Yuhong Nan
Yuhong Nan
Verified email at mail.sysu.edu.cn - Homepage
Title
Cited by
Cited by
Year
UIPicker: User-Input Privacy Identification in Mobile Applications
Y Nan, M Yang, Z Yang, S Zhou, G Gu, XF Wang
24th USENIX Security Symposium (USENIX Security 15), 993--1008, 2015
1072015
How you get shot in the back: A systematical study about cryptojacking in the real world
G Hong, Z Yang, S Yang, L Zhang, Y Nan, Z Zhang, M Yang, Y Zhang, ...
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
642018
Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps.
Y Nan, Z Yang, X Wang, Y Zhang, D Zhu, M Yang
NDSS, 2018
292018
Identifying user-input privacy in mobile applications at a large scale
Y Nan, Z Yang, M Yang, S Zhou, Y Zhang, G Gu, X Wang, L Sun
IEEE Transactions on Information Forensics and Security 12 (3), 647-661, 2016
182016
BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy
J Wu, Y Nan, V Kumar, DJ Tian, A Bianchi, M Payer, D Xu
14th USENIX Workshop on Offensive Technologies ({WOOT} 20), 2020
92020
Blueshield: Detecting spoofing attacks in bluetooth low energy networks
J Wu, Y Nan, V Kumar, M Payer, D Xu
23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020
42020
On the insecurity of sms one-time password messages against local attackers in modern mobile devices
Z Lei, Y Nan, Y Fratantonio, A Bianchi
Proceedings of the 2021 Network and Distributed System Security (NDSS) Symposium, 2021
22021
Understanding Malicious Cross-library Data Harvesting on Android
J Wang, Y Xiao, X Wang, Y Nan, L Xing, X Liao, JW Dong, N Serrano, ...
30th {USENIX} Security Symposium ({USENIX} Security 21), 2021
2021
ATLAS: A Sequence-based Learning Approach for Attack Investigation
A Alsaheel, Y Nan, S Ma, L Yu, G Walkup, ZB Celik, X Zhang, D Xu
30th USENIX Security Symposium (USENIX Security 21), 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–9