Yuanyuan Zhang

Orcid: 0000-0002-6682-2264

  • Shanghai Jiao Tong University, Shanghai, China
  • INRIA, INSA-Lyon, CITI laboratory, France (former)

According to our database1, Yuanyuan Zhang authored at least 55 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


Online presence:

On csauthors.net:


Enabling Fast and Privacy-Preserving Broadcast Authentication With Efficient Revocation for Inter-Vehicle Connections.
IEEE Trans. Mob. Comput., April, 2024

SEnFuzzer: Detecting SGX Memory Corruption via Information Feedback and Tailored Interface Analysis.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Automated Detection of Password Leakage from Public GitHub Repositories.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

VirTEE: a full backward-compatible TEE with native live migration and secure I/O.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022

A Semantics-Based Hybrid Approach on Binary Code Similarity Comparison.
IEEE Trans. Software Eng., 2021

MagikCube: Securing Cross-Domain Publish/Subscribe Systems with Enclave.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Security analysis of third-party in-app payment in mobile applications.
J. Inf. Secur. Appl., 2019

Automatically Patching Vulnerabilities of Binary Programs via Code Transfer From Correct Versions.
IEEE Access, 2019

APPCOMMUNE: Automated Third-Party Libraries De-duplicating and Updating for Android Apps.
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019

NLP-EYE: Detecting Memory Corruptions via Semantic-Aware Memory Operation Function Identification.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

SymSem: Symbolic Execution with Time Stamps for Deobfuscation.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

AppSpear: Automating the hidden-code extraction and reassembling of packed android malware.
J. Syst. Softw., 2018

Passwords in the Air: Harvesting Wi-Fi Credentials from SmartCfg Provisioning.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

FastTrust: Fast and Anonymous Spatial-Temporal Trust for Connected Cars on Expressways.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

Burn After Reading: Expunging Execution Footprints of Android Apps.
Proceedings of the Network and System Security - 12th International Conference, 2018

BinMatch: A Semantics-Based Hybrid Approach on Binary Code Clone Analysis.
Proceedings of the 2018 IEEE International Conference on Software Maintenance and Evolution, 2018

K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

An Empirical Study of SDK Credential Misuse in iOS Apps.
Proceedings of the 25th Asia-Pacific Software Engineering Conference, 2018

Why Data Deletion Fails? A Study on Deletion Flaws and Data Remanence in Android Systems.
ACM Trans. Embed. Comput. Syst., 2017

Show Me the Money! Finding Flawed Implementations of Third-party In-app Payment in Android Apps.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Binary code clone detection across architectures and compiling configurations.
Proceedings of the 25th International Conference on Program Comprehension, 2017

Nightingale: Translating Embedded VM Code in x86 Binary Executables.
Proceedings of the Information Security - 20th International Conference, 2017

Embroidery: Patching Vulnerable Binary Code of Fragmentized Android Devices.
Proceedings of the 2017 IEEE International Conference on Software Maintenance and Evolution, 2017

MIRAGE: Randomizing large chunk allocation via dynamic binary instrumentation.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

NativeSpeaker: Identifying Crypto Misuses in Android Native Code Libraries.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

Smart Solution, Poor Protection: An Empirical Study of Security and Privacy Issues in Developing and Deploying Smart Home Devices.
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017

Oh-Pwn-VPN! Security Analysis of OpenVPN-Based Android Apps.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

Privacy-preserving data sharing scheme over cloud for social applications.
J. Netw. Comput. Appl., 2016

Cross-Architecture Binary Semantics Understanding via Similar Code Comparison.
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016

New Exploit Methods against Ptmalloc of GLIBC.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Security Analysis of Vendor Customized Code in Firmware of Embedded Device.
Proceedings of the Security and Privacy in Communication Networks, 2016

Security Testing of Software on Embedded Devices Using x86 Platform.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

Open Sesame! Web Authentication Cracking via Mobile App Analysis.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016

The Achilles heel of OAuth: a multi-platform study of OAuth-based authentication.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

Towards Efficient, Secure, and Fine-Grained Access Control System in MSNs with Flexible Revocations.
Int. J. Distributed Sens. Networks, 2015

SGOR: Secure and scalable geographic opportunistic routing with received signal strength in WSNs.
Comput. Commun., 2015

AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

SSG: Sensor Security Guard for Android Smartphones.
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015

From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Vulnerability Assessment of OAuth Implementations in Android Applications.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

iCryptoTracer: Dynamic Analysis on Misuse of Cryptography Functions in iOS Applications.
Proceedings of the Network and System Security - 8th International Conference, 2014

TagDroid: Hybrid SSL Certificate Verification in Android.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Android App Protection via Interpretation Obfuscation.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

APKLancet: tumor payload diagnosis and purification for android applications.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

DIAS: Automated Online Analysis for Android Applications.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

How network coding system constrains packet pollution attacks in wireless sensor networks.
Int. J. Grid Util. Comput., 2013

Towards Efficient and Secure Geographic Routing Protocol for Hostile Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

Automatic Detection and Analysis of Encrypted Messages in Malware.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

Selective Forwarding Attacks against Data and ACK Flows in Network Coding and Countermeasures.
J. Comput. Networks Commun., 2012

Flooding attacks against network coding and countermeasures.
Proceedings of the 5th International Conference on Network and System Security, 2011

Architecture Support for Memory Confidentiality and Integrity in Embedded Systems.
Int. J. Distributed Sens. Networks, 2009

Design and Implementation of Self-securing Disk.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

Exploiting unidirectional links for key establishment protocols in heterogeneous sensor networks.
Comput. Commun., 2008

Efficient Authenticated Encryption for Hybrid Hard Drives Based on GCM.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

Reliable Key Establishment Scheme Exploiting Unidirectional Links in Wireless Sensor Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008