default search action
Luyi Xing
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c33]Jiangrong Wu, Yuhong Nan, Luyi Xing, Jiatao Cheng, Zimin Lin, Zibin Zheng, Min Yang:
Leaking the Privacy of Groups and More: Understanding Privacy Risks of Cross-App Content Sharing in Mobile Ecosystem. NDSS 2024 - [c32]Bin Yuan, Zhanxiang Song, Yan Jia, Zhenyu Lu, Deqing Zou, Hai Jin, Luyi Xing:
MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementations. SP 2024: 2385-2403 - [c31]Yifan Zhang, Zhaojie Hu, Xueqiang Wang, Yuhui Hong, Yuhong Nan, XiaoFeng Wang, Jiatao Cheng, Luyi Xing:
Navigating the Privacy Compliance Maze: Understanding Risks with Privacy-Configurable Mobile SDKs. USENIX Security Symposium 2024 - [c30]Dexin Liu, Yue Xiao, Chaoqi Zhang, Kaitao Xie, Xiaolong Bai, Shikun Zhang, Luyi Xing:
iHunter: Hunting Privacy Violations at Scale in the Software Supply Chain on iOS. USENIX Security Symposium 2024 - [c29]Haoran Lu, Yichen Liu, Xiaojing Liao, Luyi Xing:
Towards Privacy-Preserving Social-Media SDKs on Android. USENIX Security Symposium 2024 - [i4]Hongbo Chen, Yifan Zhang, Xing Han, Huanyao Rong, Yuheng Zhang, Tianhao Mao, Hang Zhang, XiaoFeng Wang, Luyi Xing, Xun Chen:
WitheredLeaf: Finding Entity-Inconsistency Bugs with LLMs. CoRR abs/2405.01668 (2024) - 2023
- [j3]Bin Yuan, Yuhan Wu, Maogen Yang, Luyi Xing, Xuchang Wang, Deqing Zou, Hai Jin:
SmartPatch: Verifying the Authenticity of the Trigger-Event in the IoT Platform. IEEE Trans. Dependable Secur. Comput. 20(2): 1656-1674 (2023) - [c28]Zihao Wang, Jiale Guan, XiaoFeng Wang, Wenhao Wang, Luyi Xing, Fares Alharbi:
The Danger of Minimum Exposures: Understanding Cross-App Information Leaks on iOS through Multi-Side-Channel Learning. CCS 2023: 281-295 - [c27]Yue Xiao, Zhengyi Li, Yue Qin, Xiaolong Bai, Jiale Guan, Xiaojing Liao, Luyi Xing:
Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels. USENIX Security Symposium 2023: 1091-1108 - [c26]Xueqiang Wang, Yifan Zhang, XiaoFeng Wang, Yan Jia, Luyi Xing:
Union under Duress: Understanding Hazards of Duplicate Resource Mismediation in Android Software Supply Chain. USENIX Security Symposium 2023: 3403-3420 - [c25]Yuhong Nan, Xueqiang Wang, Luyi Xing, Xiaojing Liao, Ruoyu Wu, Jianliang Wu, Yifan Zhang, XiaoFeng Wang:
Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps. USENIX Security Symposium 2023: 6665-6682 - 2022
- [c24]Ze Jin, Luyi Xing, Yiwei Fang, Yan Jia, Bin Yuan, Qixu Liu:
P-Verifier: Understanding and Mitigating Security Risks in Cloud-based IoT Access Policies. CCS 2022: 1647-1661 - [c23]Xin'an Zhou, Jiale Guan, Luyi Xing, Zhiyun Qian:
Perils and Mitigation of Security Risks of Cooperation in Mobile-as-a-Gateway IoT. CCS 2022: 3285-3299 - [c22]Zhi Li, Weijie Liu, Hongbo Chen, XiaoFeng Wang, Xiaojing Liao, Luyi Xing, Mingming Zha, Hai Jin, Deqing Zou:
Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms. SP 2022: 2397-2412 - [c21]Yijing Liu, Yan Jia, Qingyin Tan, Zheli Liu, Luyi Xing:
How Are Your Zombie Accounts? Understanding Users' Practices and Expectations on Mobile App Account Deletion. USENIX Security Symposium 2022: 863-880 - [i3]Yue Xiao, Zhengyi Li, Yue Qin, Xiaolong Bai, Jiale Guan, Xiaojing Liao, Luyi Xing:
Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels at Scale. CoRR abs/2206.06274 (2022) - 2021
- [c20]Yan Jia, Bin Yuan, Luyi Xing, Dongfang Zhao, Yifan Zhang, XiaoFeng Wang, Yijing Liu, Kaimin Zheng, Peyton Crnjak, Yuqing Zhang, Deqing Zou, Hai Jin:
Who's In Control? On Security Risks of Disjointed IoT Device Management Channels. CCS 2021: 1289-1305 - [c19]Liya Su, Xinyue Shen, Xiangyu Du, Xiaojing Liao, XiaoFeng Wang, Luyi Xing, Baoxu Liu:
Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications. USENIX Security Symposium 2021: 1307-1324 - [c18]Jice Wang, Yue Xiao, Xueqiang Wang, Yuhong Nan, Luyi Xing, Xiaojing Liao, Jinwei Dong, Nicolás Serrano, Haoran Lu, XiaoFeng Wang, Yuqing Zhang:
Understanding Malicious Cross-library Data Harvesting on Android. USENIX Security Symposium 2021: 4133-4150 - 2020
- [c17]Haoran Lu, Luyi Xing, Yue Xiao, Yifan Zhang, Xiaojing Liao, XiaoFeng Wang, Xueqiang Wang:
Demystifying Resource Management Risks in Emerging Mobile App-in-App Ecosystems. CCS 2020: 569-585 - [c16]Xiaolong Bai, Luyi Xing, Min Zheng, Fuping Qu:
iDEA: Static Analysis on the Security of Apple Kernel Drivers. CCS 2020: 1185-1202 - [c15]Tao Lv, Ruishi Li, Yi Yang, Kai Chen, Xiaojing Liao, XiaoFeng Wang, Peiwei Hu, Luyi Xing:
RTFM! Automatic Assumption Discovery and Verification Derivation from Library Document for API Misuse Detection. CCS 2020: 1837-1852 - [c14]Yan Jia, Luyi Xing, Yuhang Mao, Dongfang Zhao, XiaoFeng Wang, Shangru Zhao, Yuqing Zhang:
Burglars' IoT Paradise: Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds. SP 2020: 465-481 - [c13]Bin Yuan, Yan Jia, Luyi Xing, Dongfang Zhao, XiaoFeng Wang, Deqing Zou, Hai Jin, Yuqing Zhang:
Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation. USENIX Security Symposium 2020: 1183-1200 - [i2]Weijie Liu, Wenhao Wang, XiaoFeng Wang, Xiaozhu Meng, Yaosong Lu, Hongbo Chen, Xinyu Wang, Qingtao Shen, Kai Chen, Haixu Tang, Yi Chen, Luyi Xing:
Confidential Attestation: Efficient in-Enclave Verification of Privacy Policy Compliance. CoRR abs/2007.10513 (2020)
2010 – 2019
- 2019
- [c12]Yi Chen, Luyi Xing, Yue Qin, Xiaojing Liao, XiaoFeng Wang, Kai Chen, Wei Zou:
Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation Analysis. USENIX Security Symposium 2019: 747-764 - 2018
- [j2]Xiaojing Liao, Sumayah A. Alrwais, Kan Yuan, Luyi Xing, XiaoFeng Wang, Shuang Hao, Raheem Beyah:
Cloud repository as a malicious service: challenge, identification and implication. Cybersecur. 1(1): 14 (2018) - 2017
- [j1]Xiaolong Bai, Luyi Xing, Nan Zhang, XiaoFeng Wang, Xiaojing Liao, Tongxin Li, Shi-Min Hu:
Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos. IEEE Secur. Priv. 15(2): 42-49 (2017) - [c11]Tongxin Li, Xueqiang Wang, Mingming Zha, Kai Chen, XiaoFeng Wang, Luyi Xing, Xiaolong Bai, Nan Zhang, Xinhui Han:
Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews. CCS 2017: 829-844 - 2016
- [c10]Xiaojing Liao, Kan Yuan, XiaoFeng Wang, Zhou Li, Luyi Xing, Raheem A. Beyah:
Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence. CCS 2016: 755-766 - [c9]Xiaojing Liao, Sumayah A. Alrwais, Kan Yuan, Luyi Xing, XiaoFeng Wang, Shuang Hao, Raheem A. Beyah:
Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service. CCS 2016: 1541-1552 - [c8]Xiaolong Bai, Luyi Xing, Nan Zhang, XiaoFeng Wang, Xiaojing Liao, Tongxin Li, Shi-Min Hu:
Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf. IEEE Symposium on Security and Privacy 2016: 655-674 - [c7]Xiaojing Liao, Kan Yuan, XiaoFeng Wang, Zhongyu Pei, Hao Yang, Jianjun Chen, Hai-Xin Duan, Kun Du, Eihal Alowaisheq, Sumayah A. Alrwais, Luyi Xing, Raheem A. Beyah:
Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search. IEEE Symposium on Security and Privacy 2016: 707-723 - 2015
- [c6]Luyi Xing, Xiaolong Bai, Tongxin Li, XiaoFeng Wang, Kai Chen, Xiaojing Liao, Shi-Min Hu, Xinhui Han:
Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS. CCS 2015: 31-43 - [i1]Luyi Xing, Xiaolong Bai, Tongxin Li, XiaoFeng Wang, Kai Chen, Xiaojing Liao, Shi-Min Hu, Xinhui Han:
Unauthorized Cross-App Resource Access on MAC OS X and iOS. CoRR abs/1505.06836 (2015) - 2014
- [c5]Tongxin Li, Xiao-yong Zhou, Luyi Xing, Yeonjoon Lee, Muhammad Naveed, XiaoFeng Wang, Xinhui Han:
Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services. CCS 2014: 978-989 - [c4]Luyi Xing, Xiaorui Pan, Rui Wang, Kan Yuan, XiaoFeng Wang:
Upgrading Your Android, Elevating My Malware: Privilege Escalation through Mobile OS Updating. IEEE Symposium on Security and Privacy 2014: 393-408 - 2013
- [c3]Rui Wang, Luyi Xing, XiaoFeng Wang, Shuo Chen:
Unauthorized origin crossing on mobile platforms: threats and mitigation. CCS 2013: 635-646 - [c2]Luyi Xing, Yangyi Chen, XiaoFeng Wang, Shuo Chen:
InteGuard: Toward Automatic Protection of Third-Party Web Service Integrations. NDSS 2013 - 2010
- [c1]Luyi Xing, Yuqing Zhang, Shenlong Chen:
A Client-Based and Server-Enhanced Defense Mechanism for Cross-Site Request Forgery. RAID 2010: 484-485
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint