Yuhong Nan
Orcid: 0000-0001-9597-9888
According to our database1,
Yuhong Nan
authored at least 30 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Understanding Privacy Risks of Intelligent Connected Vehicles Through Their Companion Mobile Apps.
IEEE Internet Things J., October, 2024
SmartAxe: Detecting Cross-Chain Vulnerabilities in Bridge Smart Contracts via Fine-Grained Static Analysis.
Proc. ACM Softw. Eng., 2024
CoRR, 2024
CONNECTOR: Enhancing the Traceability of Decentralized Bridge Applications via Automatic Cross-chain Transaction Association.
CoRR, 2024
MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning.
Proceedings of the 33rd USENIX Security Symposium, 2024
Navigating the Privacy Compliance Maze: Understanding Risks with Privacy-Configurable Mobile SDKs.
Proceedings of the 33rd USENIX Security Symposium, 2024
Leaking the Privacy of Groups and More: Understanding Privacy Risks of Cross-App Content Sharing in Mobile Ecosystem.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Midas: Mining Profitable Exploits in On-Chain Smart Contracts via Feedback-Driven Fuzzing and Differential Analysis.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
PrettySmart: Detecting Permission Re-delegation Vulnerability for Token Behaviors in Smart Contracts.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
2023
Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps.
Proceedings of the 32nd USENIX Security Symposium, 2023
AIRTAG: Towards Automated Attack Investigation by Unsupervised Learning with Log Texts.
Proceedings of the 32nd USENIX Security Symposium, 2023
Understanding Dark UI Patterns in the Mobile Ecosystem: A Case Study of Apps in China.
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 2023
SmartCoCo: Checking Comment-Code Inconsistency in Smart Contracts via Constraint Propagation and Binding.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Detecting State Inconsistency Bugs in DApps via On-Chain Transaction Replay and Fuzzing.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
SmartState: Detecting State-Reverting Vulnerabilities in Smart Contracts via Fine-Grained State-Dependency Analysis.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
DARPA: Combating Asymmetric Dark UI Patterns on Android with Run-time View Decorator.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the International Conference on Service Science, 2022
Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
SmartDagger: a bytecode-based static analysis approach for detecting cross-contract vulnerability.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
SIMulation: Demystifying (Insecure) Cellular Network based One-Tap Authentication Services.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
2020
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
2018
Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
2015
Proceedings of the 24th USENIX Security Symposium, 2015