Song Li

Orcid: 0000-0002-7961-8502

Affiliations:
  • School of Cyber Science and Technology/College of Computer Science and Technology, Zhejiang University, China


According to our database1, Song Li authored at least 16 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Sensitive Behavioral Chain-Focused Android Malware Detection Fused With AST Semantics.
IEEE Trans. Inf. Forensics Secur., 2024

GraphTunnel: Robust DNS Tunnel Detection Based on DNS Recursive Resolution Graph.
IEEE Trans. Inf. Forensics Secur., 2024

What's the Real: A Novel Design Philosophy for Robust AI-Synthesized Voice Detection.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

LiScopeLens: An Open-Source License Incompatibility Analysis Tool Based on Scope Representation of License Terms.
Proceedings of the 35th IEEE International Symposium on Software Reliability Engineering, 2024

Ghost-in-Wave: How Speaker-Irrelative Features Interfere DeepFake Voice Detectors.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024

SQLStateGuard: Statement-Level SQL Injection Defense Based on Learning-Driven Middleware.
Proceedings of the 2024 ACM Symposium on Cloud Computing, 2024

2023
Scaling JavaScript Abstract Interpretation to Detect and Exploit Node.js Taint-style Vulnerability.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

CoCo: Efficient Browser Extension Vulnerability Detection via Coverage-guided, Concurrent Abstract Interpretation.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Mining Node.js Vulnerabilities via Object Dependence Graph and Query.
Proceedings of the 31st USENIX Security Symposium, 2022

Probe the Proto: Measuring Client-Side Prototype Pollution Vulnerabilities of One Million Real-world Websites.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

GraphTrack: A Graph-based Cross-Device Tracking Framework.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Detecting Node.js prototype pollution vulnerabilities via object lookup analysis.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

2020
Who Touched My Browser Fingerprint?: A Large-scale Measurement Study and Classification of Fingerprint Dynamics.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

2019
Rendered Private: Making GLSL Execution Uniform to Prevent WebGL-based Browser Fingerprinting.
Proceedings of the 28th USENIX Security Symposium, 2019

2017
(Cross-)Browser Fingerprinting via OS and Hardware Level Features.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Deterministic Browser.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017


  Loading...