IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing. J Chen, W Diao, Q Zhao, C Zuo, Z Lin, XF Wang, WC Lau, M Sun, R Yang, ... NDSS, 2018 | 403 | 2018 |
PT-CFI: Transparent backward-edge control flow violation detection using intel processor trace Y Gu, Q Zhao, Y Zhang, Z Lin Proceedings of the Seventh ACM on Conference on Data and Application …, 2017 | 98 | 2017 |
A study of the privacy of covid-19 contact tracing apps H Wen, Q Zhao, Z Lin, D Xuan, N Shroff Security and Privacy in Communication Networks: 16th EAI International …, 2020 | 89 | 2020 |
Authscope: Towards automatic discovery of vulnerable authorizations in online services C Zuo, Q Zhao, Z Lin Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 65 | 2017 |
On the accuracy of measured proximity of bluetooth-based contact tracing apps Q Zhao, H Wen, Z Lin, D Xuan, N Shroff Security and Privacy in Communication Networks: 16th EAI International …, 2020 | 58 | 2020 |
Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services. Q Zhao, C Zuo, G Pellegrino, L Zhiqiang CISPA, 2019 | 47 | 2019 |
{FIRMSCOPE}: Automatic uncovering of {Privilege-Escalation} vulnerabilities in {Pre-Installed} apps in android firmware M Elsabagh, R Johnson, A Stavrou, C Zuo, Q Zhao, Z Lin 29th USENIX security symposium (USENIX Security 20), 2379-2396, 2020 | 41 | 2020 |
Automatic uncovering of hidden behaviors from input validation in mobile apps Q Zhao, C Zuo, B Dolan-Gavitt, G Pellegrino, Z Lin 2020 IEEE Symposium on Security and Privacy (SP), 1106-1120, 2020 | 39 | 2020 |
Your iots are (not) mine: On the remote binding between iot devices and users J Chen, C Zuo, W Diao, S Dong, Q Zhao, M Sun, Z Lin, Y Zhang, K Zhang 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019 | 37 | 2019 |
Automated cross-platform reverse engineering of CAN bus commands from mobile apps H Wen, Q Zhao, QA Chen, Z Lin Proceedings 2020 Network and Distributed System Security Symposium (NDSS'20), 2020 | 32 | 2020 |
Eavesdropping Mobile App Activity via {Radio-Frequency} Energy Harvesting T Ni, G Lan, J Wang, Q Zhao, W Xu 32nd USENIX Security Symposium (USENIX Security 23), 3511-3528, 2023 | 11* | 2023 |
Uncovering user interactions on smartphones via contactless wireless charging side channels T Ni, X Zhang, C Zuo, J Li, Z Yan, W Wang, W Xu, X Luo, Q Zhao 2023 IEEE Symposium on Security and Privacy (SP), 3399-3415, 2023 | 10 | 2023 |
Exploiting contactless side channels in wireless charging power banks for user privacy inference via few-shot learning T Ni, J Li, X Zhang, C Zuo, W Wang, W Xu, X Luo, Q Zhao Proceedings of the 29th Annual International Conference on Mobile Computing …, 2023 | 7 | 2023 |
Recovering Fingerprints from In-Display Fingerprint Sensors via Electromagnetic Side Channel T Ni, X Zhang, Q Zhao Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 6 | 2023 |
No-fuzz: Efficient anti-fuzzing techniques Z Zhou, C Wang, Q Zhao International Conference on Security and Privacy in Communication Systems …, 2022 | 6 | 2022 |
Detecting and measuring aggressive location harvesting in mobile apps via data-flow path embedding H Lu, Q Zhao, Y Chen, X Liao, Z Lin Proceedings of the ACM on Measurement and Analysis of Computing Systems 7 (1 …, 2023 | 5 | 2023 |
Periscope: Comprehensive vulnerability analysis of mobile app-defined bluetooth peripherals Q Zhao, C Zuo, J Blasco, Z Lin Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 4 | 2022 |
XPorter: A study of the multi-port charger security on privacy leakage and voice injection T Ni, Y Chen, W Xu, L Xue, Q Zhao Proceedings of the 29th Annual International Conference on Mobile Computing …, 2023 | 3 | 2023 |
DEMISTIFY: Identifying On-device Machine Learning Models Stealing and Reuse Vulnerabilities in Mobile Apps P Ren, C Zuo, X Liu, W Diao, Q Zhao, S Guo Proceedings of the 46th IEEE/ACM International Conference on Software …, 2024 | 2 | 2024 |
AVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detection X Meng, L Wang, S Guo, L Ju, Q Zhao arXiv preprint arXiv:2312.08675, 2023 | 2 | 2023 |