Yuanyuan Zhang
Yuanyuan Zhang
Verified email at
Cited by
Cited by
From collision to exploitation: Unleashing use-after-free vulnerabilities in linux kernel
W Xu, J Li, J Shu, W Yang, T Xie, Y Zhang, D Gu
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Appspear: Bytecode decrypting and dex reassembling for packed android malware
W Yang, Y Zhang, J Li, J Shu, B Li, W Hu, D Gu
International Workshop on Recent Advances in Intrusion Detection, 359-381, 2015
Binary code clone detection across architectures and compiling configurations
Y Hu, Y Zhang, J Li, D Gu
Proceedings of the 25th International Conference on Program Comprehension, 88-98, 2017
Vulnerability assessment of oauth implementations in android applications
H Wang, Y Zhang, J Li, H Liu, W Yang, B Li, D Gu
Proceedings of the 31st Annual Computer Security Applications Conference, 61-70, 2015
icryptotracer: Dynamic analysis on misuse of cryptography functions in ios applications
Y Li, Y Zhang, J Li, D Gu
International Conference on Network and System Security, 349-362, 2014
Cross-Architecture Binary Semantics Understanding via Similar Code Comparison
Y Hu, Y Zhang, J Li, D Gu
Software Analysis, Evolution, and Reengineering (SANER), 2016 IEEE 23rd …, 2016
Show Me the Money! Finding Flawed Implementations of Third-party In-app Payment in Android Apps
W Yang, Y Zhang, J Li, H Liu, Q Wang, Y Zhang, D Gu
APKLancet: tumor payload diagnosis and purification for android applications
W Yang, J Li, Y Zhang, Y Li, J Shu, D Gu
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
Smart solution, poor protection: An empirical study of security and privacy issues in developing and deploying smart home devices
H Liu, C Li, X Jin, J Li, Y Zhang, D Gu
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy …, 2017
SGOR: Secure and scalable geographic opportunistic routing with received signal strength in WSNs
C Lyu, D Gu, X Zhang, S Sun, Y Zhang, A Pande
Computer Communications 59, 37-51, 2015
The Achilles heel of OAuth: a multi-platform study of OAuth-based authentication
H Wang, Y Zhang, J Li, D Gu
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
Towards efficient, secure, and fine-grained access control system in msns with flexible revocations
SF Sun, C Lyu, D Gu, Y Zhang, Y Ren
International Journal of Distributed Sensor Networks, 2015
AppSpear: Automating the hidden-code extraction and reassembling of packed android malware
B Li, Y Zhang, J Li, W Yang, D Gu
Journal of Systems and Software 140, 3-16, 2018
Why data deletion fails? A study on deletion flaws and data remanence in Android systems
J Shu, Y Zhang, J Li, B Li, D Gu
ACM Transactions on Embedded Computing Systems (TECS) 16 (2), 61, 2017
Android app protection via interpretation obfuscation
J Shu, J Li, Y Zhang, D Gu
Dependable, Autonomic and Secure Computing (DASC), 2014 IEEE 12th …, 2014
Embroidery: Patching Vulnerable Binary Code of Fragmentized Android Devices
X Zhang, Y Zhang, J Li, Y Hu, H Li, D Gu
Software Maintenance and Evolution (ICSME), 2017 IEEE International …, 2017
Passwords in the Air: Harvesting Wi-Fi Credentials from SmartCfg Provisioning
C Li, Q Cai, J Li, H Liu, Y Zhang, D Gu, Y Yu
Security analysis of vendor customized code in firmware of embedded device
M Liu, Y Zhang, J Li, J Shu, D Gu
International Conference on Security and Privacy in Communication Systems …, 2016
Oh-Pwn-VPN! Security Analysis of OpenVPN-based Android Apps⋆
Q Zhang, J Li, Y Zhang, H Wang, D Gu
the 16th International Conference on Cryptology And Network Security (CANS 2017), 2017
Selective Forwarding Attacks against Data and ACK Flows in Network Coding and Countermeasures
Y Zhang, M Minier
Journal of Computer Networks and Communications 2012, 2012
The system can't perform the operation now. Try again later.
Articles 1–20