Follow
Yuhong Nan
Yuhong Nan
Verified email at mail.sysu.edu.cn - Homepage
Title
Cited by
Cited by
Year
UIPicker: User-Input Privacy Identification in Mobile Applications
Y Nan, M Yang, Z Yang, S Zhou, G Gu, XF Wang
24th USENIX Security Symposium (USENIX Security 15), 993--1008, 2015
1662015
How you get shot in the back: A systematical study about cryptojacking in the real world
G Hong, Z Yang, S Yang, L Zhang, Y Nan, Z Zhang, M Yang, Y Zhang, ...
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1442018
ATLAS: A Sequence-based Learning Approach for Attack Investigation
A Alsaheel, Y Nan, S Ma, L Yu, G Walkup, ZB Celik, X Zhang, D Xu
30th USENIX Security Symposium (USENIX Security 21), 2021
1112021
Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps.
Y Nan, Z Yang, X Wang, Y Zhang, D Zhu, M Yang
NDSS, 2018
662018
BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy
J Wu, Y Nan, V Kumar, DJ Tian, A Bianchi, M Payer, D Xu
Proceedings of the USENIX Workshop on Offensive Technologies (WOOT), 2020
572020
BlueShield: Detecting spoofing attacks in bluetooth low energy networks
J Wu, Y Nan, V Kumar, M Payer, D Xu
23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020
252020
Understanding malicious cross-library data harvesting on android
J Wang, Y Xiao, X Wang, Y Nan, L Xing, X Liao, JW Dong, N Serrano, ...
30th USENIX Security Symposium (USENIX Security 21), 4133-4150, 2021
242021
Identifying user-input privacy in mobile applications at a large scale
Y Nan, Z Yang, M Yang, S Zhou, Y Zhang, G Gu, X Wang, L Sun
IEEE Transactions on Information Forensics and Security 12 (3), 647-661, 2016
242016
On the insecurity of SMS one-time password messages against local attackers in modern mobile devices
Z Lei, Y Nan, Y Fratantonio, A Bianchi
Network and Distributed Systems Security (NDSS) Symposium 2021, 2021
202021
SmartDagger: a bytecode-based static analysis approach for detecting cross-contract vulnerability
Z Liao, Z Zheng, X Chen, Y Nan
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022
172022
Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems
M Zha, J Wang, Y Nan, XF Wang, Y Zhang, W Jing
Network and Distributed Systems Security (NDSS) Symposium., 2022
62022
Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps
Y Nan, X Wang, L Xing, X Liao, R Wu, J Wu, Y Zhang, XF Wang
32st USENIX Security Symposium (USENIX Security 23), 2023
52023
ProFactory: Improving IoT Security via Formalized Protocol Customization
F Wang, J Wu, Y Nan, Y Aafer, X Zhang, D Xu, M Payer
31st USENIX Security Symposium (USENIX Security 22), 3879-3896, 2022
42022
AIRTAG: Towards Automated Attack Investigation by Unsupervised Learning with Log Texts
H Ding, J Zhai, Y Nan, S Ma
32nd USENIX Security Symposium (USENIX Security 23), 373-390, 2023
32023
SIMulation: Demystifying (Insecure) Cellular Network based One-Tap Authentication Services
Z Zhou, X Han, Z Chen, Y Nan, J Li, D Gu
2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems …, 2022
32022
Detecting state inconsistency bugs in dapps via on-chain transaction replay and fuzzing
M Ye, Y Nan, Z Zheng, D Wu, H Li
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
22023
Smartstate: Detecting state-reverting vulnerabilities in smart contracts via fine-grained state-dependency analysis
Z Liao, S Hao, Y Nan, Z Zheng
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
22023
Understanding Dark UI Patterns in the Mobile Ecosystem: A Case Study of Apps in China
M Long, Y Xu, J Wu, Q Ou, Y Nan
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 33-40, 2023
2023
MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning
Z Jia, Y Xiong, Y Nan, Y Zhang, J Zhao, M Wen
arXiv preprint arXiv:2310.09831, 2023
2023
SmartCoCo: Checking Comment-Code Inconsistency in Smart Contracts via Constraint Propagation and Binding
S Hao, Y Nan, Z Zheng, X Liu
2023 38th IEEE/ACM International Conference on Automated Software …, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20