Juanru Li
Orcid: 0000-0002-7978-595X
According to our database1,
Juanru Li
authored at least 70 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Software Eng., March, 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
CoRR, 2024
2023
Proceedings of the 32nd USENIX Security Symposium, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
Dagstuhl Artifacts Ser., 2022
Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Rethinking the security of IoT from the perspective of developer customized device-cloud interaction.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022
Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Proceedings of the 36th European Conference on Object-Oriented Programming, 2022
SIMulation: Demystifying (Insecure) Cellular Network based One-Tap Authentication Services.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
2021
Re-Check Your Certificates! Experiences and Lessons Learnt from Real-World HTTPS Certificate Deployments.
Proceedings of the Network and System Security - 15th International Conference, 2021
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021
Yet Another Traffic Black Hole: Amplifying CDN Fetching Traffic with RangeFragAmp Attacks.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021
2020
Proceedings of the 27th IEEE International Conference on Software Analysis, 2020
Proceedings of the 27th IEEE International Conference on Software Analysis, 2020
Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
J. Inf. Secur. Appl., 2019
APPCOMMUNE: Automated Third-Party Libraries De-duplicating and Updating for Android Apps.
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019
NLP-EYE: Detecting Memory Corruptions via Semantic-Aware Memory Operation Function Identification.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
AppSpear: Automating the hidden-code extraction and reassembling of packed android malware.
J. Syst. Softw., 2018
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the 2018 IEEE International Conference on Software Maintenance and Evolution, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 25th Asia-Pacific Software Engineering Conference, 2018
2017
Why Data Deletion Fails? A Study on Deletion Flaws and Data Remanence in Android Systems.
ACM Trans. Embed. Comput. Syst., 2017
Show Me the Money! Finding Flawed Implementations of Third-party In-app Payment in Android Apps.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 25th International Conference on Program Comprehension, 2017
Proceedings of the Information Security - 20th International Conference, 2017
Proceedings of the 2017 IEEE International Conference on Software Maintenance and Evolution, 2017
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017
Smart Solution, Poor Protection: An Empirical Study of Security and Privacy Issues in Developing and Deploying Smart Home Devices.
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017
2016
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015
From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
iCryptoTracer: Dynamic Analysis on Misuse of Cryptography Functions in iOS Applications.
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Information and Communications Security - 16th International Conference, 2014
Proceedings of the IEEE 12th International Conference on Dependable, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014
2013
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
Differential Fault Analysis on Lightweight Blockciphers with Statistical Cryptanalysis Techniques.
Proceedings of the 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2012
2011
J. Comput., 2011
Proceedings of the Information Security, 14th International Conference, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
2010
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010
2009
Proceedings of the Third International Conference on Network and System Security, 2009
2008
Exploiting unidirectional links for key establishment protocols in heterogeneous sensor networks.
Comput. Commun., 2008