Yuan Zhang
Orcid: 0000-0003-0726-9996Affiliations:
- Fudan University, School of Computer Science, Shanghai, China
According to our database1,
Yuan Zhang
authored at least 67 papers
between 2012 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Shell or Nothing: Real-World Benchmarks and Memory-Activated Agents for Automated Penetration Testing.
CoRR, September, 2025
Dataset, June, 2025
IEEE Trans. Inf. Forensics Secur., 2025
Facilitating Access Control Vulnerability Detection in Modern Java Web Applications With Accurate Permission Check Identification.
IEEE Trans. Inf. Forensics Secur., 2025
Proc. ACM Softw. Eng., 2025
You Can't Eat Your Cake and Have It Too: The Performance Degradation of LLMs with Jailbreak Defense.
Proceedings of the ACM on Web Conference 2025, 2025
Pig in a Poke: Automatically Detecting and Exploiting Link Following Vulnerabilities in Windows File Operations.
Proceedings of the 34th USENIX Security Symposium, 2025
Proceedings of the 34th USENIX Security Symposium, 2025
Make Agent Defeat Agent: Automatic Detection of Taint-Style Vulnerabilities in LLM-based Agents.
Proceedings of the 34th USENIX Security Symposium, 2025
Effective Directed Fuzzing with Hierarchical Scheduling for Web Vulnerability Detection.
Proceedings of the 34th USENIX Security Symposium, 2025
Careless Retention and Management: Understanding and Detecting Data Retention Denial-of-Service Vulnerabilities in Java Web Containers.
Proceedings of the 34th USENIX Security Symposium, 2025
Towards Automatic Detection and Exploitation of Java Web Application Vulnerabilities via Concolic Execution guided by Cross-thread Object Manipulation.
Proceedings of the 34th USENIX Security Symposium, 2025
Proceedings of the 34th USENIX Security Symposium, 2025
MOCGuard: Automatically Detecting Missing-Owner-Check Vulnerabilities in Java Web Applications.
Proceedings of the IEEE Symposium on Security and Privacy, 2025
Proceedings of the IEEE Symposium on Security and Privacy, 2025
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025
Be Aware of What You Let Pass: Demystifying URL-based Authentication Bypass Vulnerability in Java Web Applications.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025
BACScan: Automatic Black-Box Detection of Broken-Access-Control Vulnerabilities in Web Applications.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025
2024
Component Security Ten Years Later: An Empirical Study of Cross-Layer Threats in Real-World Mobile Applications.
Proc. ACM Softw. Eng., 2024
Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the ACM on Web Conference 2024, 2024
Efficient Detection of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Construction.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
How Well Industry-Level Cause Bisection Works in Real-World: A Study on Linux Kernel.
Proceedings of the Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering, 2024
Applying Fuzz Driver Generation to Native C/C++ Libraries of OEM Android Framework: Obstacles and Solutions.
Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, 2024
VioHawk: Detecting Traffic Violations of Autonomous Driving Systems through Criticality-Guided Simulation Testing.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Proceedings of the IEEE INFOCOM 2024, 2024
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2024
SCTrans: Constructing a Large Public Scenario Dataset for Simulation Testing of Autonomous Driving Systems.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
Remote Code Execution from SSTI in the Sandbox: Automatically Detecting and Exploiting Template Escape Bugs.
Proceedings of the 32nd USENIX Security Symposium, 2023
Understanding the (In)Security of Cross-side Face Verification Systems in Mobile Apps: A System Perspective.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
NestFuzz: Enhancing Fuzzing with Comprehensive Understanding of Input Processing Logic.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Int. J. Softw. Informatics, 2022
Int. J. Softw. Informatics, 2022
Understanding the Practice of Security Patch Management across Multiple Branches in OSS Projects.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022
Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability Patches.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
2021
Proceedings of the 30th USENIX Security Symposium, 2021
Locating the Security Patches for Disclosed OSS Vulnerabilities with Vulnerability-Commit Correlation Ranking.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Sci. China Inf. Sci., 2020
An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
How Android developers handle evolution-induced API compatibility issues: a large-scale study.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020
Enhancing State-of-the-art Classifiers with API Semantics to Detect Evolved Android Malware.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
App in the Middle: Demystify Application Virtualization in Android and its Security Threats.
Proceedings of the Abstracts of the 2019 SIGMETRICS/Performance Joint International Conference on Measurement and Modeling of Computer Systems, 2019
2018
Detecting third-party libraries in Android applications with high precision and recall.
Proceedings of the 25th International Conference on Software Analysis, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
2015
Proceedings of the Security and Privacy in Communication Networks, 2015
2014
IEEE Trans. Inf. Forensics Secur., 2014
2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
AppIntent: analyzing sensitive data transmission in android for privacy leakage detection.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Proceedings of the 8th International Conference on Virtual Execution Environments, 2012