Nan Zhang
Nan Zhang
Facebook Inc.
Verified email at - Homepage
Cited by
Cited by
Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems
N Zhang, X Mi, X Feng, XF Wang, Y Tian, F Qian
2019 IEEE Symposium on Security and Privacy (SP), 1381-1396, 2019
SmartAuth: User-Centered Authorization for the Internet of Things
Y Tian, N Zhang, YH Lin, XF Wang, B Ur, XZ Guo, P Tague
26th {USENIX} Security Symposium ({USENIX} Security 17), 361-378, 2017
Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale
K Chen, P Wang, Y Lee, XF Wang, N Zhang, H Huang, W Zou, P Liu
24th USENIX Security Symposium (USENIX Security 15), 659-674, 2015
The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations
X Zhou, Y Lee, N Zhang, M Naveed, XF Wang
Security and Privacy (SP), 2014 IEEE Symposium on, 409-423, 2014
Leave Me Alone: App-level Protection Against Runtime Information Gathering on Android
N Zhang, K Yuan, M Naveed, X Zhou, XF Wang
Security and Privacy (SP), 2015 IEEE Symposium on, 915-930, 2015
HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps
S Demetriou, N Zhang, Y Lee, XF Wang, CA Gunter, X Zhou, M Grace
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References
N Zhang, Y Aafer, Z Zhang, X Zhang, K Chen, XF Wang, X Zhou, W Du, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews
T Li, X Wang, M Zha, K Chen, XF Wang, L Xing, X Bai, N Zhang, X Han
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf
X Bai, L Xing, N Zhang, XF Wang, X Liao, T Li, SM Hu
Security and Privacy (SP), 2016 IEEE Symposium on, 2016
Picking up my tab: Understanding and mitigating synchronized token lifting and spending in mobile payment
X Bai, Z Zhou, XF Wang, Z Li, X Mi, N Zhang, T Li, SM Hu, K Zhang
26th {USENIX} Security Symposium ({USENIX} Security 17), 593-608, 2017
Demystifying Hidden Privacy Settings in Mobile Apps
Y Chen, M Zha, N Zhang, D Xu, Q Zhao, X Feng, K Yuan, F Suya, Y Tian, ...
2019 IEEE Symposium on Security and Privacy (SP), 570-586, 2019
Using Sonar for Liveness Detection to Protect Smart Speakers against Remote Attackers
Y Lee, Y Zhao, J Zeng, K Lee, N Zhang, FH Shezan, Y Tian, K Chen, ...
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2020
Ghost installer in the shadow: Security analysis of app installation on android
Y Lee, T Li, N Zhang, S Demetriou, M Zha, XF Wang, K Chen, X Zhou, ...
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
Apple ZeroConf holes: How hackers can steal iPhone photos
X Bai, L Xing, N Zhang, XF Wang, X Liao, T Li, SM Hu
IEEE Security & Privacy 15 (2), 42-49, 2017
Modeling and Analysis of Bifurcation in a Delayed Worm Propagation Model
Y Yao, N Zhang, W Xiang, G Yu, F Gao
Journal of Applied Mathematics 2013, 2013
Non-invasive Privilege Escalation through Mobile and IoT System Interface: Threats and Mitigation
N Zhang
Indiana University, 2018
Bifurcation in a Delayed Worm Propagation Model with Birth and Death Rates
Y Yao, N Zhang, FX Gao, G Yu
Systems and Informatics (ICSAI), 2012 International Conference on, 1517-1521, 2012
The system can't perform the operation now. Try again later.
Articles 1–18