Publications

. Using Sonar for Liveness Detection to Protect Smart Speakers Against Remote Attackers. Accepted in the UbiComp 2020 / ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 2020.

. Understanding Illicit UI in iOS apps Through Hidden UI Analysis. Accepted in the IEEE Transactions on Dependable and Secure Computing (TDSC), 2019.

. Understanding iOS-based Crowdturfing Through Hidden UI Analysis. In USENIX Security, 2019.

. Mass Discovery of Android Traffic Imprints through Instantiated Partial Execution. In CCS, 2017.

PDF

. HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps. In WISEC, 2017.

PDF

. Ghost Installer in the Shadow: Security Analysis of App Installation on Android. In DSN, 2017.

PDF

. Following devil's footprints: Cross-platform analysis of potentially harmful libraries on android and ios. In S&P, 2016.

PDF

. Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale. In USENIX Security, 2015.

PDF

. What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources.. In NDSS, 2015.

PDF

. Mayhem in the push clouds: Understanding and mitigating security hazards in mobile push-messaging services. In CCS, 2014.

PDF

. The peril of fragmentation: Security hazards in android device driver customizations. In S&P, 2014.

PDF

Contact