Lei Zhang

Orcid: 0000-0002-9298-2536

Affiliations:
  • Fudan University, Department of Computer Science, Shanghai, China


According to our database1, Lei Zhang authored at least 15 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The Dark Forest: Understanding Security Risks of Cross-Party Delegated Resources in Mobile App-in-App Ecosystems.
IEEE Trans. Inf. Forensics Secur., 2024

Component Security Ten Years Later: An Empirical Study of Cross-Layer Threats in Real-World Mobile Applications.
Proc. ACM Softw. Eng., 2024

RecurScan: Detecting Recurring Vulnerabilities in PHP Web Applications.
Proceedings of the ACM on Web Conference 2024, 2024

Efficient Detection of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Construction.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

2023
Understanding Privacy Over-collection in WeChat Sub-app Ecosystem.
CoRR, 2023

TrustedDomain Compromise Attack in App-in-app Ecosystems.
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 2023

NestFuzz: Enhancing Fuzzing with Comprehensive Understanding of Input Processing Logic.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Identity Confusion in WebView-based Mobile App-in-app Ecosystems.
Proceedings of the 31st USENIX Security Symposium, 2022

Exploit the Last Straw That Breaks Android Systems.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2020
TextExerciser: Feedback-driven Text Input Exercising for Android Applications.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

2019
App in the Middle: Demystify Application Virtualization in Android and its Security Threats.
Proc. ACM Meas. Anal. Comput. Syst., 2019

UR: A User-Based Collaborative Filtering Recommendation System Based on Trust Mechanism and Time Weighting.
Proceedings of the 25th IEEE International Conference on Parallel and Distributed Systems, 2019

2018
Invetter: Locating Insecure Input Validations in Android Services.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2016
A survey of privacy protection techniques for mobile devices.
J. Commun. Inf. Networks, 2016


  Loading...