UIPicker: user-input privacy identification in mobile applications

Guofei Gu , Zhemin Yang , Yuhong Nan , Shunfan Zhou
usenix security symposium 993 -1008

145
2015
BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks

Vireshwar Kumar , Dongyan Xu , Mathias Payer , Yuhong Nan
23rd International Symposium on Research in Attacks, Intrusions and Defenses ({RAID} 2020) 397 -411

2020
On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices

Yanick Fratantonio , Antonio Bianchi , Yuhong Nan , Zeyu Lei
network and distributed system security symposium

2021
Understanding Malicious Cross-library Data Harvesting on Android

Luyi Xing , Xiaojing Liao , Yuhong Nan , Yuqing Zhang
usenix security symposium

2021
How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World

Geng Hong , Zhemin Yang , Sen Yang , Lei Zhang
computer and communications security 1701 -1713

43
2018
Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps.

Yuhong Nan , Zhemin Yang , Xiaofeng Wang , Yuan Zhang
network and distributed system security symposium

26
2018
SmartDagger: a bytecode-based static analysis approach for detecting cross-contract vulnerability

Zeqin Liao , Zibin Zheng , Xiao Chen , Yuhong Nan
Smpte Journal 752 -764

1
2022
Detecting state inconsistency bugs in dapps via on-chain transaction replay and fuzzing

Mingxi Ye , Yuhong Nan , Zibin Zheng , Dongpeng Wu
298 -309

3
2023
FunFuzz: A Function-oriented Fuzzer for Smart Contract Vulnerability Detection with High Effectiveness and Efficiency

Mingxi Ye , Yuhong Nan , Hong-Ning Dai , Shuo Yang
ACM Transactions on Software Engineering and Methodology

2025
SmartCoCo: Checking Comment-Code Inconsistency in Smart Contracts via Constraint Propagation and Binding

Sicheng Hao , Yuhong Nan , Zibin Zheng , Xiaohui Liu
2023 38th IEEE/ACM International Conference on Automated Software Engineering (ASE) 294 -306

2023
DARPA: Combating Asymmetric Dark UI Patterns on Android with Run-time View Decorator

Zhaoxin Cai , Yuhong Nan , Xueqiang Wang , Mengyi Long
2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 480 -493

2023
Identifying user-input privacy in mobile applications at a large scale

Yuhong Nan , Zhemin Yang , Min Yang , Shunfan Zhou
IEEE Transactions on Information Forensics and Security 12 ( 3) 647 -661

27
2016
BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy

Jianliang Wu , Yuhong Nan , Vireshwar Kumar , Dave Jing Tian
14th USENIX Workshop on Offensive Technologies (WOOT)

64
2020
Are You Spying on Me?{Large-Scale} Analysis on {IoT} Data Exposure through Companion Apps

Yuhong Nan , Xueqiang Wang , Luyi Xing , Xiaojing Liao
32nd USENIX Security Symposium (USENIX Security 23) 6665 -6682

14
2023
Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems.

Mingming Zha , Jice Wang , Yuhong Nan , Xiaofeng Wang
NDSS

8
2022
ATLAS: A Sequence-based Learning Approach for Attack Investigation

Abdulellah Alsaheel , Yuhong Nan , Shiqing Ma , Le Yu

145
{ProFactory}: Improving {IoT} Security via Formalized Protocol Customization

Fei Wang , Jianliang Wu , Yuhong Nan , Yousra Aafer
31st USENIX Security Symposium (USENIX Security 22) 3879 -3896

5
2022