What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yuan Zhang
Google Scholar
39
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Locating Security Patch Variants With Two-Dimensional Code Commit Features.
Lin Wang
Yuan Zhang
Xiaoting Chen
Min Yang
2025
conf/sp
MOCGuard: Automatically Detecting Missing-Owner-Check Vulnerabilities in Java Web Applications.
Fengyu Liu
Youkun Shi
Yuan Zhang
Guangliang Yang
Enhao Li
Min Yang
2025
conf/sp
Detecting Taint-Style Vulnerabilities in Microservice-Structured Web Applications.
Fengyu Liu
Yuan Zhang
Tian Chen
Youkun Shi
Guangliang Yang
Zihan Lin
Min Yang
Junyao He
Qi Li
2025
conf/ndss
Misdirection of Trust: Demystifying the Abuse of Dedicated URL Shortening Service.
Zhibo Zhang
Lei Zhang
Zhangyue Zhang
Geng Hong
Yuan Zhang
Min Yang
2025
conf/uss
Careless Retention and Management: Understanding and Detecting Data Retention Denial-of-Service Vulnerabilities in Java Web Containers.
Keke Lian
Lei Zhang
Haoran Zhao
Yinzhi Cao
Yongheng Liu
Fute Sun
Yuan Zhang
Min Yang
2025
conf/uss
Pig in a Poke: Automatically Detecting and Exploiting Link Following Vulnerabilities in Windows File Operations.
Bocheng Xiang
Yuan Zhang
Fengyu Liu
Hao Huang
Zihan Lin
Min Yang
2025
conf/uss
Make Agent Defeat Agent: Automatic Detection of Taint-Style Vulnerabilities in LLM-based Agents.
Fengyu Liu
Yuan Zhang
Jiaqi Luo
Jiarun Dai
Tian Chen
Letian Yuan
Zhengmin Yu
Youkun Shi
Ke Li
Chengyuan Zhou
Hao Chen
Min Yang
2025
conf/uss
Effective Directed Fuzzing with Hierarchical Scheduling for Web Vulnerability Detection.
Zihan Lin
Yuan Zhang
Jiarun Dai
Xinyou Huang
Bocheng Xiang
Guangliang Yang
Letian Yuan
Lei Zhang
Tian Chen
Min Yang
2025
conf/uss
XSSky: Detecting XSS Vulnerabilities through Local Path-Persistent Fuzzing.
Youkun Shi
Yuan Zhang
Tianhao Bai
Feng Xue
Jiarun Dai
Fengyu Liu
Lei Zhang
Xiapu Luo
Min Yang
2025
conf/uss
ChainFuzz: Exploiting Upstream Vulnerabilities in Open-Source Supply Chains.
Peng Deng
Lei Zhang
Yuchuan Meng
Zhemin Yang
Yuan Zhang
Zhemin Yang
2025
conf/uss
Towards Automatic Detection and Exploitation of Java Web Application Vulnerabilities via Concolic Execution guided by Cross-thread Object Manipulation.
Xinyou Huang
Lei Zhang
Yongheng Liu
Peng Deng
Yinzhi Cao
Yuan Zhang
Min Yang
2024
conf/ccs
Accurate and Efficient Recurring Vulnerability Detection for IoT Firmware.
Haoyu Xiao
Yuan Zhang
Minghang Shen
Chaoyang Lin
Can Zhang
Shengli Liu
Min Yang
2024
conf/sp
Efficient Detection of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Construction.
Bofei Chen
Lei Zhang
Xinyou Huang
Yinzhi Cao
Keke Lian
Yuan Zhang
Min Yang
2023
conf/ccs
SyzDirect: Directed Greybox Fuzzing for Linux Kernel.
Xin Tan
Yuan Zhang
Jiadong Lu
Xin Xiong
Zhuang Liu
Min Yang
2023
conf/ccs
NestFuzz: Enhancing Fuzzing with Comprehensive Understanding of Input Processing Logic.
Peng Deng
Zhemin Yang
Lei Zhang
Guangliang Yang
Wenzheng Hong
Yuan Zhang
Min Yang
2023
conf/uss
Remote Code Execution from SSTI in the Sandbox: Automatically Detecting and Exploiting Template Escape Bugs.
Yudi Zhao
Yuan Zhang
Min Yang
2023
conf/sp
AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities.
Zheyue Jiang
Yuan Zhang
Jun Xu
Xinqian Sun
Zhuang Liu
Min Yang
2023
conf/sp
AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities.
Zheyue Jiang
Yuan Zhang
Jun Xu
Xinqian Sun
Zhuang Liu
Min Yang
2023
conf/sp
Understanding the (In)Security of Cross-side Face Verification Systems in Mobile Apps: A System Perspective.
Xiaohan Zhang
Haoqi Ye
Ziqi Huang
Xiao Ye
Yinzhi Cao
Yuan Zhang
Min Yang
2022
conf/uss
Identity Confusion in WebView-based Mobile App-in-app Ecosystems.
Lei Zhang
Zhibo Zhang
Ancong Liu
Yinzhi Cao
Xiaohan Zhang
Yanjun Chen
Yuan Zhang
Guangliang Yang
Min Yang
2022
conf/uss
Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability Patches.
Youkun Shi
Yuan Zhang
Tianhan Luo
Xiangyu Mao
Yinzhi Cao
Ziwen Wang
Yudi Zhao
Zongan Huang
Min Yang
2022
conf/sp
Exploit the Last Straw That Breaks Android Systems.
Lei Zhang
Keke Lian
Haoyu Xiao
Zhibo Zhang
Peng Liu
Yuan Zhang
Min Yang
Haixin Duan
2021
conf/ccs
Locating the Security Patches for Disclosed OSS Vulnerabilities with Vulnerability-Commit Correlation Ranking.
Xin Tan
Yuan Zhang
Chenyuan Mi
Jiajun Cao
Kun Sun
Yifan Lin
Min Yang
2021
conf/ccs
Facilitating Vulnerability Assessment through PoC Migration.
Jiarun Dai
Yuan Zhang
Hailong Xu
Haiming Lyu
Zicheng Wu
Xinyu Xing
Min Yang
2021
conf/uss
Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking.
Xin Tan
Yuan Zhang
Xiyu Yang
Kangjie Lu
Min Yang
2020
conf/ccs
PDiff: Semantic-based Patch Presence Testing for Downstream Kernels.
Zheyue Jiang
Yuan Zhang
Jun Xu
Qi Wen
Zhenghe Wang
Xiaohan Zhang
Xinyu Xing
Min Yang
Zhemin Yang
2020
conf/ccs
Enhancing State-of-the-art Classifiers with API Semantics to Detect Evolved Android Malware.
Xiaohan Zhang
Yuan Zhang
Ming Zhong
Daizong Ding
Yinzhi Cao
Yukun Zhang
Mi Zhang
Min Yang
2020
conf/uss
An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem.
Shunfan Zhou
Zhemin Yang
Jie Xiang
Yinzhi Cao
Min Yang
Yuan Zhang
2020
conf/uss
BScout: Direct Whole Patch Presence Test for Java Executables.
Jiarun Dai
Yuan Zhang
Zheyue Jiang
Yingtian Zhou
Junyan Chen
Xinyu Xing
Xiaohan Zhang
Xin Tan
Min Yang
Zhemin Yang
2020
conf/sp
TextExerciser: Feedback-driven Text Input Exercising for Android Applications.
Yuyu He
Lei Zhang
Zhemin Yang
Yinzhi Cao
Keke Lian
Shuai Li
Wei Yang
Zhibo Zhang
Min Yang
Yuan Zhang
Haixin Duan
2018
conf/ccs
How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World.
Geng Hong
Zhemin Yang
Sen Yang
Lei Zhang
Yuhong Nan
Zhibo Zhang
Min Yang
Yuan Zhang
Zhiyun Qian
Hai-Xin Duan
2018
conf/ccs
Invetter: Locating Insecure Input Validations in Android Services.
Lei Zhang
Zhemin Yang
Yuyu He
Zhenyu Zhang
Zhiyun Qian
Geng Hong
Yuan Zhang
Min Yang
2018
conf/uss
An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications.
Xiaohan Zhang
Yuan Zhang
Qianqian Mo
Hao Xia
Zhemin Yang
Min Yang
Xiaofeng Wang
Long Lu
Hai-Xin Duan
2018
conf/ndss
Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps.
Yuhong Nan
Zhemin Yang
Xiaofeng Wang
Yuan Zhang
Donglai Zhu
Min Yang
2017
journals/tifs
Identifying User-Input Privacy in Mobile Applications at a Large Scale.
Yuhong Nan
Zhemin Yang
Min Yang
Shunfan Zhou
Yuan Zhang
Guofei Gu
Xiaofeng Wang
Limin Sun
2016
journals/tifs
Rethinking Permission Enforcement Mechanism on Mobile Systems.
Yuan Zhang
Min Yang
Guofei Gu
Hao Chen
2014
journals/tifs
Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps.
Yuan Zhang
Min Yang
Zhemin Yang
Guofei Gu
Peng Ning
Binyu Zang
2013
conf/ccs
Vetting undesirable behaviors in android apps with permission use analysis.
Yuan Zhang
Min Yang
Bingquan Xu
Zhemin Yang
Guofei Gu
Peng Ning
Xiaoyang Sean Wang
Binyu Zang
2013
conf/ccs
AppIntent: analyzing sensitive data transmission in android for privacy leakage detection.
Zhemin Yang
Min Yang
Yuan Zhang
Guofei Gu
Peng Ning
Xiaoyang Sean Wang
Coauthors
Ancong Liu
(1)
Bingquan Xu
(1)
Binyu Zang
(2)
Bocheng Xiang
(2)
Bofei Chen
(1)
Can Zhang
(1)
Chaoyang Lin
(1)
Chengyuan Zhou
(1)
Chenyuan Mi
(1)
Daizong Ding
(1)
Donglai Zhu
(1)
Enhao Li
(1)
Feng Xue
(1)
Fengyu Liu
(5)
Fute Sun
(1)
Geng Hong
(3)
Guangliang Yang
(5)
Guofei Gu
(5)
Hai-Xin Duan
(2)
Hailong Xu
(1)
Haiming Lyu
(1)
Haixin Duan
(2)
Hao Chen
(2)
Hao Huang
(1)
Hao Xia
(1)
Haoqi Ye
(1)
Haoran Zhao
(1)
Haoyu Xiao
(2)
Jiadong Lu
(1)
Jiajun Cao
(1)
Jiaqi Luo
(1)
Jiarun Dai
(5)
Jie Xiang
(1)
Jun Xu
(3)
Junyan Chen
(1)
Junyao He
(1)
Kangjie Lu
(1)
Ke Li
(1)
Keke Lian
(4)
Kun Sun
(1)
Lei Zhang
(13)
Letian Yuan
(2)
Limin Sun
(1)
Lin Wang
(1)
Long Lu
(1)
Mi Zhang
(1)
Min Yang
(38)
Ming Zhong
(1)
Minghang Shen
(1)
Peng Deng
(3)
Peng Liu
(1)
Peng Ning
(3)
Qi Li
(1)
Qi Wen
(1)
Qianqian Mo
(1)
Sen Yang
(1)
Shengli Liu
(1)
Shuai Li
(1)
Shunfan Zhou
(2)
Tian Chen
(3)
Tianhan Luo
(1)
Tianhao Bai
(1)
Wei Yang
(1)
Wenzheng Hong
(1)
Xiangyu Mao
(1)
Xiao Ye
(1)
Xiaofeng Wang
(3)
Xiaohan Zhang
(6)
Xiaoting Chen
(1)
Xiaoyang Sean Wang
(2)
Xiapu Luo
(1)
Xin Tan
(4)
Xin Xiong
(1)
Xinqian Sun
(2)
Xinyou Huang
(3)
Xinyu Xing
(3)
Xiyu Yang
(1)
Yanjun Chen
(1)
Yifan Lin
(1)
Yingtian Zhou
(1)
Yinzhi Cao
(9)
Yongheng Liu
(2)
Youkun Shi
(5)
Yuan Zhang
(39)
Yuchuan Meng
(1)
Yudi Zhao
(2)
Yuhong Nan
(3)
Yukun Zhang
(1)
Yuyu He
(2)
Zhangyue Zhang
(1)
Zhemin Yang
(15)
Zhenghe Wang
(1)
Zhengmin Yu
(1)
Zhenyu Zhang
(1)
Zheyue Jiang
(4)
Zhibo Zhang
(5)
Zhiyun Qian
(2)
Zhuang Liu
(3)
Zicheng Wu
(1)
Zihan Lin
(3)
Ziqi Huang
(1)
Ziwen Wang
(1)
Zongan Huang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to