Hui Xue
Title
Cited by
Cited by
Year
Digging for Data Structures.
A Cozzie, F Stratton, H Xue, ST King
OSDI 8, 255-266, 2008
1602008
Framework for computer application analysis of sensitive information tracking
OA Ismael, D Song, PT Ha, PJ Gilbert, H Xue
US Patent 9,159,035, 2015
1382015
Framework for efficient security coverage of mobile software applications
OA Ismael, D Song, A Aziz, N Johnson, P Mohan, H Xue
US Patent 9,176,843, 2015
1372015
Framework for efficient security coverage of mobile software applications using symbolic execution to reach regions of interest within an application
OA Ismael, D Song, H Xue
US Patent 9,367,681, 2016
992016
Towards discovering and understanding task hijacking in android
C Ren, Y Zhang, H Xue, T Wei, P Liu
24th {USENIX} Security Symposium ({USENIX} Security 15), 945-959, 2015
902015
Framework for efficient security coverage of mobile software applications using machine learning
OA Ismael, D Song, PT Ha, PJ Gilbert, H Xue
US Patent 9,594,905, 2017
782017
Framework for efficient security coverage of mobile software applications
OA Ismael, D Song, A Aziz, N Johnson, P Mohan, H Xue
US Patent 10,296,437, 2019
662019
Verifying security invariants in ExpressOS
H Mai, E Pek, H Xue, ST King, P Madhusudan
Proceedings of the eighteenth international conference on Architectural …, 2013
552013
Fingerprints on mobile devices: Abusing and leaking
Y Zhang, Z Chen, H Xue, T Wei
Black Hat Conference, 2015
422015
Using replicated execution for a more secure and reliable web browser
H Xue, N Dautenhahn, ST King
Proc. of the 19th Network and Distributed System Security Symposium (NDSS’12), 2012
192012
Enpublic apps: Security threats using iOS enterprise and developer certificates
M Zheng, H Xue, Y Zhang, T Wei, JCS Lui
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
152015
Sidewinder Targeted Attack against Android in The Golden Age of Ad Libraries
T Wei, Y Zhang, H Xue, M Zheng, C Ren, D Song
132014
Accurate and efficient exploit capture and classification
Y Ding, T Wei, H Xue, Y Zhang, C Zhang, X Han
Science China Information Sciences 60 (5), 052110, 2017
72017
Masque Attack: All Your iOS Apps Belong to Us
H Xue, T Wei, Y Zhang
FireEye Blog, 2014
52014
User interface for displaying network analytics
PG Murray, S Shan, Z Wu, Y Xie, H Xue, F Yu
US Patent App. 15/459,664, 2017
42017
APPLE WITHOUT A SHELL IOS UNDER TARGETED ATTACK
T Wei, M Zheng, H Xue, D Song
Virus Bulletin Conference, 2014
42014
A method for information protection in collaborative assembly design
H Xue, J Li
Ninth International Conference on Computer Aided Design and Computer …, 2005
42005
Monitoring Vulnaggressive Apps on Google Play
Y Zhang, H Xue, T Wei, D Song
FireEye Blog, 2013
32013
Poster: Classifying Downloaders
Y Ding, L Guo, C Zhang, Y Zhang, H Xue, T Wei, Y Zhou, X Han
IEEE Symposium on Security and Privacy, 2015
12015
iOS Masque Attack Revived: Bypassing Prompt for Trust and App URL Scheme Hijacking
H Xue, T Wei, Y Zhang, S Jin, C Zhaofeng
FireEye Blog, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–20