Follow
Song Li
Title
Cited by
Cited by
Year
(Cross-) browser fingerprinting via OS and hardware level features
Y Cao, S Li, E Wijmans
Proceedings 2017 Network and Distributed System Security Symposium, 2017
1652017
Detecting node. js prototype pollution vulnerabilities via object lookup analysis
S Li, M Kang, J Hou, Y Cao
Proceedings of the 29th ACM Joint Meeting on European Software Engineering …, 2021
552021
Mining Node. js Vulnerabilities via Object Dependence Graph and Query
S Li, M Kang, J Hou, Y Cao
31th USENIX Security Symposium 22, 2022
502022
Deterministic browser
Y Cao, Z Chen, S Li, S Wu
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
402017
Rendered private: Making {GLSL} execution uniform to prevent {WebGL-based} browser fingerprinting
S Wu, S Li, Y Cao, N Wang
28th USENIX Security Symposium (USENIX Security 19), 1645-1660, 2019
342019
Probe the Proto: Measuring Client-Side Prototype Pollution Vulnerabilities of One Million Real-world Websites
Z Kang, S Li, Y Cao
NDSS '22, 2022
272022
Who touched my browser fingerprint? a large-scale measurement study and classification of fingerprint dynamics
S Li, Y Cao
Proceedings of the ACM Internet Measurement Conference, 370-385, 2020
212020
Scaling javascript abstract interpretation to detect and exploit node. js taint-style vulnerability
M Kang, Y Xu, S Li, R Gjomemo, J Hou, VN Venkatakrishnan, Y Cao
2023 IEEE Symposium on Security and Privacy (SP), 1059-1076, 2023
142023
CoCo: Efficient Browser Extension Vulnerability Detection via Coverage-guided, Concurrent Abstract Interpretation
J Yu, S Li, J Zhu, Y Cao
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
92023
Towards Making JavaScript Applications Secure and Private
S Li
Johns Hopkins University, 2022
22022
What's the Real: A Novel Design Philosophy for Robust AI-Synthesized Voice Detection
X Hai, X Liu, Y Tan, G Liu, S Li, W Niu, R Zhou, X Zhou
Proceedings of the 32nd ACM International Conference on Multimedia, 6900-6909, 2024
2024
Sensitive Behavioral Chain-focused Android Malware Detection Fused with AST Semantics
J Gong, W Niu, S Li, M Zhang, X Zhang
IEEE Transactions on Information Forensics and Security, 2024
2024
GraphTunnel: Robust DNS Tunnel Detection Based on DNS Recursive Resolution Graph
G Gao, W Niu, J Gong, D Gu, S Li, M Zhang, X Zhang
IEEE Transactions on Information Forensics and Security, 2024
2024
Assessing thresholds of resistance prevalence at which empiric treatment of gonorrhea should change among men who have sex with men in the US: A cost-effectiveness analysis
X Yin, Y Li, MM Rönn, S Li, Y Yuan, TL Gift, K Hsu, JA Salomon, YH Grad, ...
Plos Medicine 21 (7), e1004424, 2024
2024
GraphTrack: A Graph-based Cross-Device Tracking Framework
B Wang, T Zhou, S Li, Y Cao, N Gong
ACM ASIA Conference on Computer and Communications Security, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–15