Yaoqi Jia
Yaoqi Jia
Ph.D Student of Computer Science, National University of Singapore
Verified email at comp.nus.edu.sg - Homepage
Cited by
Cited by
Man-in-the-browser-cache: persisting HTTPS attacks via browser cache poisoning
Y Jia, Y Chen, X Dong, P Saxena, J Mao, Z Liang
computers & security 55, 62-80, 2015
Droidvault: A trusted data vault for android devices
X Li, H Hu, G Bai, Y Jia, Z Liang, P Saxena
2014 19th International Conference on Engineering of Complex Computer …, 2014
Web-to-application injection attacks on android: Characterization and detection
B Hassanshahi, Y Jia, RHC Yap, P Saxena, Z Liang
European Symposium on Research in Computer Security, 577-598, 2015
I know where you've been: Geo-inference attacks via the browser cache
Y Jia, X Dong, Z Liang, P Saxena
IEEE Internet Computing 19 (1), 44-53, 2014
" The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing
Y Jia, ZL Chua, H Hu, S Chen, P Saxena, Z Liang
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
Oblivp2p: An oblivious peer-to-peer content sharing system
Y Jia, T Moataz, S Tople, P Saxena
25th {USENIX} Security Symposium ({USENIX} Security 16), 945-962, 2016
Detecting injected behaviors in HTML5-based Android applications
J Mao, R Wang, Y Chen, Y Jia
Journal of High Speed Networks 22 (1), 15-34, 2016
You can’t be me: Enabling trusted paths and user sub-origins in web browsers
E Budianto, Y Jia, X Dong, P Saxena, Z Liang
International Workshop on Recent Advances in Intrusion Detection, 150-171, 2014
Abusing CDNs for fun and profit: Security issues in CDNs' origin validation
R Guo, J Chen, B Liu, J Zhang, C Zhang, H Duan, T Wan, J Jiang, S Hao, ...
2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS), 1-10, 2018
Toward exposing timing-based probing attacks in web applications
J Mao, Y Chen, F Shi, Y Jia, Z Liang
Sensors 17 (3), 464, 2017
Anonymity in Peer-assisted CDNs: Inference Attacks and Mitigation.
Y Jia, G Bai, P Saxena, Z Liang
Proc. Priv. Enhancing Technol. 2016 (4), 294-314, 2016
Automatic permission inference for hybrid mobile apps
J Mao, H Ma, Y Chen, Y Jia, Z Liang
Journal of High Speed Networks 22 (1), 55-64, 2016
Robust Synchronous P2P Primitives Using SGX Enclaves.
Y Jia, S Tople, T Moataz, D Gong, P Saxena, Z Liang
IACR Cryptol. ePrint Arch. 2017, 180, 2017
Pro-oram: Practical read-only oblivious {RAM}
S Tople, Y Jia, P Saxena
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-scale DNS Analysis
B Liu, Z Li, P Zong, C Lu, H Duan, Y Liu, S Alrwais, X Wang, S Hao, Y Jia, ...
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 560-575, 2019
Robust Detection of Android UI Similarity
J Mao, J Bian, H Ma, Y Jia, Z Liang, X Jiang
2018 IEEE International Conference on Communications (ICC), 1-6, 2018
PRO-ORAM: Constant Latency Read-Only Oblivious RAM.
S Tople, Y Jia, P Saxena
IACR Cryptol. ePrint Arch. 2018, 220, 2018
A function-level behavior model for anomalous behavior detection in hybrid mobile applications
J Mao, R Wang, Y Chen, Y Xiao, Y Jia, Z Liang
2016 International Conference on Identification, Information and Knowledge …, 2016
Robust P2P Primitives Using {SGX} Enclaves
Y Jia, S Tople, T Moataz, D Gong, P Saxena, Z Liang
23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020
I Know Where You’ve Been
Y Jia, X Dong, Z Liang, P Saxena
The system can't perform the operation now. Try again later.
Articles 1–20