Luyi Xing

Orcid: 0000-0002-1036-1163

According to our database1, Luyi Xing authored at least 34 papers between 2010 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
SmartPatch: Verifying the Authenticity of the Trigger-Event in the IoT Platform.
IEEE Trans. Dependable Secur. Comput., 2023

Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels.
Proceedings of the 32nd USENIX Security Symposium, 2023

Union under Duress: Understanding Hazards of Duplicate Resource Mismediation in Android Software Supply Chain.
Proceedings of the 32nd USENIX Security Symposium, 2023

Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps.
Proceedings of the 32nd USENIX Security Symposium, 2023

The Danger of Minimum Exposures: Understanding Cross-App Information Leaks on iOS through Multi-Side-Channel Learning.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels at Scale.
CoRR, 2022

How Are Your Zombie Accounts? Understanding Users' Practices and Expectations on Mobile App Account Deletion.
Proceedings of the 31st USENIX Security Symposium, 2022

Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Perils and Mitigation of Security Risks of Cooperation in Mobile-as-a-Gateway IoT.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

P-Verifier: Understanding and Mitigating Security Risks in Cloud-based IoT Access Policies.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Understanding Malicious Cross-library Data Harvesting on Android.
Proceedings of the 30th USENIX Security Symposium, 2021

Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications.
Proceedings of the 30th USENIX Security Symposium, 2021

Who's In Control? On Security Risks of Disjointed IoT Device Management Channels.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Confidential Attestation: Efficient in-Enclave Verification of Privacy Policy Compliance.
CoRR, 2020

Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation.
Proceedings of the 29th USENIX Security Symposium, 2020

Burglars' IoT Paradise: Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

RTFM! Automatic Assumption Discovery and Verification Derivation from Library Document for API Misuse Detection.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Demystifying Resource Management Risks in Emerging Mobile App-in-App Ecosystems.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

iDEA: Static Analysis on the Security of Apple Kernel Drivers.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation Analysis.
Proceedings of the 28th USENIX Security Symposium, 2019

2018
Cloud repository as a malicious service: challenge, identification and implication.
Cybersecur., 2018

2017
Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos.
IEEE Secur. Priv., 2017

Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Unauthorized Cross-App Resource Access on MAC OS X and iOS.
CoRR, 2015

Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Upgrading Your Android, Elevating My Malware: Privilege Escalation through Mobile OS Updating.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
InteGuard: Toward Automatic Protection of Third-Party Web Service Integrations.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Unauthorized origin crossing on mobile platforms: threats and mitigation.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2010
A Client-Based and Server-Enhanced Defense Mechanism for Cross-Site Request Forgery.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010


  Loading...