Follow
Luyi Xing
Luyi Xing
Assistant Professor of Computer Science, Indiana University Bloomington
Verified email at indiana.edu - Homepage
Title
Cited by
Cited by
Year
Acing the ioc game: Toward automatic discovery and analysis of open-source cyber threat intelligence
X Liao, K Yuan, XF Wang, Z Li, L Xing, R Beyah
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
3232016
Upgrading your android, elevating my malware: Privilege escalation through mobile os updating
L Xing, X Pan, R Wang, K Yuan, XF Wang
2014 IEEE symposium on security and privacy, 393-408, 2014
1662014
Unauthorized origin crossing on mobile platforms: Threats and mitigation
R Wang, L Xing, XF Wang, S Chen
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1262013
Integuard: Toward automatic protection of third-party web service integrations
L Xing, Y Chen, XF Wang, S Chen
Network & Distributed System Security Symposium (NDSS), 2013
742013
Burglars’ iot paradise: Understanding and mitigating security risks of general messaging protocols on iot clouds
Y Jia, L Xing, Y Mao, D Zhao, XF Wang, S Zhao, Y Zhang
2020 IEEE Symposium on Security and Privacy (SP), 465-481, 2020
632020
Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services
XH Tongxin Li, Xiaoyong Zhou, Luyi Xing, Yeonjoon Lee, Muhammad Naveed ...
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
582014
Unleashing the walking dead: Understanding cross-app remote infections on mobile webviews
T Li, X Wang, M Zha, K Chen, XF Wang, L Xing, X Bai, N Zhang, X Han
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
512017
Evil under the sun: understanding and discovering attacks on Ethereum decentralized applications
L Su, X Shen, X Du, X Liao, XF Wang, L Xing, B Liu
30th USENIX Security Symposium (USENIX Security 21), 1307-1324, 2021
492021
Shattered Chain of Trust: Understanding Security Risks in {Cross-Cloud}{IoT} Access Delegation
B Yuan, Y Jia, L Xing, D Zhao, XF Wang, Y Zhang
29th USENIX security symposium (USENIX security 20), 1183-1200, 2020
472020
Staying secure and unprepared: Understanding and mitigating the security risks of apple zeroconf
X Bai, L Xing, N Zhang, XF Wang, X Liao, T Li, SM Hu
2016 IEEE Symposium on Security and Privacy (SP), 655-674, 2016
472016
Cracking app isolation on apple: Unauthorized cross-app resource access on MAC os~ x and ios
L Xing, X Bai, T Li, XF Wang, K Chen, X Liao, SM Hu, X Han
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
462015
Seeking nonsense, looking for trouble: Efficient promotional-infection detection through semantic inconsistency search
X Liao, K Yuan, XF Wang, Z Pei, H Yang, J Chen, H Duan, K Du, ...
2016 IEEE Symposium on Security and Privacy (SP), 707-723, 2016
452016
Demystifying resource management risks in emerging mobile app-in-app ecosystems
H Lu, L Xing, Y Xiao, Y Zhang, X Liao, XF Wang, X Wang
Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020
372020
Devils in the guidance: predicting logic vulnerabilities in payment syndication services through automated documentation analysis
Y Chen, L Xing, Y Qin, X Liao, XF Wang, K Chen, W Zou
28th USENIX Security Symposium (USENIX Security 19), 747-764, 2019
352019
Understanding malicious cross-library data harvesting on android
J Wang, Y Xiao, X Wang, Y Nan, L Xing, X Liao, JW Dong, N Serrano, ...
30th USENIX Security Symposium (USENIX Security 21), 4133-4150, 2021
242021
Rtfm! automatic assumption discovery and verification derivation from library document for api misuse detection
T Lv, R Li, Y Yang, K Chen, X Liao, XF Wang, P Hu, L Xing
Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020
232020
Lurking malice in the cloud: Understanding and detecting cloud repository as a malicious service
X Liao, S Alrwais, K Yuan, L Xing, XF Wang, S Hao, R Beyah
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
202016
Who's in control? On security risks of disjointed IoT device management channels
Y Jia, B Yuan, L Xing, D Zhao, Y Zhang, XF Wang, Y Liu, K Zheng, ...
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
182021
Unauthorized cross-app resource access on mac os x and ios
L Xing, X Bai, T Li, XF Wang, K Chen, X Liao, SM Hu, X Han
arXiv preprint arXiv:1505.06836, 2015
182015
Robbery on devops: Understanding and mitigating illicit cryptomining on continuous integration service platforms
Z Li, W Liu, H Chen, XF Wang, X Liao, L Xing, M Zha, H Jin, D Zou
2022 IEEE Symposium on Security and Privacy (SP), 2397-2412, 2022
172022
The system can't perform the operation now. Try again later.
Articles 1–20