Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Xiaorui Pan
@inproceedings{DBLP:conf/raid/DiaoZZ0XPLWZ019, author = {Wenrui Diao and Yue Zhang and Li Zhang and Zhou Li and Fenghao Xu and Xiaorui Pan and Xiangyu Liu and Jian Weng and Kehuan Zhang and XiaoFeng Wang}, title = {Kindness is a Risky Business: On the Usage of the Accessibility APIs in Android}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {261--275}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/diao}, timestamp = {Wed, 10 Feb 2021 22:02:04 +0100}, biburl = {https://dblp.org/rec/conf/raid/DiaoZZ0XPLWZ019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/DuanZBYPLWW18, author = {Yue Duan and Mu Zhang and Abhishek Vasisht Bhaskar and Heng Yin and Xiaorui Pan and Tongxin Li and Xueqiang Wang and XiaoFeng Wang}, title = {Things You May Not Know About Android (Un)Packers: {A} Systematic Study based on Whole-System Emulation}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_04A-4\_Duan\_paper.pdf}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/DuanZBYPLWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangCPZWBTG17, author = {Wenhao Wang and Guoxing Chen and Xiaorui Pan and Yinqian Zhang and XiaoFeng Wang and Vincent Bindschaedler and Haixu Tang and Carl A. Gunter}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in {SGX}}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2421--2434}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134038}, doi = {10.1145/3133956.3134038}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/WangCPZWBTG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/PanWDWY17, author = {Xiaorui Pan and Xueqiang Wang and Yue Duan and XiaoFeng Wang and Heng Yin}, title = {Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps}, booktitle = {24th Annual Network and Distributed System Security Symposium, {NDSS} 2017, San Diego, California, USA, February 26 - March 1, 2017}, publisher = {The Internet Society}, year = {2017}, url = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/dark-hazard-learning-based-large-scale-discovery-hidden-sensitive-operations-android-apps/}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/PanWDWY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WangCPZWBTG17, author = {Wenhao Wang and Guoxing Chen and Xiaorui Pan and Yinqian Zhang and XiaoFeng Wang and Vincent Bindschaedler and Haixu Tang and Carl A. Gunter}, title = {Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in {SGX}}, journal = {CoRR}, volume = {abs/1705.07289}, year = {2017}, url = {http://arxiv.org/abs/1705.07289}, eprinttype = {arXiv}, eprint = {1705.07289}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WangCPZWBTG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Bindschaedler0P15, author = {Vincent Bindschaedler and Muhammad Naveed and Xiaorui Pan and XiaoFeng Wang and Yan Huang}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {837--849}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813649}, doi = {10.1145/2810103.2813649}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Bindschaedler0P15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/XingPWYW14, author = {Luyi Xing and Xiaorui Pan and Rui Wang and Kan Yuan and XiaoFeng Wang}, title = {Upgrading Your Android, Elevating My Malware: Privilege Escalation through Mobile {OS} Updating}, booktitle = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley, CA, USA, May 18-21, 2014}, pages = {393--408}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SP.2014.32}, doi = {10.1109/SP.2014.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/XingPWYW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsnet/ShenPHFZGN13, author = {Zhong Shen and Xiaorui Pan and Caiyan Huang and Juntao Feng and Yun Zhao and Min Gao and Lionel M. Ni}, title = {Energy consumption monitoring for sensor nodes in {SNAP}}, journal = {Int. J. Sens. Networks}, volume = {13}, number = {2}, pages = {112--120}, year = {2013}, url = {https://doi.org/10.1504/IJSNET.2013.053723}, doi = {10.1504/IJSNET.2013.053723}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsnet/ShenPHFZGN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhouDHNPWGN13, author = {Xiao{-}yong Zhou and Soteris Demetriou and Dongjing He and Muhammad Naveed and Xiaorui Pan and XiaoFeng Wang and Carl A. Gunter and Klara Nahrstedt}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Identity, location, disease and more: inferring your secrets from android public resources}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1017--1028}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516661}, doi = {10.1145/2508859.2516661}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhouDHNPWGN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/GaoPDHZN11, author = {Min Gao and Xiaorui Pan and Longhui Deng and Caiyan Huang and Dian Zhang and Lionel M. Ni}, title = {A Versatile Nodal Energy Consumption Monitoring Method for Wireless Sensor Network Testbed}, booktitle = {17th {IEEE} International Conference on Parallel and Distributed Systems, {ICPADS} 2011, Tainan, Taiwan, December 7-9, 2011}, pages = {388--395}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICPADS.2011.21}, doi = {10.1109/ICPADS.2011.21}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpads/GaoPDHZN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.