Follow
Yi Chen
Title
Cited by
Cited by
Year
Following devil's footprints: Cross-platform analysis of potentially harmful libraries on android and ios
K Chen, X Wang, Y Chen, P Wang, Y Lee, XF Wang, B Ma, A Wang, ...
2016 IEEE Symposium on Security and Privacy (SP), 357-376, 2016
1342016
Stealthy porn: Understanding real-world adversarial images for illicit online promotion
K Yuan, D Tang, X Liao, XF Wang, X Feng, Y Chen, M Sun, H Lu, K Zhang
2019 IEEE Symposium on Security and Privacy (SP), 952-966, 2019
622019
Devils in the guidance: predicting logic vulnerabilities in payment syndication services through automated documentation analysis
Y Chen, L Xing, Y Qin, X Liao, XF Wang, K Chen, W Zou
28th USENIX Security Symposium (USENIX Security 19), 747-764, 2019
362019
Bookworm game: Automatic discovery of lte vulnerabilities through documentation analysis
Y Chen, Y Yao, XF Wang, D Xu, C Yue, X Liu, K Chen, H Tang, B Liu
2021 IEEE Symposium on Security and Privacy (SP), 1197-1214, 2021
322021
Demystifying hidden privacy settings in mobile apps
Y Chen, M Zha, N Zhang, D Xu, Q Zhao, X Feng, K Yuan, F Suya, Y Tian, ...
2019 IEEE Symposium on Security and Privacy (SP), 570-586, 2019
312019
Mass discovery of android traffic imprints through instantiated partial execution
Y Chen, W You, Y Lee, K Chen, XF Wang, W Zou
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
302017
Seeing the forest for the trees: Understanding security hazards in the {3GPP} ecosystem through intelligent analysis on change requests
Y Chen, D Tang, Y Yao, M Zha, XF Wang, X Liu, H Tang, D Zhao
31st USENIX Security Symposium (USENIX Security 22), 17-34, 2022
92022
Practical and efficient in-enclave verification of privacy compliance
W Liu, W Wang, H Chen, XF Wang, Y Lu, K Chen, X Wang, Q Shen, ...
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
82021
Android on pc: On the security of end-user android emulators
F Xu, S Shen, W Diao, Z Li, Y Chen, R Li, K Zhang
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
52021
Sherlock on Specs: Building {LTE} Conformance Tests through Automated Reasoning
Y Chen, D Tang, Y Yao, M Zha, XF Wang, X Liu, H Tang, B Liu
32nd USENIX Security Symposium (USENIX Security 23), 3529-3545, 2023
22023
Confidential attestation: Efficient in-enclave verification of privacy policy compliance
W Liu, W Wang, X Wang, X Meng, Y Lu, H Chen, X Wang, Q Shen, ...
arXiv preprint arXiv:2007.10513, 2020
12020
Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples
D Xu, D Tang, Y Chen, XF Wang, K Chen, H Tang, L Li
The system can't perform the operation now. Try again later.
Articles 1–12