Zhiyun Qian

According to our database1, Zhiyun Qian authored at least 57 papers between 2009 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Catch Me if You Can: A Closer Look at Malicious Co-Residency on the Cloud.
IEEE/ACM Trans. Netw., 2019

App in the Middle: Demystify Application Virtualization in Android and its Security Threats.
POMACS, 2019

ShadowBlock: A Lightweight and Stealthy Adblocking Browser.
Proceedings of the World Wide Web Conference, 2019

App in the Middle: Demystify Application Virtualization in Android and its Security Threats.
Proceedings of the Abstracts of the 2019 SIGMETRICS/Performance Joint International Conference on Measurement and Modeling of Computer Systems, 2019

Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

When the Attacker Knows a Lot: The GAGA Graph Anonymizer.
Proceedings of the Information Security - 22nd International Conference, 2019

Figment: Fine-grained Permission Management for Mobile Apps.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Collaborative Client-Side DNS Cache Poisoning Attack.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

PAPP: Prefetcher-Aware Prime and Probe Side-channel Attack.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

2018
Off-Path TCP Exploits of the Challenge ACK Global Rate Limit.
IEEE/ACM Trans. Netw., 2018

Precise and Accurate Patch Presence Test for Binaries.
Proceedings of the 27th USENIX Security Symposium, 2018

Charm: Facilitating Dynamic Analysis of Device Drivers of Mobile Systems.
Proceedings of the 27th USENIX Security Symposium, 2018

Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secrets.
Proceedings of the 27th USENIX Security Symposium, 2018

Static Evaluation of Noninterference Using Approximate Model Counting.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

RARE: A Systematic Augmented Router Emulation for Malware Analysis.
Proceedings of the Passive and Active Measurement - 19th International Conference, 2018

Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysis.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Accurate and Efficient Wireless Device Fingerprinting Using Channel State Information.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

A Framework for MIMO-based Packet Header Obfuscation.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

IotSan: fortifying the safety of IoT systems.
Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies, 2018

Resilient decentralized Android application repackaging detection using logic bombs.
Proceedings of the 2018 International Symposium on Code Generation and Optimization, 2018

Invetter: Locating Insecure Input Validations in Android Services.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Rendered Insecure: GPU Side Channel Attacks are Practical.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Droid M+: Developer Support for Imbibing Android's New Permission Model.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Detecting Anti Ad-blockers in the Wild.
PoPETs, 2017

Stalling Live Migrations on the Cloud.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

Detecting Android Root Exploits by Learning from Root Providers.
Proceedings of the 26th USENIX Security Symposium, 2017

Investigation of the 2016 Linux TCP Stack Vulnerability at Scale.
Proceedings of the 2017 ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, Urbana-Champaign, IL, USA, June 05, 2017

Where Is the Weakest Link? A Study on Security Discrepancies Between Android Apps and Their Website Counterparts.
Proceedings of the Passive and Active Measurement - 18th International Conference, 2017

Malicious co-residency on the cloud: Attacks and defense.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Your state is not mine: a closer look at evading stateful internet censorship.
Proceedings of the 2017 Internet Measurement Conference, 2017

The ad wars: retrospective measurement and analysis of anti-adblock filter lists.
Proceedings of the 2017 Internet Measurement Conference, 2017

Multipath TCP traffic diversion attacks and countermeasures.
Proceedings of the 25th IEEE International Conference on Network Protocols, 2017

Selective HTTPS traffic manipulation at middleboxes for BYOD devices.
Proceedings of the 25th IEEE International Conference on Network Protocols, 2017

2016
Off-Path TCP Exploits: Global Rate Limit Considered Dangerous.
Proceedings of the 25th USENIX Security Symposium, 2016

Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Optimal Monitor Placement for Detection of Persistent Threats.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Android ION Hazard: the Curse of Customizable Memory Management System.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

The Misuse of Android Unix Domain Sockets and Security Implications.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

revDroid: Code Analysis of the Side Effects after Dynamic Permission Revocation of Android Apps.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Behavior Query Discovery in System-Generated Temporal Graphs.
PVLDB, 2015

Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Proactive restart as cyber maneuver for Android.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Android Root and its Providers: A Double-Edged Sword.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Discover and Tame Long-running Idling Processes in Enterprise Systems.
Proceedings of the 10th ACM Symposium on Information, 2015

Static Detection of Packet Injection Vulnerabilities: A Case for Identifying Attacker-controlled Implicit Information Leaks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

2013
AppProfiler: a flexible method of exposing privacy-related behavior in android applications to end users.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

You Can Run, but You Can't Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Collaborative TCP sequence number inference attack: how to crack sequence number under a second.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
An untold story of middleboxes in cellular networks.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

Designing Scalable and Effective Decision Support for Mitigating Attacks in Large Enterprise Networks.
Proceedings of the Security and Privacy in Communication Networks, 2011

2010
Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

On Network-level Clusters for Spam Detection.
Proceedings of the Network and Distributed System Security Symposium, 2010

Accurate online power estimation and automatic battery behavior based power model generation for smartphones.
Proceedings of the 8th International Conference on Hardware/Software Codesign and System Synthesis, 2010

2009
Ensemble: Community-Based Anomaly Detection for Popular Applications.
Proceedings of the Security and Privacy in Communication Networks, 2009


  Loading...