Yuhong Nan
Yuhong Nan
Verified email at - Homepage
Cited by
Cited by
UIPicker: User-Input Privacy Identification in Mobile Applications
Y Nan, M Yang, Z Yang, S Zhou, G Gu, XF Wang
24th USENIX Security Symposium (USENIX Security 15), 993--1008, 2015
ATLAS: A Sequence-based Learning Approach for Attack Investigation
A Alsaheel, Y Nan, S Ma, L Yu, G Walkup, ZB Celik, X Zhang, D Xu
30th USENIX Security Symposium (USENIX Security 21), 2021
How you get shot in the back: A systematical study about cryptojacking in the real world
G Hong, Z Yang, S Yang, L Zhang, Y Nan, Z Zhang, M Yang, Y Zhang, ...
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Finding clues for your secrets: semantics-driven, learning-based privacy discovery in mobile apps.
Y Nan, Z Yang, X Wang, Y Zhang, D Zhu, M Yang
NDSS, 2018
BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy
J Wu, Y Nan, V Kumar, DJ Tian, A Bianchi, M Payer, D Xu
Proceedings of the USENIX Workshop on Offensive Technologies (WOOT), 2020
BlueShield: Detecting spoofing attacks in bluetooth low energy networks
J Wu, Y Nan, V Kumar, M Payer, D Xu
23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020
Understanding malicious cross-library data harvesting on android
J Wang, Y Xiao, X Wang, Y Nan, L Xing, X Liao, JW Dong, N Serrano, ...
30th USENIX Security Symposium (USENIX Security 21), 4133-4150, 2021
Identifying user-input privacy in mobile applications at a large scale
Y Nan, Z Yang, M Yang, S Zhou, Y Zhang, G Gu, X Wang, L Sun
IEEE Transactions on Information Forensics and Security 12 (3), 647-661, 2016
SmartDagger: a bytecode-based static analysis approach for detecting cross-contract vulnerability
Z Liao, Z Zheng, X Chen, Y Nan
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022
On the insecurity of SMS one-time password messages against local attackers in modern mobile devices
Z Lei, Y Nan, Y Fratantonio, A Bianchi
Network and Distributed Systems Security (NDSS) Symposium 2021, 2021
Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps
Y Nan, X Wang, L Xing, X Liao, R Wu, J Wu, Y Zhang, XF Wang
32st USENIX Security Symposium (USENIX Security 23), 2023
Smartstate: Detecting state-reverting vulnerabilities in smart contracts via fine-grained state-dependency analysis
Z Liao, S Hao, Y Nan, Z Zheng
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
AIRTAG: Towards Automated Attack Investigation by Unsupervised Learning with Log Texts
H Ding, J Zhai, Y Nan, S Ma
32nd USENIX Security Symposium (USENIX Security 23), 373-390, 2023
Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems
M Zha, J Wang, Y Nan, XF Wang, Y Zhang, W Jing
Network and Distributed Systems Security (NDSS) Symposium., 2022
ProFactory: Improving IoT Security via Formalized Protocol Customization
F Wang, J Wu, Y Nan, Y Aafer, X Zhang, D Xu, M Payer
31st USENIX Security Symposium (USENIX Security 22), 3879-3896, 2022
Simulation: demystifying (insecure) cellular network based one-tap authentication services
Z Zhou, X Han, Z Chen, Y Nan, J Li, D Gu
2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems …, 2022
Detecting state inconsistency bugs in dapps via on-chain transaction replay and fuzzing
M Ye, Y Nan, Z Zheng, D Wu, H Li
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning
Z Jia, Y Xiong, Y Nan, Y Zhang, J Zhao, M Wen
arXiv preprint arXiv:2310.09831, 2023
FunFuzz: A Function-oriented Fuzzer for Smart Contract Vulnerability Detection with High Effectiveness and Efficiency
M Ye, Y Nan, HN Dai, S Yang, X Luo, Z Zheng
ACM Transactions on Software Engineering and Methodology, 2025
SmartAxe: Detecting Cross-Chain Vulnerabilities in Bridge Smart Contracts via Fine-Grained Static Analysis
Z Liao, Y Nan, H Liang, S Hao, J Zhai, J Wu, Z Zheng
arXiv preprint arXiv:2406.15999, 2024
The system can't perform the operation now. Try again later.
Articles 1–20