Nan Zhang
Affiliations:- Indiana University Bloomington, USA
According to our database1,
Nan Zhang
authored at least 17 papers
between 2014 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2020
Using Sonar for Liveness Detection to Protect Smart Speakers against Remote Attackers.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020
2019
Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
2018
Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home.
CoRR, 2018
2017
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be.
CoRR, 2017
Guardian of the HAN: Thwarting Mobile Attacks on Smart-Home Devices Using OS-level Situation Awareness.
CoRR, 2017
HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment.
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
2015
Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale.
Proceedings of the 24th USENIX Security Symposium, 2015
Leave Me Alone: App-Level Protection against Runtime Information Gathering on Android.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014