Follow
Yuhong Nan
Yuhong Nan
Verified email at mail.sysu.edu.cn - Homepage
Title
Cited by
Cited by
Year
UIPicker: User-Input Privacy Identification in Mobile Applications
Y Nan, M Yang, Z Yang, S Zhou, G Gu, XF Wang
24th USENIX Security Symposium (USENIX Security 15), 993--1008, 2015
1792015
ATLAS: A Sequence-based Learning Approach for Attack Investigation
A Alsaheel, Y Nan, S Ma, L Yu, G Walkup, ZB Celik, X Zhang, D Xu
30th USENIX Security Symposium (USENIX Security 21), 2021
1742021
How you get shot in the back: A systematical study about cryptojacking in the real world
G Hong, Z Yang, S Yang, L Zhang, Y Nan, Z Zhang, M Yang, Y Zhang, ...
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1542018
Finding clues for your secrets: semantics-driven, learning-based privacy discovery in mobile apps.
Y Nan, Z Yang, X Wang, Y Zhang, D Zhu, M Yang
NDSS, 2018
762018
BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy
J Wu, Y Nan, V Kumar, DJ Tian, A Bianchi, M Payer, D Xu
Proceedings of the USENIX Workshop on Offensive Technologies (WOOT), 2020
712020
SmartDagger: a bytecode-based static analysis approach for detecting cross-contract vulnerability
Z Liao, Z Zheng, X Chen, Y Nan
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022
382022
Understanding malicious cross-library data harvesting on android
J Wang, Y Xiao, X Wang, Y Nan, L Xing, X Liao, JW Dong, N Serrano, ...
30th USENIX Security Symposium (USENIX Security 21), 4133-4150, 2021
372021
BlueShield: Detecting spoofing attacks in bluetooth low energy networks
J Wu, Y Nan, V Kumar, M Payer, D Xu
23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020
342020
Identifying user-input privacy in mobile applications at a large scale
Y Nan, Z Yang, M Yang, S Zhou, Y Zhang, G Gu, X Wang, L Sun
IEEE Transactions on Information Forensics and Security 12 (3), 647-661, 2016
272016
On the insecurity of SMS one-time password messages against local attackers in modern mobile devices
Z Lei, Y Nan, Y Fratantonio, A Bianchi
Network and Distributed Systems Security (NDSS) Symposium 2021, 2021
262021
Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps
Y Nan, X Wang, L Xing, X Liao, R Wu, J Wu, Y Zhang, XF Wang
32st USENIX Security Symposium (USENIX Security 23), 2023
222023
AIRTAG: Towards Automated Attack Investigation by Unsupervised Learning with Log Texts
H Ding, J Zhai, Y Nan, S Ma
32nd USENIX Security Symposium (USENIX Security 23), 373-390, 2023
142023
Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems
M Zha, J Wang, Y Nan, XF Wang, Y Zhang, W Jing
Network and Distributed Systems Security (NDSS) Symposium., 2022
112022
Smartstate: Detecting state-reverting vulnerabilities in smart contracts via fine-grained state-dependency analysis
Z Liao, S Hao, Y Nan, Z Zheng
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
102023
{MAGIC}: Detecting Advanced Persistent Threats via Masked Graph Representation Learning
Z Jia, Y Xiong, Y Nan, Y Zhang, J Zhao, M Wen
33rd USENIX Security Symposium (USENIX Security 24), 5197-5214, 2024
92024
Detecting state inconsistency bugs in dapps via on-chain transaction replay and fuzzing
M Ye, Y Nan, Z Zheng, D Wu, H Li
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
92023
ProFactory: Improving IoT Security via Formalized Protocol Customization
F Wang, J Wu, Y Nan, Y Aafer, X Zhang, D Xu, M Payer
31st USENIX Security Symposium (USENIX Security 22), 3879-3896, 2022
82022
Simulation: demystifying (insecure) cellular network based one-tap authentication services
Z Zhou, X Han, Z Chen, Y Nan, J Li, D Gu
2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems …, 2022
42022
SmartCoCo: Checking Comment-Code Inconsistency in Smart Contracts via Constraint Propagation and Binding
S Hao, Y Nan, Z Zheng, X Liu
2023 38th IEEE/ACM International Conference on Automated Software …, 2023
22023
SmartAxe: Detecting Cross-Chain Vulnerabilities in Bridge Smart Contracts via Fine-Grained Static Analysis
Z Liao, Y Nan, H Liang, S Hao, J Zhai, J Wu, Z Zheng
Proceedings of the ACM on Software Engineering 1 (FSE), 249-270, 2024
12024
The system can't perform the operation now. Try again later.
Articles 1–20