu Proceedings of The Web Conference 2020, 1727-1738, 2020 | 38 | 2020 |
Characterizing eosio blockchain Y Huang, H Wang, L Wu, G Tyson, X Luo, R Zhang, X Liu, G Huang, ... arXiv preprint arXiv:2002.05369, 2020 | 37 | 2020 |
Hybrid user-level sandboxing of third-party android apps Y Zhou, K Patel, L Wu, Z Wang, X Jiang Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015 | 36 | 2015 |
Towards understanding flash loan and its applications in defi ecosystem D Wang, S Wu, Z Lin, L Wu, X Yuan, Y Zhou, H Wang, K Ren arXiv preprint arXiv:2010.12252, 2020 | 32 | 2020 |
Wasai: uncovering vulnerabilities in wasm smart contracts W Chen, Z Sun, H Wang, X Luo, H Cai, L Wu Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022 | 28 | 2022 |
Security analysis of EOSIO smart contracts N He, R Zhang, L Wu, H Wang, X Luo, Y Guo, T Yu, X Jiang arXiv preprint arXiv:2003.06568, 2020 | 28 | 2020 |
Beyond the virus: A first look at coronavirus-themed mobile malware L Wang, R He, H Wang, P Xia, Y Li, L Wu, Y Zhou, X Luo, Y Sui, Y Guo, ... arXiv preprint arXiv:2005.14619, 2020 | 26 | 2020 |