Follow
Xiaojing Liao
Xiaojing Liao
Verified email at indiana.edu
Title
Cited by
Cited by
Year
Acing the ioc game: Toward automatic discovery and analysis of open-source cyber threat intelligence
X Liao, K Yuan, XF Wang, Z Li, L Xing, R Beyah
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
3792016
Systems and methods for detection of infected websites
X Wang, K Yuan, X Liao, RA Beyah
US Patent 10,880,330, 2020
1832020
Semfuzz: Semantics-based automatic generation of proof-of-concept exploits
W You, P Zong, K Chen, XF Wang, X Liao, P Bian, B Liang
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
1522017
Resident evil: Understanding residential ip proxy as a dark service
X Mi, X Feng, X Liao, B Liu, XF Wang, F Qian, Z Li, S Alrwais, L Sun, Y Liu
2019 IEEE symposium on security and privacy (SP), 1185-1201, 2019
1002019
Evil under the sun: Understanding and discovering attacks on ethereum decentralized applications
L Su, X Shen, X Du, X Liao, XF Wang, L Xing, B Liu
30th USENIX Security Symposium (USENIX Security 21), 1307-1324, 2021
702021
Stealthy porn: Understanding real-world adversarial images for illicit online promotion
K Yuan, D Tang, X Liao, XF Wang, X Feng, Y Chen, M Sun, H Lu, K Zhang
2019 IEEE Symposium on Security and Privacy (SP), 952-966, 2019
672019
Reading Thieves' cant: automatically identifying and understanding dark jargons from cybercrime marketplaces
K Yuan, H Lu, X Liao, XF Wang
27th USENIX Security Symposium (USENIX Security 18), 1027-1041, 2018
662018
Under the shadow of sunshine: Understanding and detecting bulletproof hosting on legitimate service provider networks
S Alrwais, X Liao, X Mi, P Wang, XF Wang, F Qian, R Beyah, D McCoy
2017 IEEE Symposium on Security and Privacy (SP), 805-823, 2017
642017
Understanding and securing device vulnerabilities through automated bug report analysis
X Feng, X Liao, X Wang, H Wang, Q Li, K Yang, H Zhu, L Sun
SEC'19: Proceedings of the 28th USENIX Conference on Security Symposium, 2019
622019
Demystifying resource management risks in emerging mobile app-in-app ecosystems
H Lu, L Xing, Y Xiao, Y Zhang, X Liao, XF Wang, X Wang
Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020
532020
Cracking wall of confinement: Understanding and analyzing malicious domain takedowns
E Alowaisheq
The Network and Distributed System Security Symposium (NDSS), 2019
512019
Seeking nonsense, looking for trouble: Efficient promotional-infection detection through semantic inconsistency search
X Liao, K Yuan, XF Wang, Z Pei, H Yang, J Chen, H Duan, K Du, ...
2016 IEEE Symposium on Security and Privacy (SP), 707-723, 2016
502016
Cracking app isolation on apple: Unauthorized cross-app resource access on MAC os~ x and ios
L Xing, X Bai, T Li, XF Wang, K Chen, X Liao, SM Hu, X Han
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
492015
Staying secure and unprepared: Understanding and mitigating the security risks of apple zeroconf
X Bai, L Xing, N Zhang, XF Wang, X Liao, T Li, SM Hu
2016 IEEE Symposium on Security and Privacy (SP), 655-674, 2016
472016
Devils in the guidance: predicting logic vulnerabilities in payment syndication services through automated documentation analysis
Y Chen, L Xing, Y Qin, X Liao, XF Wang, K Chen, W Zou
28th USENIX Security Symposium (USENIX Security 19), 747-764, 2019
442019
Characterizing long-tail SEO spam on cloud web hosting services
X Liao, C Liu, D McCoy, E Shi, S Hao, R Beyah
Proceedings of the 25th International Conference on World Wide Web, 321-332, 2016
442016
Lalaine: Measuring and Characterizing {Non-Compliance} of Apple Privacy Labels
Y Xiao, Z Li, Y Qin, X Bai, J Guan, X Liao, L Xing
32nd USENIX Security Symposium (USENIX Security 23), 1091-1108, 2023
41*2023
Understanding malicious cross-library data harvesting on android
J Wang, Y Xiao, X Wang, Y Nan, L Xing, X Liao, JW Dong, N Serrano, ...
30th USENIX Security Symposium (USENIX Security 21), 4133-4150, 2021
412021
Privacy-preserving and secure top-k query in two-tier wireless sensor network
X Liao, J Li
2012 IEEE Global Communications Conference (GLOBECOM), 335-341, 2012
412012
Learning security classifiers with verified global robustness properties
Y Chen, S Wang, Y Qin, X Liao, S Jana, D Wagner
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
372021
The system can't perform the operation now. Try again later.
Articles 1–20