Follow
Qingchuan Zhao
Title
Cited by
Cited by
Year
IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.
J Chen, W Diao, Q Zhao, C Zuo, Z Lin, XF Wang, WC Lau, M Sun, R Yang, ...
NDSS, 2018
3782018
PT-CFI: Transparent backward-edge control flow violation detection using intel processor trace
Y Gu, Q Zhao, Y Zhang, Z Lin
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
922017
A study of the privacy of covid-19 contact tracing apps
H Wen, Q Zhao, Z Lin, D Xuan, N Shroff
Security and Privacy in Communication Networks: 16th EAI International …, 2020
872020
Authscope: Towards automatic discovery of vulnerable authorizations in online services
C Zuo, Q Zhao, Z Lin
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
622017
On the accuracy of measured proximity of bluetooth-based contact tracing apps
Q Zhao, H Wen, Z Lin, D Xuan, N Shroff
Security and Privacy in Communication Networks: 16th EAI International …, 2020
532020
Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services.
Q Zhao, C Zuo, G Pellegrino, L Zhiqiang
Annual Network and Distributed System Security symposium, February 2019 …, 2019
442019
{FIRMSCOPE}: Automatic uncovering of {Privilege-Escalation} vulnerabilities in {Pre-Installed} apps in android firmware
M Elsabagh, R Johnson, A Stavrou, C Zuo, Q Zhao, Z Lin
29th USENIX security symposium (USENIX Security 20), 2379-2396, 2020
392020
Automatic uncovering of hidden behaviors from input validation in mobile apps
Q Zhao, C Zuo, B Dolan-Gavitt, G Pellegrino, Z Lin
2020 IEEE Symposium on Security and Privacy (SP), 1106-1120, 2020
352020
Your iots are (not) mine: On the remote binding between iot devices and users
J Chen, C Zuo, W Diao, S Dong, Q Zhao, M Sun, Z Lin, Y Zhang, K Zhang
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019
342019
Automated cross-platform reverse engineering of CAN bus commands from mobile apps
H Wen, Q Zhao, QA Chen, Z Lin
Proceedings 2020 Network and Distributed System Security Symposium (NDSS'20), 2020
262020
Uncovering user interactions on smartphones via contactless wireless charging side channels
T Ni, X Zhang, C Zuo, J Li, Z Yan, W Wang, W Xu, X Luo, Q Zhao
2023 IEEE Symposium on Security and Privacy (SP), 3399-3415, 2023
62023
Eavesdropping Mobile App Activity via {Radio-Frequency} Energy Harvesting
T Ni, G Lan, J Wang, Q Zhao, W Xu
32nd USENIX Security Symposium (USENIX Security 23), 3511-3528, 2023
6*2023
No-fuzz: Efficient anti-fuzzing techniques
Z Zhou, C Wang, Q Zhao
International Conference on Security and Privacy in Communication Systems …, 2022
42022
Periscope: Comprehensive vulnerability analysis of mobile app-defined bluetooth peripherals
Q Zhao, C Zuo, J Blasco, Z Lin
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
42022
Exploiting Contactless Side Channels in Wireless Charging Power Banks for User Privacy Inference via Few-shot Learning
T Ni, J Li, X Zhang, C Zuo, W Wang, W Xu, X Luo, Q Zhao
Proceedings of the 29th Annual International Conference on Mobile Computing …, 2023
32023
Detecting and measuring aggressive location harvesting in mobile apps via data-flow path embedding
H Lu, Q Zhao, Y Chen, X Liao, Z Lin
Proceedings of the ACM on Measurement and Analysis of Computing Systems 7 (1 …, 2023
32023
XPorter: A Study of the Multi-Port Charger Security on Privacy Leakage and Voice Injection
T Ni, Y Chen, W Xu, L Xue, Q Zhao
Proceedings of the 29th Annual International Conference on Mobile Computing …, 2023
12023
Products Competitive Relationships Mining
J Li, T Wang, S Hu, Q Zhao, H Min
Advances in Conceptual Modeling: ER 2013 Workshops, LSAWM, MoBiD, RIGiM …, 2014
12014
DEMISTIFY: Identifying On-device Machine Learning Models Stealing and Reuse Vulnerabilities in Mobile Apps
P Ren, C Zuo, X Liu, W Diao, Q Zhao, S Guo
Proceedings of the 46th IEEE/ACM International Conference on Software …, 2024
2024
Attention! Your Copied Data is Under Monitoring: A Systematic Study of Clipboard Usage in Android Apps
Y Chen, R Tang, C Zuo, X Zhang, L Xue, X Luo, Q Zhao
Proceedings of the 46th IEEE/ACM International Conference on Software …, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20