BibTeX records: Xiaorui Pan

download as .bib file

@inproceedings{DBLP:conf/raid/DiaoZZ0XPLWZ019,
  author       = {Wenrui Diao and
                  Yue Zhang and
                  Li Zhang and
                  Zhou Li and
                  Fenghao Xu and
                  Xiaorui Pan and
                  Xiangyu Liu and
                  Jian Weng and
                  Kehuan Zhang and
                  XiaoFeng Wang},
  title        = {Kindness is a Risky Business: On the Usage of the Accessibility APIs
                  in Android},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {261--275},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/diao},
  timestamp    = {Wed, 10 Feb 2021 22:02:04 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/DiaoZZ0XPLWZ019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/DuanZBYPLWW18,
  author       = {Yue Duan and
                  Mu Zhang and
                  Abhishek Vasisht Bhaskar and
                  Heng Yin and
                  Xiaorui Pan and
                  Tongxin Li and
                  Xueqiang Wang and
                  XiaoFeng Wang},
  title        = {Things You May Not Know About Android (Un)Packers: {A} Systematic
                  Study based on Whole-System Emulation},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_04A-4\_Duan\_paper.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/DuanZBYPLWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangCPZWBTG17,
  author       = {Wenhao Wang and
                  Guoxing Chen and
                  Xiaorui Pan and
                  Yinqian Zhang and
                  XiaoFeng Wang and
                  Vincent Bindschaedler and
                  Haixu Tang and
                  Carl A. Gunter},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel
                  Hazards in {SGX}},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {2421--2434},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134038},
  doi          = {10.1145/3133956.3134038},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/WangCPZWBTG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/PanWDWY17,
  author       = {Xiaorui Pan and
                  Xueqiang Wang and
                  Yue Duan and
                  XiaoFeng Wang and
                  Heng Yin},
  title        = {Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive
                  Operations in Android Apps},
  booktitle    = {24th Annual Network and Distributed System Security Symposium, {NDSS}
                  2017, San Diego, California, USA, February 26 - March 1, 2017},
  publisher    = {The Internet Society},
  year         = {2017},
  url          = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/dark-hazard-learning-based-large-scale-discovery-hidden-sensitive-operations-android-apps/},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/PanWDWY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WangCPZWBTG17,
  author       = {Wenhao Wang and
                  Guoxing Chen and
                  Xiaorui Pan and
                  Yinqian Zhang and
                  XiaoFeng Wang and
                  Vincent Bindschaedler and
                  Haixu Tang and
                  Carl A. Gunter},
  title        = {Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel
                  Hazards in {SGX}},
  journal      = {CoRR},
  volume       = {abs/1705.07289},
  year         = {2017},
  url          = {http://arxiv.org/abs/1705.07289},
  eprinttype    = {arXiv},
  eprint       = {1705.07289},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WangCPZWBTG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Bindschaedler0P15,
  author       = {Vincent Bindschaedler and
                  Muhammad Naveed and
                  Xiaorui Pan and
                  XiaoFeng Wang and
                  Yan Huang},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy,
                  and the New Way Forward},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {837--849},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813649},
  doi          = {10.1145/2810103.2813649},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Bindschaedler0P15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/XingPWYW14,
  author       = {Luyi Xing and
                  Xiaorui Pan and
                  Rui Wang and
                  Kan Yuan and
                  XiaoFeng Wang},
  title        = {Upgrading Your Android, Elevating My Malware: Privilege Escalation
                  through Mobile {OS} Updating},
  booktitle    = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley,
                  CA, USA, May 18-21, 2014},
  pages        = {393--408},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SP.2014.32},
  doi          = {10.1109/SP.2014.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/XingPWYW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsnet/ShenPHFZGN13,
  author       = {Zhong Shen and
                  Xiaorui Pan and
                  Caiyan Huang and
                  Juntao Feng and
                  Yun Zhao and
                  Min Gao and
                  Lionel M. Ni},
  title        = {Energy consumption monitoring for sensor nodes in {SNAP}},
  journal      = {Int. J. Sens. Networks},
  volume       = {13},
  number       = {2},
  pages        = {112--120},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSNET.2013.053723},
  doi          = {10.1504/IJSNET.2013.053723},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsnet/ShenPHFZGN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhouDHNPWGN13,
  author       = {Xiao{-}yong Zhou and
                  Soteris Demetriou and
                  Dongjing He and
                  Muhammad Naveed and
                  Xiaorui Pan and
                  XiaoFeng Wang and
                  Carl A. Gunter and
                  Klara Nahrstedt},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Identity, location, disease and more: inferring your secrets from
                  android public resources},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {1017--1028},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516661},
  doi          = {10.1145/2508859.2516661},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhouDHNPWGN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/GaoPDHZN11,
  author       = {Min Gao and
                  Xiaorui Pan and
                  Longhui Deng and
                  Caiyan Huang and
                  Dian Zhang and
                  Lionel M. Ni},
  title        = {A Versatile Nodal Energy Consumption Monitoring Method for Wireless
                  Sensor Network Testbed},
  booktitle    = {17th {IEEE} International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2011, Tainan, Taiwan, December 7-9, 2011},
  pages        = {388--395},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICPADS.2011.21},
  doi          = {10.1109/ICPADS.2011.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpads/GaoPDHZN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics