IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing. J Chen, W Diao, Q Zhao, C Zuo, Z Lin, XF Wang, WC Lau, M Sun, R Yang, ... NDSS, 2018 | 393 | 2018 |
Why does your data leak? uncovering the data leakage in cloud from mobile apps C Zuo, Z Lin, Y Zhang 2019 IEEE Symposium on Security and Privacy (SP), 1296-1310, 2019 | 117 | 2019 |
Automatic fingerprinting of vulnerable ble iot devices with static uuids from mobile apps C Zuo, H Wen, Z Lin, Y Zhang Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 85 | 2019 |
Authscope: Towards automatic discovery of vulnerable authorizations in online services C Zuo, Q Zhao, Z Lin Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 62 | 2017 |
Automatic Forgery of Cryptographically Consistent Messages to Identify Security Vulnerabilities in Mobile Services. C Zuo, W Wang, Z Lin, R Wang NDSS, 2016 | 51 | 2016 |
Smartgen: Exposing server urls of mobile apps with selective symbolic execution C Zuo, Z Lin Proceedings of the 26th International Conference on World Wide Web, 867-876, 2017 | 50 | 2017 |
Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services. Q Zhao, C Zuo, G Pellegrino, L Zhiqiang Annual Network and Distributed System Security symposium, February 2019 …, 2019 | 44 | 2019 |
{FIRMSCOPE}: Automatic uncovering of {Privilege-Escalation} vulnerabilities in {Pre-Installed} apps in android firmware M Elsabagh, R Johnson, A Stavrou, C Zuo, Q Zhao, Z Lin 29th USENIX security symposium (USENIX Security 20), 2379-2396, 2020 | 40 | 2020 |
Automatic uncovering of hidden behaviors from input validation in mobile apps Q Zhao, C Zuo, B Dolan-Gavitt, G Pellegrino, Z Lin 2020 IEEE Symposium on Security and Privacy (SP), 1106-1120, 2020 | 36 | 2020 |
Your iots are (not) mine: On the remote binding between iot devices and users J Chen, C Zuo, W Diao, S Dong, Q Zhao, M Sun, Z Lin, Y Zhang, K Zhang 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019 | 36 | 2019 |
The betrayal at cloud city: An empirical analysis of {Cloud-Based} mobile backends O Alrawi, C Zuo, R Duan, RP Kasturi, Z Lin, B Saltaformaggio 28th USENIX Security Symposium (USENIX Security 19), 551-566, 2019 | 32 | 2019 |
Automatically detecting ssl error-handling vulnerabilities in hybrid mobile web apps C Zuo, J Wu, S Guo Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015 | 30 | 2015 |
A measurement study of wechat mini-apps Y Zhang, B Turkistani, AY Yang, C Zuo, Z Lin Proceedings of the ACM on Measurement and Analysis of Computing Systems 5 (2 …, 2021 | 28 | 2021 |
An empirical study of potentially malicious third-party libraries in android apps Z Zhang, W Diao, C Hu, S Guo, C Zuo, L Li Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020 | 25 | 2020 |
Acoustic-turf: Acoustic-based privacy-preserving COVID-19 contact tracing Y Luo, C Zhang, Y Zhang, C Zuo, D Xuan, Z Lin, AC Champion, N Shroff arXiv preprint arXiv:2006.13362, 2020 | 12 | 2020 |
An automatically vetting mechanism for SSL error-handling vulnerability in android hybrid Web apps Y Liu, C Zuo, Z Zhang, S Guo, X Xu World Wide Web 21, 127-150, 2018 | 12 | 2018 |
Ui ripping in android: Reverse engineering of graphical user interfaces and its application Y Cuixia, Z Chaoshun, G Shanqing, H Chengyu, C Lizhen 2015 IEEE Conference on Collaboration and Internet Computing (CIC), 160-167, 2015 | 10 | 2015 |
Uncovering user interactions on smartphones via contactless wireless charging side channels T Ni, X Zhang, C Zuo, J Li, Z Yan, W Wang, W Xu, X Luo, Q Zhao 2023 IEEE Symposium on Security and Privacy (SP), 3399-3415, 2023 | 7 | 2023 |
Playing without paying: Detecting vulnerable payment verification in native binaries of unity mobile games C Zuo, Z Lin 31st USENIX Security Symposium (USENIX Security 22), 3093-3110, 2022 | 6 | 2022 |
Detecting and Measuring Misconfigured Manifests in Android Apps Y Yang, M Elsabagh, C Zuo, R Johnson, A Stavrou, Z Lin Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 5 | 2022 |