Xinhui Han
Orcid: 0000-0003-4481-1641
According to our database1,
Xinhui Han
authored at least 33 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 100th IEEE Vehicular Technology Conference, 2024
Proceedings of the 99th IEEE Vehicular Technology Conference, 2024
2023
DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023
2022
Poster: TaintGrep: A Static Analysis Tool for Detecting Vulnerabilities of Android Apps Supporting User-defined Rules.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Poster: MSILDiffer - A Security Patch Analysis Framework Based on Microsoft Intermediate Language for Large Software.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Code is the (F)Law: Demystifying and Mitigating Blockchain Inconsistency Attacks Caused by Software Bugs.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Proceedings of the Cyber Security - 18th China Annual Conference, 2021
2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
MinerGate: A Novel Generic and Accurate Defense Solution Against Web Based Cryptocurrency Mining Attacks.
Proceedings of the Cyber Security - 17th China Annual Conference, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
LPET - Mining MS-Windows Software Privilege Escalation Vulnerabilities by Monitoring Interactive Behavior.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2018
STDC: A SDN-Oriented Two-Stage DDoS Detection and Defence System Based on Clustering.
Proceedings of the 17th IEEE International Conference On Trust, 2018
2017
Sci. China Inf. Sci., 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2015
Comput. Commun., 2015
Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging Integrations.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2012
SmartDroid: an automatic system for revealing UI-based trigger conditions in android applications.
Proceedings of the SPSM'12, 2012
2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
Proceedings of the 5th ACM Symposium on Information, 2010
2009
Proceedings of the Managing Information Risk and the Economics of Security, 2009
2008
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008
2007
Proceedings of the Information and Communications Security, 9th International Conference, 2007