Chaoshun Zuo

Orcid: 0000-0003-3581-1500

According to our database1, Chaoshun Zuo authored at least 28 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
DEMISTIFY: Identifying On-device Machine Learning Models Stealing and Reuse Vulnerabilities in Mobile Apps.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

Attention! Your Copied Data is Under Monitoring: A Systematic Study of Clipboard Usage in Android Apps.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

2023
A Peek into the Metaverse: Detecting 3D Model Clones in Mobile Games.
Proceedings of the 32nd USENIX Security Symposium, 2023

Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Extracting Threat Intelligence From Cheat Binaries For Anti-Cheating.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Exploiting Contactless Side Channels in Wireless Charging Power Banks for User Privacy Inference via Few-shot Learning.
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023

Uncovering Vulnerabilities of Bluetooth Low Energy IoT from Companion Mobile Apps with Ble-Guuide.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Playing Without Paying: Detecting Vulnerable Payment Verification in Native Binaries of Unity Mobile Games.
Proceedings of the 31st USENIX Security Symposium, 2022

Detecting and Measuring Misconfigured Manifests in Android Apps.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
A Measurement Study of Wechat Mini-Apps.
Proc. ACM Meas. Anal. Comput. Syst., 2021

2020
ACOUSTIC-TURF: Acoustic-based Privacy-Preserving COVID-19 Contact Tracing.
CoRR, 2020

An empirical study of potentially malicious third-party libraries in Android apps.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware.
Proceedings of the 29th USENIX Security Symposium, 2020

Automatic Uncovering of Hidden Behaviors From Input Validation in Mobile Apps.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

2019
The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends.
Proceedings of the 28th USENIX Security Symposium, 2019

Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
An automatically vetting mechanism for SSL error-handling vulnerability in android hybrid Web apps.
World Wide Web, 2018

IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
SMARTGEN: Exposing Server URLs of Mobile Apps With Selective Symbolic Execution.
Proceedings of the 26th International Conference on World Wide Web, 2017

AUTHSCOPE: Towards Automatic Discovery of Vulnerable Authorizations in Online Services.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Automatic Forgery of Cryptographically Consistent Messages to Identify Security Vulnerabilities in Mobile Services.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
UI Ripping in Android: Reverse Engineering of Graphical User Interfaces and its Application.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015

Automatically Detecting SSL Error-Handling Vulnerabilities in Hybrid Mobile Web Apps.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
SafeBrowsingCloud: Detecting Drive-by-Downloads Attack Using Cloud Computing Environment.
Proceedings of the Internet of Vehicles - Technologies and Services, 2014


  Loading...