Chenxiong Qian

Orcid: 0000-0002-6201-6011

According to our database1, Chenxiong Qian authored at least 26 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Identify As A Human Does: A Pathfinder of Next-Generation Anti-Cheat Framework for First-Person Shooter Games.
CoRR, 2024

CONGRA: Benchmarking Automatic Conflict Resolution.
CoRR, 2024

WizardMerge - Save Us From Merging Without Any Clues.
CoRR, 2024

Invisibility Cloak: Proactive Defense Against Visual Game Cheating.
Proceedings of the 33rd USENIX Security Symposium, 2024

Revisiting Automotive Attack Surfaces: a Practitioners' Perspective.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Beyond the Surface: Uncovering the Unprotected Components of Android Against Overlay Attack.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

2023
CydiOS: A Model-Based Testing Framework for iOS Apps.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

2022
DeView: Confining Progressive Web Applications by Debloating Web APIs.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Reducing Software's Attack surface with Code Debloating.
PhD thesis, 2021

2020
Slimium: Debloating the Chromium Browser with Feature Subsetting.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
NDroid: Toward Tracking Information Flows Across Multiple Android Contexts.
IEEE Trans. Inf. Forensics Secur., 2019

RAZOR: A Framework for Post-deployment Software Debloating.
Proceedings of the 28th USENIX Security Symposium, 2019

2018
Enhancing the Description-to-Behavior Fidelity in Android Apps with Privacy Policy.
IEEE Trans. Software Eng., 2018

Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.
Proceedings of the 27th USENIX Security Symposium, 2018

Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Enforcing Unique Code Target Property for Control-Flow Integrity.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Efficient Protection of Path-Sensitive Control Security.
Proceedings of the 26th USENIX Security Symposium, 2017

Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

2016
Toward Engineering a Secure Android Ecosystem: A Survey of Existing Techniques.
ACM Comput. Surv., 2016

Revisiting the Description-to-Behavior Fidelity in Android Applications.
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016

2015
VulHunter: Toward Discovering Vulnerabilities in Android Applications.
IEEE Micro, 2015

AndroidPerf: A cross-layer profiling system for Android applications.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

2014
RootGuard: Protecting Rooted Android Phones.
Computer, 2014

On Measuring One-Way Path Metrics from a Web Server.
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014

On Tracking Information Flows through JNI in Android Applications.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

Towards a scalable resource-driven approach for detecting repackaged Android applications.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014


  Loading...