Yuhong Nan

Orcid: 0000-0001-9597-9888

According to our database1, Yuhong Nan authored at least 22 papers between 2015 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning.
CoRR, 2023

Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps.
Proceedings of the 32nd USENIX Security Symposium, 2023

AIRTAG: Towards Automated Attack Investigation by Unsupervised Learning with Log Texts.
Proceedings of the 32nd USENIX Security Symposium, 2023

Understanding Dark UI Patterns in the Mobile Ecosystem: A Case Study of Apps in China.
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 2023

SmartCoCo: Checking Comment-Code Inconsistency in Smart Contracts via Constraint Propagation and Binding.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Detecting State Inconsistency Bugs in DApps via On-Chain Transaction Replay and Fuzzing.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

SmartState: Detecting State-Reverting Vulnerabilities in Smart Contracts via Fine-Grained State-Dependency Analysis.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

DARPA: Combating Asymmetric Dark UI Patterns on Android with Run-time View Decorator.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

2022
ProFactory: Improving IoT Security via Formalized Protocol Customization.
Proceedings of the 31st USENIX Security Symposium, 2022

Security Evaluation of Smart Contracts based on Code and Transaction - A Survey.
Proceedings of the International Conference on Service Science, 2022

Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

SmartDagger: a bytecode-based static analysis approach for detecting cross-contract vulnerability.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

SIMulation: Demystifying (Insecure) Cellular Network based One-Tap Authentication Services.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2021
Understanding Malicious Cross-library Data Harvesting on Android.
Proceedings of the 30th USENIX Security Symposium, 2021

ATLAS: A Sequence-based Learning Approach for Attack Investigation.
Proceedings of the 30th USENIX Security Symposium, 2021

On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2020
BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy.
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020

BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

2018
Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Identifying User-Input Privacy in Mobile Applications at a Large Scale.
IEEE Trans. Inf. Forensics Secur., 2017

2015
UIPicker: User-Input Privacy Identification in Mobile Applications.
Proceedings of the 24th USENIX Security Symposium, 2015


  Loading...