Towards discovering and understanding task hijacking in android

Chuangang Ren , Hui Xue , Yulong Zhang , Peng Liu
usenix security symposium 945 -959

62
2015
Using replicated execution for a more secure and reliable web browser.

Hui Xue , Nathan Dautenhahn , Samuel T. King
network and distributed system security symposium

13
2012
User interface for displaying network analytics

Hui Xue , Shuo Shan , Patrick Glenn Murray , Zhong Wu

3
2017
Operation and Security Considerations of Federated Learning Platform Based on Compute First Network

Lijun Zhao , Xiaoyong Tang , Zhengpeng You , Yong Pang
international conference on communications

2020
Enpublic Apps: Security Threats Using iOS Enterprise and Developer Certificates

Min Zheng , Hui Xue , Yulong Zhang , Tao Wei
computer and communications security 463 -474

9
2015
Accurate and efficient exploit capture and classification

Yu Ding , Tao Wei , Hui Xue , Yulong Zhang
Science China Information Sciences 60 ( 5) 052110

9
2017
Verifying security invariants in ExpressOS

Haohui Mai , Edgar Pek , Hui Xue , Samuel Talmadge King
Proceedings of the eighteenth international conference on Architectural support for programming languages and operating systems - ASPLOS '13 48 ( 4) 293 -304

38
2013
Framework for efficient security coverage of mobile software applications

Osman Abdoul Ismael , Dawn Song , Ashar Aziz , Noah Johnson

223
2015
Framework for computer application analysis of sensitive information tracking

Osman Abdoul Ismael , Dawn Song , Phung-Te Ha , Peter J Gilbert

223
2015
Framework for efficient security coverage of mobile software applications using machine learning

Osman Abdoul Ismael , Dawn Song , Phung-Te Ha , Peter J Gilbert

155
2017
Framework for efficient security coverage of mobile software applications

Osman Abdoul Ismael , Dawn Song , Ashar Aziz , Noah Johnson

142
2019
Sidewinder: Targeted attack against Android in the golden age of ad libraries

Tao Wei , Yulong Zhang , Hui Xue , Min Zheng
Black Hat 14

12
2014
Apple without a shell–iOS under targeted attack

Tao Wei , Min Zheng , Hui Xue , Dawn Song
Virus Bulletin Conference

6
2014
Poster: Classifying Downloaders

Yu Ding , Liang Guo , Chao Zhang , Yulong Zhang
IEEE Symposium on Security and Privacy

1
2015
Digging for Data Structures.

Anthony Cozzie , Frank Stratton , Hui Xue , Samuel T King
OSDI 8 255 -266

194
2008
Fingerprints on mobile devices: Abusing and leaking

Yulong Zhang , Zhaonfeng Chen , Hui Xue , Tao Wei
Black Hat Conference

63
2015
Monitoring Vulnaggressive Apps on Google Play

Yulong Zhang , Hui Xue , Tao Wei , Dawn Song
FireEye Blog

4
2013
快速准确的 Exploit 自动捕获与分类方法和系统

Yu Ding , Tao Wei , Hui Xue , Yulong Zhang
Science China Information Sciences 60 1 -17

2017
Using redundancy to improve security and testing

Hui Xue
University of Illinois at Urbana-Champaign

10
2013