Acing the ioc game: Toward automatic discovery and analysis of open-source cyber threat intelligence X Liao, K Yuan, XF Wang, Z Li, L Xing, R Beyah Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 379 | 2016 |
Systems and methods for detection of infected websites X Wang, K Yuan, X Liao, RA Beyah US Patent 10,880,330, 2020 | 183 | 2020 |
Semfuzz: Semantics-based automatic generation of proof-of-concept exploits W You, P Zong, K Chen, XF Wang, X Liao, P Bian, B Liang Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017 | 152 | 2017 |
Resident evil: Understanding residential ip proxy as a dark service X Mi, X Feng, X Liao, B Liu, XF Wang, F Qian, Z Li, S Alrwais, L Sun, Y Liu 2019 IEEE symposium on security and privacy (SP), 1185-1201, 2019 | 100 | 2019 |
Evil under the sun: Understanding and discovering attacks on ethereum decentralized applications L Su, X Shen, X Du, X Liao, XF Wang, L Xing, B Liu 30th USENIX Security Symposium (USENIX Security 21), 1307-1324, 2021 | 70 | 2021 |
Stealthy porn: Understanding real-world adversarial images for illicit online promotion K Yuan, D Tang, X Liao, XF Wang, X Feng, Y Chen, M Sun, H Lu, K Zhang 2019 IEEE Symposium on Security and Privacy (SP), 952-966, 2019 | 67 | 2019 |
Reading Thieves' cant: automatically identifying and understanding dark jargons from cybercrime marketplaces K Yuan, H Lu, X Liao, XF Wang 27th USENIX Security Symposium (USENIX Security 18), 1027-1041, 2018 | 66 | 2018 |
Under the shadow of sunshine: Understanding and detecting bulletproof hosting on legitimate service provider networks S Alrwais, X Liao, X Mi, P Wang, XF Wang, F Qian, R Beyah, D McCoy 2017 IEEE Symposium on Security and Privacy (SP), 805-823, 2017 | 64 | 2017 |
Understanding and securing device vulnerabilities through automated bug report analysis X Feng, X Liao, X Wang, H Wang, Q Li, K Yang, H Zhu, L Sun SEC'19: Proceedings of the 28th USENIX Conference on Security Symposium, 2019 | 62 | 2019 |
Demystifying resource management risks in emerging mobile app-in-app ecosystems H Lu, L Xing, Y Xiao, Y Zhang, X Liao, XF Wang, X Wang Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020 | 53 | 2020 |
Cracking wall of confinement: Understanding and analyzing malicious domain takedowns E Alowaisheq The Network and Distributed System Security Symposium (NDSS), 2019 | 51 | 2019 |
Seeking nonsense, looking for trouble: Efficient promotional-infection detection through semantic inconsistency search X Liao, K Yuan, XF Wang, Z Pei, H Yang, J Chen, H Duan, K Du, ... 2016 IEEE Symposium on Security and Privacy (SP), 707-723, 2016 | 50 | 2016 |
Cracking app isolation on apple: Unauthorized cross-app resource access on MAC os~ x and ios L Xing, X Bai, T Li, XF Wang, K Chen, X Liao, SM Hu, X Han Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 49 | 2015 |
Staying secure and unprepared: Understanding and mitigating the security risks of apple zeroconf X Bai, L Xing, N Zhang, XF Wang, X Liao, T Li, SM Hu 2016 IEEE Symposium on Security and Privacy (SP), 655-674, 2016 | 47 | 2016 |
Devils in the guidance: predicting logic vulnerabilities in payment syndication services through automated documentation analysis Y Chen, L Xing, Y Qin, X Liao, XF Wang, K Chen, W Zou 28th USENIX Security Symposium (USENIX Security 19), 747-764, 2019 | 44 | 2019 |
Characterizing long-tail SEO spam on cloud web hosting services X Liao, C Liu, D McCoy, E Shi, S Hao, R Beyah Proceedings of the 25th International Conference on World Wide Web, 321-332, 2016 | 44 | 2016 |
Lalaine: Measuring and Characterizing {Non-Compliance} of Apple Privacy Labels Y Xiao, Z Li, Y Qin, X Bai, J Guan, X Liao, L Xing 32nd USENIX Security Symposium (USENIX Security 23), 1091-1108, 2023 | 41* | 2023 |
Understanding malicious cross-library data harvesting on android J Wang, Y Xiao, X Wang, Y Nan, L Xing, X Liao, JW Dong, N Serrano, ... 30th USENIX Security Symposium (USENIX Security 21), 4133-4150, 2021 | 41 | 2021 |
Privacy-preserving and secure top-k query in two-tier wireless sensor network X Liao, J Li 2012 IEEE Global Communications Conference (GLOBECOM), 335-341, 2012 | 41 | 2012 |
Learning security classifiers with verified global robustness properties Y Chen, S Wang, Y Qin, X Liao, S Jana, D Wagner Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 37 | 2021 |