Publications
Seeing is Not Always Believing: An Empirical Analysis of Fake Evidence Generators pdf
Z. Hu, J. Ye, Y. Zhang, X. Wang
EuroS&P, 2024.Navigating the Privacy Compliance Maze: Understanding Risks with Privacy-Configurable Mobile SDKs pdf
Y. Zhang*, Z. Hu*, X. Wang, Y. Hong, Y. Nan, X. Wang, J. Cheng, L. Xing
(* co-first author) USENIX Security, 2024.WitheredLeaf: Finding Entity-Inconsistency Bugs with LLMs pdf
H. Chen, Y. Zhang*, X. Han, H. Rong, Y. Zhang, T. Mao, H. Zhang, X Wang, L. Xing, X. Chen
(* co-first author) arxiv, 2024.Union under Duress: Understanding Hazards of Duplicate Resource Mismediation in Android Software Supply Chain pdf
Y. Zhang, X. Wang, X. Wang, Y. Jia, L. Xing
(* co-first author) USENIX Security, 2023.Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps pdf
Y. Nan, X. Wang, L. Xing, X. Liao, R. Wu, J. Wu, Y. Zhang, X. Wang
USENIX Security, 2023.Who’s In Control? On Security Risks of Disjointed IoT Device Management Channels pdf
Y. Jia, B. Yan, L. Xing, D. Zhao, X. Wang, Y. Zhang, Y. Liu, K. Zheng, Y. Zhang, D. Zou, H. Jin
ACM Conference on Computer and Communications Security (CCS), 2021.Demystifying resource management risks in emerging mobile app-in-app ecosystems pdf
H. Lu, L. Xing, Y. Xiao, Y. Zhang, X. Liao, X. Wang, X. Wang
ACM Conference on Computer and Communications Security (CCS), 2020.