Peng Wang
Title
Cited by
Cited by
Year
Asdroid: Detecting stealthy behaviors in android applications by user interface and program behavior contradiction
J Huang, X Zhang, L Tan, P Wang, B Liang
Proceedings of the 36th International Conference on Software Engineering …, 2014
2072014
Finding unknown malice in 10 seconds: Mass vetting for new threats at the google-play scale
K Chen, P Wang, Y Lee, XF Wang, N Zhang, H Huang, W Zou, P Liu
24th {USENIX} Security Symposium ({USENIX} Security 15), 659-674, 2015
1862015
Following devil's footprints: Cross-platform analysis of potentially harmful libraries on android and ios
K Chen, X Wang, Y Chen, P Wang, Y Lee, XF Wang, B Ma, A Wang, ...
2016 IEEE Symposium on Security and Privacy (SP), 357-376, 2016
762016
Under the shadow of sunshine: Understanding and detecting bulletproof hosting on legitimate service provider networks
S Alrwais, X Liao, X Mi, P Wang, XF Wang, F Qian, R Beyah, D McCoy
2017 IEEE Symposium on Security and Privacy (SP), 805-823, 2017
282017
Automatic Android GUI traversal with high coverage
P Wang, B Liang, W You, J Li, W Shi
2014 Fourth International Conference on Communication Systems and Network …, 2014
252014
Reference hijacking: Patching, protecting and analyzing on unmodified and non-rooted android devices
W You, B Liang, W Shi, S Zhu, P Wang, S Xie, X Zhang
2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE …, 2016
222016
Taintman: An art-compatible dynamic taint analysis framework on unmodified and non-rooted android devices
W You, B Liang, W Shi, P Wang, X Zhang
IEEE Transactions on Dependable and Secure Computing, 2017
192017
Cracking Wall of Confinement: Understanding and Analyzing Malicious Domain Takedowns
E Alowaisheq
The Network and Distributed System Security Symposium (NDSS), 2019
102019
Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations
P Wang, X Mi, X Liao, XF Wang, K Yuan, F Qian, R Beyah
Proceedings of The 25th Annual Network And Distributed System Security Symposium, 2018
82018
Filtering for Malice through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level
K Chen, T Li, B Ma, P Wang, XF Wang, P Zong
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2017
12017
Into the Deep Web: Understanding E-commerce Fraud from Autonomous Chat with Cybercriminals
P Wang, X Liao, Y Qin, XF Wang
The Network and Distributed System Security Symposium, 2020
2020
Control dependency analyses for detecting remote control Android malware
J LI, B LIANG, W YOU, P WANG, W SHI
Journal of Tsinghua University (Science and Technology), 2, 2014
2014
一种在Android中植入动态污点分析模块的方法
梁彬, 游伟, 王鹏, 石文昌
CN Patent CN103,177,210 A, 2013
2013
Into the Deep Web: Understanding E-commerce Fraud from Autonomous Chat with Cybercriminals
P Wang, X Liao, Y Qin, XF Wang
The system can't perform the operation now. Try again later.
Articles 1–14