팔로우
Tongxin Li
Tongxin Li
pku.edu.cn의 이메일 확인됨
제목
인용
인용
연도
VTrust: Regaining Trust on Virtual Calls.
C Zhang, SA Carr, T Li, Y Ding, C Song, M Payer, D Song
The Network and Distributed System Security Symposium 2016 (NDSS'16), 2016
952016
Things You May Not Know About Android (Un) Packers: A Systematic Study based on Whole-System Emulation
Y Duan, M Zhang, AV Bhaskar, H Yin, X Pan, T Li, X Wang, XF Wang
The Network and Distributed System Security Symposium 2018 (NDSS'18), 2018
892018
Mayhem in the push clouds: Understanding and mitigating security hazards in mobile push-messaging services
T Li, X Zhou, L Xing, Y Lee, M Naveed, XF Wang, X Han
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
542014
Staying secure and unprepared: Understanding and mitigating the security risks of apple zeroconf
X Bai, L Xing, N Zhang, XF Wang, X Liao, T Li, SM Hu
2016 IEEE Symposium on Security and Privacy (SP), 655-674, 2016
452016
Unleashing the walking dead: Understanding cross-app remote infections on mobile webviews
T Li, X Wang, M Zha, K Chen, XF Wang, L Xing, X Bai, N Zhang, X Han
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
442017
Cracking app isolation on apple: Unauthorized cross-app resource access on MAC os~ x and ios
L Xing, X Bai, T Li, XF Wang, K Chen, X Liao, SM Hu, X Han
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
432015
Detecting telecommunication fraud by understanding the contents of a call
Q Zhao, K Chen, T Li, Y Yang, XF Wang
Cybersecurity 1, 1-12, 2018
342018
Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment
X Bai, Z Zhou, XF Wang, Z Li, X Mi, N Zhang, T Li, SM Hu, K Zhang
26th USENIX Security Symposium (USENIX Security 17), 593-608, 2017
312017
Unauthorized cross-app resource access on mac os x and ios
L Xing, X Bai, T Li, XF Wang, K Chen, X Liao, SM Hu, X Han
arXiv preprint arXiv:1505.06836, 2015
172015
Building and maintaining a third-party library supply chain for productive and secure SGX enclave development
P Wang, Y Ding, M Sun, H Wang, T Li, R Zhou, Z Chen, Y Jing
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
92020
Ghost installer in the shadow: Security analysis of app installation on android
Y Lee, T Li, N Zhang, S Demetriou, M Zha, XF Wang, K Chen, X Zhou, ...
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
92017
Understanding iOS-based Crowdturfing Through Hidden UI Analysis.
Y Lee, X Wang, K Lee, X Liao, XF Wang, T Li, X Mi
USENIX Security Symposium, 765-781, 2019
82019
Perplexed messengers from the cloud: Automated security analysis of push-messaging integrations
Y Chen, T Li, XF Wang, K Chen, X Han
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
82015
Apple ZeroConf holes: How hackers can steal iPhone photos
X Bai, L Xing, N Zhang, XF Wang, X Liao, T Li, SM Hu
IEEE Security & Privacy 15 (2), 42-49, 2017
72017
POSTER: AdHoneyDroid--Capture Malicious Android Advertisements
D Wang, S Dai, Y Ding, T Li, X Han
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
52014
Poster: gbdt-rs: Fast and trustworthy gradient boosting decision tree
T Li, T Li, Y Ding, Y Zhang, T Wei, X Han
Posters In 2019 IEEE Symposium on Security and Privacy (SP), 2019
32019
Filtering for malice through the data ocean: Large-scale PHA install detection at the communication service provider level
K Chen, T Li, B Ma, P Wang, XF Wang, P Zong
Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017
32017
Towards Memory Safe Python Enclave for Security Sensitive Computation
H Wang, M Sun, Q Feng, P Wang, T Li, Y Ding
arXiv preprint arXiv:2005.05996, 2020
22020
Minergate: A novel generic and accurate defense solution against web based cryptocurrency mining attacks
G Yu, G Yang, T Li, X Han, S Guan, J Zhang, G Gu
Cyber Security: 17th China Annual Conference, CNCERT 2020, Beijing, China …, 2020
12020
POSTER: PT-DBG: Bypass Anti-debugging with Intel Processor Tracing
G Li, Y Chen, T Li, T Li, X Wu, C Zhang, X Han
Proceedings of the 39th IEEE Symposium on Security and Privacy, San …, 2018
12018
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20