Follow
Luyi Xing
Luyi Xing
Associate Professor of Computer Science, Indiana University Bloomington
Verified email at indiana.edu - Homepage
Title
Cited by
Cited by
Year
Acing the ioc game: Toward automatic discovery and analysis of open-source cyber threat intelligence
X Liao, K Yuan, XF Wang, Z Li, L Xing, R Beyah
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
3402016
Upgrading your android, elevating my malware: Privilege escalation through mobile os updating
L Xing, X Pan, R Wang, K Yuan, XF Wang
2014 IEEE symposium on security and privacy, 393-408, 2014
1692014
Unauthorized origin crossing on mobile platforms: Threats and mitigation
R Wang, L Xing, XF Wang, S Chen
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1282013
Integuard: Toward automatic protection of third-party web service integrations
L Xing, Y Chen, XF Wang, S Chen
Network & Distributed System Security Symposium (NDSS), 2013
752013
Burglars’ iot paradise: Understanding and mitigating security risks of general messaging protocols on iot clouds
Y Jia, L Xing, Y Mao, D Zhao, XF Wang, S Zhao, Y Zhang
2020 IEEE Symposium on Security and Privacy (SP), 465-481, 2020
722020
Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services
XH Tongxin Li, Xiaoyong Zhou, Luyi Xing, Yeonjoon Lee, Muhammad Naveed ...
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
582014
Unleashing the walking dead: Understanding cross-app remote infections on mobile webviews
T Li, X Wang, M Zha, K Chen, XF Wang, L Xing, X Bai, N Zhang, X Han
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
562017
Shattered Chain of Trust: Understanding Security Risks in {Cross-Cloud}{IoT} Access Delegation
B Yuan, Y Jia, L Xing, D Zhao, XF Wang, Y Zhang
29th USENIX security symposium (USENIX security 20), 1183-1200, 2020
552020
Evil under the sun: Understanding and discovering attacks on ethereum decentralized applications
L Su, X Shen, X Du, X Liao, XF Wang, L Xing, B Liu
30th USENIX Security Symposium (USENIX Security 21), 1307-1324, 2021
522021
Seeking nonsense, looking for trouble: Efficient promotional-infection detection through semantic inconsistency search
X Liao, K Yuan, XF Wang, Z Pei, H Yang, J Chen, H Duan, K Du, ...
2016 IEEE Symposium on Security and Privacy (SP), 707-723, 2016
482016
Staying secure and unprepared: Understanding and mitigating the security risks of apple zeroconf
X Bai, L Xing, N Zhang, XF Wang, X Liao, T Li, SM Hu
2016 IEEE Symposium on Security and Privacy (SP), 655-674, 2016
462016
Cracking app isolation on apple: Unauthorized cross-app resource access on MAC os~ x and ios
L Xing, X Bai, T Li, XF Wang, K Chen, X Liao, SM Hu, X Han
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
462015
Demystifying resource management risks in emerging mobile app-in-app ecosystems
H Lu, L Xing, Y Xiao, Y Zhang, X Liao, XF Wang, X Wang
Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020
402020
Devils in the guidance: predicting logic vulnerabilities in payment syndication services through automated documentation analysis
Y Chen, L Xing, Y Qin, X Liao, XF Wang, K Chen, W Zou
28th USENIX Security Symposium (USENIX Security 19), 747-764, 2019
402019
Understanding malicious cross-library data harvesting on android
J Wang, Y Xiao, X Wang, Y Nan, L Xing, X Liao, JW Dong, N Serrano, ...
30th USENIX Security Symposium (USENIX Security 21), 4133-4150, 2021
272021
Rtfm! automatic assumption discovery and verification derivation from library document for api misuse detection
T Lv, R Li, Y Yang, K Chen, X Liao, XF Wang, P Hu, L Xing
Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020
232020
Who's in control? On security risks of disjointed IoT device management channels
Y Jia, B Yuan, L Xing, D Zhao, Y Zhang, XF Wang, Y Liu, K Zheng, ...
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
202021
Lurking malice in the cloud: Understanding and detecting cloud repository as a malicious service
X Liao, S Alrwais, K Yuan, L Xing, XF Wang, S Hao, R Beyah
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
202016
Unauthorized cross-app resource access on mac os x and ios
L Xing, X Bai, T Li, XF Wang, K Chen, X Liao, SM Hu, X Han
arXiv preprint arXiv:1505.06836, 2015
202015
Robbery on devops: Understanding and mitigating illicit cryptomining on continuous integration service platforms
Z Li, W Liu, H Chen, XF Wang, X Liao, L Xing, M Zha, H Jin, D Zou
2022 IEEE Symposium on Security and Privacy (SP), 2397-2412, 2022
182022
The system can't perform the operation now. Try again later.
Articles 1–20