Juanru Li

Orcid: 0000-0002-7978-595X

According to our database1, Juanru Li authored at least 70 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Range Specification Bug Detection in Flight Control System Through Fuzzing.
IEEE Trans. Software Eng., March, 2024

A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects.
IEEE Trans. Inf. Forensics Secur., 2024

A system capable of verifiably and privately screening global DNA synthesis.
CoRR, 2024

2023
Medusa Attack: Exploring Security Hazards of In-App QR Code Scanning.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Orchestration or Automation: Authentication Flaw Detection in Android Apps.
IEEE Trans. Dependable Secur. Comput., 2022

PEDroid: Automatically Extracting Patches from Android App Updates (Artifact).
Dagstuhl Artifacts Ser., 2022

EvilScreen Attack: Smart TV Hijacking via Multi-channel Remote Control Mimicry.
CoRR, 2022

Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Annotating, Tracking, and Protecting Cryptographic Secrets with CryptoMPK.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Rethinking the security of IoT from the perspective of developer customized device-cloud interaction.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

PEDroid: Automatically Extracting Patches from Android App Updates.
Proceedings of the 36th European Conference on Object-Oriented Programming, 2022

SIMulation: Demystifying (Insecure) Cellular Network based One-Tap Authentication Services.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

KingFisher: Unveiling Insecurely Used Credentials in IoT-to-Mobile Communications.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2021
Re-Check Your Certificates! Experiences and Lessons Learnt from Real-World HTTPS Certificate Deployments.
Proceedings of the Network and System Security - 15th International Conference, 2021

Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

Yet Another Traffic Black Hole: Amplifying CDN Fetching Traffic with RangeFragAmp Attacks.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021

SparrowHawk: Memory Safety Flaw Detection via Data-Driven Source Code Annotation.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021

2020
Understanding the security of app-in-the-middle IoT.
Comput. Secur., 2020

EthPloit: From Fuzzing to Efficient Exploit Generation against Smart Contracts.
Proceedings of the 27th IEEE International Conference on Software Analysis, 2020

SMARTSHIELD: Automatic Smart Contract Protection Made Easy.
Proceedings of the 27th IEEE International Conference on Software Analysis, 2020

Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Security analysis of third-party in-app payment in mobile applications.
J. Inf. Secur. Appl., 2019

APPCOMMUNE: Automated Third-Party Libraries De-duplicating and Updating for Android Apps.
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019

NLP-EYE: Detecting Memory Corruptions via Semantic-Aware Memory Operation Function Identification.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Accelerating SM2 Digital Signature Algorithm Using Modern Processor Features.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Finding Flaws from Password Authentication Code in Android Apps.
Proceedings of the Computer Security - ESORICS 2019, 2019

An empirical study of SMS one-time password authentication in Android apps.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
AppSpear: Automating the hidden-code extraction and reassembling of packed android malware.
J. Syst. Softw., 2018

Passwords in the Air: Harvesting Wi-Fi Credentials from SmartCfg Provisioning.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Burn After Reading: Expunging Execution Footprints of Android Apps.
Proceedings of the Network and System Security - 12th International Conference, 2018

BinMatch: A Semantics-Based Hybrid Approach on Binary Code Clone Analysis.
Proceedings of the 2018 IEEE International Conference on Software Maintenance and Evolution, 2018

K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

An Empirical Study of SDK Credential Misuse in iOS Apps.
Proceedings of the 25th Asia-Pacific Software Engineering Conference, 2018

2017
Why Data Deletion Fails? A Study on Deletion Flaws and Data Remanence in Android Systems.
ACM Trans. Embed. Comput. Syst., 2017

Show Me the Money! Finding Flawed Implementations of Third-party In-app Payment in Android Apps.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Binary code clone detection across architectures and compiling configurations.
Proceedings of the 25th International Conference on Program Comprehension, 2017

Nightingale: Translating Embedded VM Code in x86 Binary Executables.
Proceedings of the Information Security - 20th International Conference, 2017

Embroidery: Patching Vulnerable Binary Code of Fragmentized Android Devices.
Proceedings of the 2017 IEEE International Conference on Software Maintenance and Evolution, 2017

MIRAGE: Randomizing large chunk allocation via dynamic binary instrumentation.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

NativeSpeaker: Identifying Crypto Misuses in Android Native Code Libraries.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

Smart Solution, Poor Protection: An Empirical Study of Security and Privacy Issues in Developing and Deploying Smart Home Devices.
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017

Oh-Pwn-VPN! Security Analysis of OpenVPN-Based Android Apps.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

2016
Cross-Architecture Binary Semantics Understanding via Similar Code Comparison.
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016

New Exploit Methods against Ptmalloc of GLIBC.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Security Analysis of Vendor Customized Code in Firmware of Embedded Device.
Proceedings of the Security and Privacy in Communication Networks, 2016

Security Testing of Software on Embedded Devices Using x86 Platform.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

Open Sesame! Web Authentication Cracking via Mobile App Analysis.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016

The Achilles heel of OAuth: a multi-platform study of OAuth-based authentication.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

SSG: Sensor Security Guard for Android Smartphones.
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015

From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Vulnerability Assessment of OAuth Implementations in Android Applications.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
iCryptoTracer: Dynamic Analysis on Misuse of Cryptography Functions in iOS Applications.
Proceedings of the Network and System Security - 8th International Conference, 2014

TagDroid: Hybrid SSL Certificate Verification in Android.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Android App Protection via Interpretation Obfuscation.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

APKLancet: tumor payload diagnosis and purification for android applications.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

DIAS: Automated Online Analysis for Android Applications.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2013
Automatic Detection and Analysis of Encrypted Messages in Malware.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

2012
Detecting Encryption Functions via Process Emulation and IL-Based Program Analysis.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Android Malware Forensics: Reconstruction of Malicious Events.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

Differential Fault Analysis on Lightweight Blockciphers with Statistical Cryptanalysis Techniques.
Proceedings of the 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2012

2011
A New Differential Fault Attack on SPN Structure, with Application to AES Cipher.
J. Comput., 2011

Detection and Analysis of Cryptographic Data Inside Software.
Proceedings of the Information Security, 14th International Conference, 2011

Linear Cryptanalysis of ARIA Block Cipher.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

2010
Differential fault analysis on Camellia.
J. Syst. Softw., 2010

Digital Forensic Analysis on Runtime Instruction Flow.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

2009
An Extension of Differential Fault Analysis on AES.
Proceedings of the Third International Conference on Network and System Security, 2009

2008
Differential fault analysis on the ARIA algorithm.
Inf. Sci., 2008

Exploiting unidirectional links for key establishment protocols in heterogeneous sensor networks.
Comput. Commun., 2008


  Loading...