Yuru Shao

According to our database1, Yuru Shao authored at least 14 papers between 2014 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Preventing Capability Abuse through Systematic Analysis of Exposed Interface.
PhD thesis, 2019

NDroid: Toward Tracking Information Flows Across Multiple Android Contexts.
IEEE Trans. Inf. Forensics Secur., 2019

Towards Automated Safety Vetting of PLC Code in Real-World Plants.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

ADD: Application and Data-Driven Controller Design.
Proceedings of the 2019 ACM Symposium on SDN Research, 2019

A Lightweight Framework for Fine-Grained Lifecycle Control of Android Applications.
Proceedings of the Fourteenth EuroSys Conference 2019, Dresden, Germany, March 25-28, 2019, 2019

2017
Categorization of Anomalies in Smart Manufacturing Systems to Support the Selection of Detection Mechanisms.
IEEE Robotics Autom. Lett., 2017

2016
Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

The Misuse of Android Unix Domain Sockets and Security Implications.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Static Detection of Packet Injection Vulnerabilities: A Case for Identifying Attacker-controlled Implicit Information Leaks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
RootGuard: Protecting Rooted Android Phones.
Computer, 2014

kTRxer: A portable toolkit for reliable internet probing.
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014

On Measuring One-Way Path Metrics from a Web Server.
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014

On Tracking Information Flows through JNI in Android Applications.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

Towards a scalable resource-driven approach for detecting repackaged Android applications.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014


  Loading...