Revealing the Black Box of Device Search Engine: Scanning Assets, Strategies, and Ethical Consideration.
CoRR, 2024
RAG-Thief: Scalable Extraction of Private Data from Retrieval-Augmented Generation Applications with Agent-based Attacks.
CoRR, 2024
Interface Illusions: Uncovering the Rise of Visual Scams in Cryptocurrency Wallets.
Proceedings of the ACM on Web Conference 2024, 2024
Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild.
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Understanding and Detecting Abused Image Hosting Modules as Malicious Services.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Revealing and Analyzing the Visual Scams of Cryptocurrency Wallets.
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023
Analyzing Ground-Truth Data of Mobile Gambling Scams.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
How Android developers handle evolution-induced API compatibility issues: a large-scale study.
,
,
,
,
,
,
,
,
,
,
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020
Invetter: Locating Insecure Input Validations in Android Services.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018