ÆÈ·Î¿ì
Hui Xue
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Framework for computer application analysis of sensitive information tracking
OA Ismael, D Song, PT Ha, PJ Gilbert, H Xue
US Patent 9,159,035, 2015
2022015
Framework for efficient security coverage of mobile software applications
OA Ismael, D Song, A Aziz, N Johnson, P Mohan, H Xue
US Patent 9,176,843, 2015
2012015
Digging for Data Structures.
A Cozzie, F Stratton, H Xue, ST King
OSDI 8, 255-266, 2008
1862008
Framework for efficient security coverage of mobile software applications using symbolic execution to reach regions of interest within an application
OA Ismael, D Song, H Xue
US Patent 9,367,681, 2016
1622016
Framework for efficient security coverage of mobile software applications using machine learning
OA Ismael, D Song, PT Ha, PJ Gilbert, H Xue
US Patent 9,594,905, 2017
1372017
Framework for efficient security coverage of mobile software applications
OA Ismael, D Song, A Aziz, N Johnson, P Mohan, H Xue
US Patent 10,296,437, 2019
1232019
Towards discovering and understanding task hijacking in android
C Ren, Y Zhang, H Xue, T Wei, P Liu
24th {USENIX} Security Symposium ({USENIX} Security 15), 945-959, 2015
1172015
Verifying security invariants in ExpressOS
H Mai, E Pek, H Xue, ST King, P Madhusudan
Proceedings of the eighteenth international conference on Architectural ¡¦, 2013
632013
Fingerprints on mobile devices: Abusing and leaking
Y Zhang, Z Chen, H Xue, T Wei
Black Hat Conference, 2015
542015
Using replicated execution for a more secure and reliable web browser
H Xue, N Dautenhahn, ST King
Proc. of the 19th Network and Distributed System Security Symposium (NDSS¡¯12), 2012
222012
Enpublic apps: Security threats using ios enterprise and developer certificates
M Zheng, H Xue, Y Zhang, T Wei, JCS Lui
Proceedings of the 10th ACM Symposium on Information, Computer and ¡¦, 2015
172015
Sidewinder Targeted Attack against Android in The Golden Age of Ad Libraries
T Wei, Y Zhang, H Xue, M Zheng, C Ren, D Song
132014
Using redundancy to improve security and testing
H Xue
University of Illinois at Urbana-Champaign, 2013
102013
Accurate and efficient exploit capture and classification.
Y Ding, T Wei, H Xue, Y Zhang, C Zhang, X Han
Sci. China Inf. Sci. 60 (5), 052110:1-052110:17, 2017
92017
User interface for displaying network analytics
PG Murray, S Shan, Z Wu, Y Xie, H Xue, F Yu
US Patent App. 15/459,664, 2017
82017
Masque Attack: All Your iOS Apps Belong to Us
H Xue, T Wei, Y Zhang
FireEye Blog, 2014
62014
Apple without a shell–iOS under targeted attack
T Wei, M Zheng, H Xue, D Song
Virus Bulletin Conference, 2014
62014
A method for information protection in collaborative assembly design
H Xue, J Li
Ninth International Conference on Computer Aided Design and Computer ¡¦, 2005
52005
Monitoring Vulnaggressive Apps on Google Play
Y Zhang, H Xue, T Wei, D Song
FireEye Blog, 2013
42013
iOS Masque Attack Revived: Bypassing Prompt for Trust and App URL Scheme Hijacking
H Xue, T Wei, Y Zhang, S Jin, C Zhaofeng
FireEye Blog, 2015
2*2015
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20