Yuhong Nan

Orcid: 0000-0001-9597-9888

According to our database1, Yuhong Nan authored at least 39 papers between 2015 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
An Empirical Study on Embodied Artificial Intelligence Robot (EAIR) Software Bugs.
CoRR, July, 2025

Control at Stake: Evaluating the Security Landscape of LLM-Driven Email Agents.
CoRR, July, 2025

Understanding the Sneaky Patterns of Pop-up Windows in the Mobile Ecosystem.
CoRR, May, 2025

An Empirical Study of High-Risk Vulnerabilities in IoT Systems.
IEEE Internet Things J., January, 2025

Augmenting Smart Contract Decompiler Output through Fine-grained Dependency Analysis and LLM-facilitated Semantic Recovery.
CoRR, January, 2025

Connector: Enhancing the Traceability of Decentralized Bridge Applications via Automatic Cross-Chain Transaction Association.
IEEE Trans. Inf. Forensics Secur., 2025

Smartreco: Detecting Read-Only Reentrancy via Fine-Grained Cross-DApp Analysis.
Proceedings of the 47th IEEE/ACM International Conference on Software Engineering, 2025

2024
Understanding Privacy Risks of Intelligent Connected Vehicles Through Their Companion Mobile Apps.
IEEE Internet Things J., October, 2024

FunFuzz: A Function-Oriented Fuzzer for Smart Contract Vulnerability Detection with High Effectiveness and Efficiency.
ACM Trans. Softw. Eng. Methodol., September, 2024

SmartAxe: Detecting Cross-Chain Vulnerabilities in Bridge Smart Contracts via Fine-Grained Static Analysis.
Proc. ACM Softw. Eng., 2024

CONNECTOR: Enhancing the Traceability of Decentralized Bridge Applications via Automatic Cross-chain Transaction Association.
CoRR, 2024

MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning.
Proceedings of the 33rd USENIX Security Symposium, 2024

Navigating the Privacy Compliance Maze: Understanding Risks with Privacy-Configurable Mobile SDKs.
Proceedings of the 33rd USENIX Security Symposium, 2024

Leaking the Privacy of Groups and More: Understanding Privacy Risks of Cross-App Content Sharing in Mobile Ecosystem.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Midas: Mining Profitable Exploits in On-Chain Smart Contracts via Feedback-Driven Fuzzing and Differential Analysis.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

PrettySmart: Detecting Permission Re-delegation Vulnerability for Token Behaviors in Smart Contracts.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

Understanding Cross-Platform Referral Traffic for Illicit Drug Promotion.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Are We Getting Well-informed? An In-depth Study of Runtime Privacy Notice Practice in Mobile Apps.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps.
Proceedings of the 32nd USENIX Security Symposium, 2023

AIRTAG: Towards Automated Attack Investigation by Unsupervised Learning with Log Texts.
Proceedings of the 32nd USENIX Security Symposium, 2023

Understanding Dark UI Patterns in the Mobile Ecosystem: A Case Study of Apps in China.
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 2023

SmartCoCo: Checking Comment-Code Inconsistency in Smart Contracts via Constraint Propagation and Binding.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Detecting State Inconsistency Bugs in DApps via On-Chain Transaction Replay and Fuzzing.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

SmartState: Detecting State-Reverting Vulnerabilities in Smart Contracts via Fine-Grained State-Dependency Analysis.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

DARPA: Combating Asymmetric Dark UI Patterns on Android with Run-time View Decorator.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

2022
ProFactory: Improving IoT Security via Formalized Protocol Customization.
Proceedings of the 31st USENIX Security Symposium, 2022

Security Evaluation of Smart Contracts based on Code and Transaction - A Survey.
Proceedings of the International Conference on Service Science, 2022

Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

SmartDagger: a bytecode-based static analysis approach for detecting cross-contract vulnerability.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

SIMulation: Demystifying (Insecure) Cellular Network based One-Tap Authentication Services.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2021
Understanding Malicious Cross-library Data Harvesting on Android.
Proceedings of the 30th USENIX Security Symposium, 2021

ATLAS: A Sequence-based Learning Approach for Attack Investigation.
Proceedings of the 30th USENIX Security Symposium, 2021

On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2020
BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy.
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020

BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

2018
Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Identifying User-Input Privacy in Mobile Applications at a Large Scale.
IEEE Trans. Inf. Forensics Secur., 2017

2015
UIPicker: User-Input Privacy Identification in Mobile Applications.
Proceedings of the 24th USENIX Security Symposium, 2015


  Loading...