Follow
Guangliang Yang
Guangliang Yang
Verified email at fudan.edu.cn - Homepage
Title
Cited by
Cited by
Year
Life after speech recognition: Fuzzing semantic misinterpretation for voice assistant applications
Y Zhang, L Xu, A Mendoza, G Yang, P Chinprutthiwong, G Gu
Proc. of the Network and Distributed System Security Symposium (NDSS'19), 2019
682019
Autoprobe: Towards automatic active malicious server probing using dynamic binary analysis
Z Xu, A Nappa, R Baykov, G Yang, J Caballero, G Gu
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
612014
Towards fine-grained network security forensics and diagnosis in the sdn era
H Wang, G Yang, P Chinprutthiwong, L Xu, Y Zhang, G Gu
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
492018
Automated generation of event-oriented exploits in android hybrid apps
G Yang, J Huang
Proc. of the Network and Distributed System Security Symposium (NDSS'18), 2018
362018
Study and mitigation of origin stripping vulnerabilities in hybrid-postmessage enabled mobile applications
G Yang, J Huang, G Gu, A Mendoza
2018 IEEE Symposium on Security and Privacy (SP), 742-755, 2018
342018
Identity confusion in {WebView-based} mobile app-in-app ecosystems
L Zhang, Z Zhang, A Liu, Y Cao, X Zhang, Y Chen, Y Zhang, G Yang, ...
31st USENIX Security Symposium (USENIX Security 22), 1597-1613, 2022
322022
Using provenance patterns to vet sensitive behaviors in Android apps
C Yang, G Yang, A Gehani, V Yegneswaran, D Tariq, G Gu
Security and Privacy in Communication Networks: 11th EAI International …, 2015
302015
Precisely and scalably vetting javascript bridge in android hybrid apps
G Yang, A Mendoza, J Zhang, G Gu
Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017
282017
Abusing hidden properties to attack the Node. js ecosystem
F Xiao, J Huang, Y Xiong, G Yang, H Hu, G Gu, W Lee
30th USENIX Security Symposium (USENIX Security 21), 2951-2968, 2021
272021
Security Study of Service Worker Cross-Site Scripting.
P Chinprutthiwong, R Vardhan, GL Yang, G Gu
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
182020
{Iframes/Popups} Are Dangerous in Mobile {WebView}: Studying and Mitigating Differential Context Vulnerabilities
G Yang, J Huang, G Gu
28th USENIX Security Symposium (USENIX Security 19), 977-994, 2019
182019
SEPAL: Towards a large-scale analysis of SEAndroid policy customization
D Yu, G Yang, G Meng, X Gong, X Zhang, X Xiang, X Wang, Y Jiang, ...
Proceedings of the Web Conference 2021, 2733-2744, 2021
72021
The service worker hiding in your browser: The next web attack target?
P Chinprutthiwong, R Vardhan, GL Yang, Y Zhang, G Gu
Proceedings of the 24th International Symposium on Research in Attacks …, 2021
62021
Understanding and Mitigating Remote Code Execution Vulnerabilities in Cross-platform Ecosystem
F Xiao, Z Yang, J Allen, G Yang, G Williams, W Lee
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
42022
Minergate: A novel generic and accurate defense solution against web based cryptocurrency mining attacks
G Yu, G Yang, T Li, X Han, S Guan, J Zhang, G Gu
Cyber Security: 17th China Annual Conference, CNCERT 2020, Beijing, China …, 2020
32020
Trusteddomain compromise attack in app-in-app ecosystems
Z Zhang, Z Zhang, K Lian, G Yang, L Zhang, Y Zhang, M Yang
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 51-57, 2023
22023
Collect responsibly but deliver arbitrarily? a study on cross-user privacy leakage in mobile apps
S Li, Z Yang, N Hua, P Liu, X Zhang, G Yang, M Yang
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
22022
NestFuzz: Enhancing Fuzzing with Comprehensive Understanding of Input Processing Logic
P Deng, Z Yang, L Zhang, G Yang, W Hong, Y Zhang, M Yang
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
12023
The Dark Forest: Understanding Security Risks of Cross-Party Delegated Resources in Mobile App-in-App Ecosystems
Z Zhang, L Zhang, G Yang, Y Chen, J Xu, M Yang
IEEE Transactions on Information Forensics and Security, 2024
2024
Notice the imposter! a study on user tag spoofing attack in mobile apps
S Li, Z Yang, G Yang, H Zhang, N Hua, Y Huang, M Yang
32nd USENIX Security Symposium (USENIX Security 23), 5485-5501, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20