Author of the publication

Dual-force: understanding WebView malware via cross-language forced execution.

, , , , , , and . ASE, page 714-725. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Harvesting Inconsistent Security Configurations in Custom Android ROMs via Differential Analysis., , and . USENIX Security Symposium, page 1153-1168. USENIX Association, (2016)OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary., , , , , , , and . SP, page 813-832. IEEE, (2021)Statically Detecting Buffer Overflow in Cross-language Android Applications Written in Java and C/C++., , , , , and . CoRR, (2023)Poirot: Probabilistically Recommending Protections for the Android Framework., , and . CCS, page 937-950. ACM, (2022)Precise Android API Protection Mapping Derivation and Reasoning., , , , and . CCS, page 1151-1164. ACM, (2018)Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References., , , , , , , , and . CCS, page 1248-1259. ACM, (2015)Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing., , , , , and . USENIX Security Symposium, page 2759-2776. USENIX Association, (2021)PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning., , , , , , , and . SP, page 1121-1138. IEEE, (2020)Finding client-side business flow tampering vulnerabilities., , , , , , and . ICSE, page 222-233. ACM, (2020)DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android., , and . SecureComm, volume 127 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 86-103. Springer, (2013)