UIPicker: User-Input Privacy Identification in Mobile Applications Y Nan, M Yang, Z Yang, S Zhou, G Gu, XF Wang 24th USENIX Security Symposium (USENIX Security 15), 993--1008, 2015 | 179 | 2015 |
ATLAS: A Sequence-based Learning Approach for Attack Investigation A Alsaheel, Y Nan, S Ma, L Yu, G Walkup, ZB Celik, X Zhang, D Xu 30th USENIX Security Symposium (USENIX Security 21), 2021 | 174 | 2021 |
How you get shot in the back: A systematical study about cryptojacking in the real world G Hong, Z Yang, S Yang, L Zhang, Y Nan, Z Zhang, M Yang, Y Zhang, ... Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 154 | 2018 |
Finding clues for your secrets: semantics-driven, learning-based privacy discovery in mobile apps. Y Nan, Z Yang, X Wang, Y Zhang, D Zhu, M Yang NDSS, 2018 | 76 | 2018 |
BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy J Wu, Y Nan, V Kumar, DJ Tian, A Bianchi, M Payer, D Xu Proceedings of the USENIX Workshop on Offensive Technologies (WOOT), 2020 | 71 | 2020 |
SmartDagger: a bytecode-based static analysis approach for detecting cross-contract vulnerability Z Liao, Z Zheng, X Chen, Y Nan Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022 | 38 | 2022 |
Understanding malicious cross-library data harvesting on android J Wang, Y Xiao, X Wang, Y Nan, L Xing, X Liao, JW Dong, N Serrano, ... 30th USENIX Security Symposium (USENIX Security 21), 4133-4150, 2021 | 37 | 2021 |
BlueShield: Detecting spoofing attacks in bluetooth low energy networks J Wu, Y Nan, V Kumar, M Payer, D Xu 23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020 | 34 | 2020 |
Identifying user-input privacy in mobile applications at a large scale Y Nan, Z Yang, M Yang, S Zhou, Y Zhang, G Gu, X Wang, L Sun IEEE Transactions on Information Forensics and Security 12 (3), 647-661, 2016 | 27 | 2016 |
On the insecurity of SMS one-time password messages against local attackers in modern mobile devices Z Lei, Y Nan, Y Fratantonio, A Bianchi Network and Distributed Systems Security (NDSS) Symposium 2021, 2021 | 26 | 2021 |
Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps Y Nan, X Wang, L Xing, X Liao, R Wu, J Wu, Y Zhang, XF Wang 32st USENIX Security Symposium (USENIX Security 23), 2023 | 22 | 2023 |
AIRTAG: Towards Automated Attack Investigation by Unsupervised Learning with Log Texts H Ding, J Zhai, Y Nan, S Ma 32nd USENIX Security Symposium (USENIX Security 23), 373-390, 2023 | 14 | 2023 |
Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems M Zha, J Wang, Y Nan, XF Wang, Y Zhang, W Jing Network and Distributed Systems Security (NDSS) Symposium., 2022 | 11 | 2022 |
Smartstate: Detecting state-reverting vulnerabilities in smart contracts via fine-grained state-dependency analysis Z Liao, S Hao, Y Nan, Z Zheng Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023 | 10 | 2023 |
{MAGIC}: Detecting Advanced Persistent Threats via Masked Graph Representation Learning Z Jia, Y Xiong, Y Nan, Y Zhang, J Zhao, M Wen 33rd USENIX Security Symposium (USENIX Security 24), 5197-5214, 2024 | 9 | 2024 |
Detecting state inconsistency bugs in dapps via on-chain transaction replay and fuzzing M Ye, Y Nan, Z Zheng, D Wu, H Li Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023 | 9 | 2023 |
ProFactory: Improving IoT Security via Formalized Protocol Customization F Wang, J Wu, Y Nan, Y Aafer, X Zhang, D Xu, M Payer 31st USENIX Security Symposium (USENIX Security 22), 3879-3896, 2022 | 8 | 2022 |
Simulation: demystifying (insecure) cellular network based one-tap authentication services Z Zhou, X Han, Z Chen, Y Nan, J Li, D Gu 2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems …, 2022 | 4 | 2022 |
SmartCoCo: Checking Comment-Code Inconsistency in Smart Contracts via Constraint Propagation and Binding S Hao, Y Nan, Z Zheng, X Liu 2023 38th IEEE/ACM International Conference on Automated Software …, 2023 | 2 | 2023 |
SmartAxe: Detecting Cross-Chain Vulnerabilities in Bridge Smart Contracts via Fine-Grained Static Analysis Z Liao, Y Nan, H Liang, S Hao, J Zhai, J Wu, Z Zheng Proceedings of the ACM on Software Engineering 1 (FSE), 249-270, 2024 | 1 | 2024 |