ÆÈ·Î¿ì
CHENXIONG QIAN
CHENXIONG QIAN
cs.hku.hkÀÇ À̸ÞÀÏ È®ÀÎµÊ - ȨÆäÀÌÁö
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Towards a scalable resource-driven approach for detecting repackaged android applications
Y Shao, X Luo, C Qian, P Zhu, L Zhang
Proceedings of the 30th Annual Computer Security Applications Conference, 56-65, 2014
1382014
Cloak and dagger: from two permissions to complete control of the UI feedback loop
Y Fratantonio, C Qian, SP Chung, W Lee
2017 IEEE Symposium on Security and Privacy (SP), 1041-1057, 2017
1352017
Enforcing unique code target property for control-flow integrity
H Hu, C Qian, C Yagemann, SPH Chung, WR Harris, T Kim, W Lee
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications ¡¦, 2018
1062018
Efficient Protection of Path-Sensitive Control Security.
R Ding, C Qian, C Song, W Harris, T Kim, W Lee
USENIX Security Symposium, 131-148, 2017
1062017
On tracking information flows through jni in android applications
C Qian, X Luo, Y Shao, ATS Chan
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems ¡¦, 2014
1062014
Toward engineering a secure android ecosystem: A survey of existing techniques
M Xu, C Song, Y Ji, MW Shih, K Lu, C Zheng, R Duan, Y Jang, B Lee, ...
ACM Computing Surveys (CSUR) 49 (2), 1-47, 2016
972016
RAZOR: A Framework for Post-deployment Software Debloating.
C Qian, H Hu, M Alharthi, SPH Chung, T Kim, W Lee
USENIX Security Symposium, 1733-1750, 2019
822019
Precise and scalable detection of double-fetch bugs in OS kernels
M Xu, C Qian, K Lu, M Backes, T Kim
2018 IEEE Symposium on Security and Privacy (SP), 661-678, 2018
632018
Rootguard: Protecting rooted android phones
Y Shao, X Luo, C Qian
Computer 47 (6), 32-40, 2014
562014
Enhancing the description-to-behavior fidelity in android apps with privacy policy
L Yu, X Luo, C Qian, S Wang, HKN Leung
IEEE Transactions on Software Engineering 44 (9), 834-854, 2017
482017
Vulhunter: toward discovering vulnerabilities in android applications
C Qian, X Luo, Y Le, G Gu
IEEE Micro 35 (1), 44-53, 2015
472015
NDroid: Toward tracking information flows across multiple Android contexts
L Xue, C Qian, H Zhou, X Luo, Y Zhou, Y Shao, ATS Chan
IEEE Transactions on Information Forensics and Security 14 (3), 814-828, 2018
432018
Revisiting the description-to-behavior fidelity in android applications
L Yu, X Luo, C Qian, S Wang
2016 IEEE 23rd International Conference on Software Analysis, Evolution, and ¡¦, 2016
362016
Rampart: Protecting web applications from CPU-exhaustion denial-of-service attacks
W Meng, C Qian, S Hao, K Borgolte, G Vigna, C Kruegel, W Lee
27th {USENIX} Security Symposium ({USENIX} Security 18), 393-410, 2018
302018
Androidperf: A cross-layer profiling system for android applications
L Xue, C Qian, X Luo
2015 IEEE 23rd International Symposium on Quality of Service (IWQoS), 115-124, 2015
182015
Slimium: debloating the chromium browser with feature subsetting
C Qian, H Koo, CS Oh, T Kim, W Lee
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications ¡¦, 2020
172020
On measuring one-way path metrics from a web server
X Luo, L Xue, C Shi, Y Shao, C Qian, EWW Chan
2014 IEEE 22nd International Conference on Network Protocols, 203-208, 2014
72014
REDUCING SOFTWARE¡¯S ATTACK SURFACE WITH CODE DEBLOATING
C Qian
Georgia Institute of Technology, 2021
22021
DeView: Confining Progressive Web Applications by Debloating Web APIs
CS Oh, S Lee, C Qian, H Koo, W Lee
Proceedings of the 38th Annual Computer Security Applications Conference ¡¦, 2022
2022
Cloak and Dagger: From
Y Fratantonio, C Qian, SP Chung, W Lee
2017
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20