What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yinzhi Cao
Google Scholar
ORCID:
0000-0002-9618-4830
53
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Follow My Flow: Unveiling Client-Side Prototype Pollution Gadgets from One Million Real-World Websites.
Zifeng Kang
Muxi Lyu
Zhengyu Liu
Jianjia Yu
Runqi Fan
Song Li
Yinzhi Cao
2025
conf/uss
Careless Retention and Management: Understanding and Detecting Data Retention Denial-of-Service Vulnerabilities in Java Web Containers.
Keke Lian
Lei Zhang
Haoran Zhao
Yinzhi Cao
Yongheng Liu
Fute Sun
Yuan Zhang
Min Yang
2025
conf/uss
CertPHash: Towards Certified Perceptual Hashing via Robust Training.
Yuchen Yang
Qichang Liu
Christopher Brix
Huan Zhang
Yinzhi Cao
2025
conf/uss
Towards Lifecycle Unlearning Commitment Management: Measuring Sample-level Unlearning Completeness.
Cheng-Long Wang
Qi Li
Zihang Xiang
Yinzhi Cao
Di Wang
2025
conf/uss
The DOMino Effect: Detecting and Exploiting DOM Clobbering Gadgets via Concolic Execution with Symbolic DOM.
Zhengyu Liu
Theo Lee
Jianjia Yu
Zifeng Kang
Yinzhi Cao
2025
conf/uss
Towards Automatic Detection and Exploitation of Java Web Application Vulnerabilities via Concolic Execution guided by Cross-thread Object Manipulation.
Xinyou Huang
Lei Zhang
Yongheng Liu
Peng Deng
Yinzhi Cao
Yuan Zhang
Min Yang
2024
conf/ccs
PLeak: Prompt Leaking Attacks against Large Language Model Applications.
Bo Hui
Haolin Yuan
Neil Gong
Philippe Burlina
Yinzhi Cao
2024
conf/ccs
ReactAppScan: Mining React Application Vulnerabilities via Component Graph.
Zhiyong Guo
Mingqing Kang
V. N. Venkatakrishnan
Rigel Gjomemo
Yinzhi Cao
2024
conf/sp
SneakyPrompt: Jailbreaking Text-to-image Generative Models.
Yuchen Yang
Bo Hui
Haolin Yuan
Neil Gong
Yinzhi Cao
2024
conf/sp
Efficient Detection of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Construction.
Bofei Chen
Lei Zhang
Xinyou Huang
Yinzhi Cao
Keke Lian
Yuan Zhang
Min Yang
2024
conf/sp
Withdrawing is believing? Detecting Inconsistencies between Withdrawal Choices and Third-party Data Collections in Mobile Apps.
Xiaolin Du
Zhemin Yang
Jiapeng Lin
Yinzhi Cao
Min Yang
2024
conf/sp
Undefined-oriented Programming: Detecting and Chaining Prototype Pollution Gadgets in Node.js Template Engines for Malicious Consequences.
Zhengyu Liu
Kecheng An
Yinzhi Cao
2023
conf/ccs
CoCo: Efficient Browser Extension Vulnerability Detection via Coverage-guided, Concurrent Abstract Interpretation.
Jianjia Yu
Song Li
Junmin Zhu
Yinzhi Cao
2023
conf/uss
McFIL: Model Counting Functionality-Inherent Leakage.
Maximilian Zinkus
Yinzhi Cao
Matthew D. Green
2023
conf/uss
PrivateFL: Accurate, Differentially Private Federated Learning via Personalized Data Transformation.
Yuchen Yang
Bo Hui
Haolin Yuan
Neil Zhenqiang Gong
Yinzhi Cao
2023
conf/uss
Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning.
Jonathan Prokos
Neil Fendley
Matthew Green
Roei Schuster
Eran Tromer
Tushar M. Jois
Yinzhi Cao
2023
conf/sp
Scaling JavaScript Abstract Interpretation to Detect and Exploit Node.js Taint-style Vulnerability.
Mingqing Kang
Yichao Xu
Song Li
Rigel Gjomemo
Jianwei Hou
V. N. Venkatakrishnan
Yinzhi Cao
2023
conf/sp
Understanding the (In)Security of Cross-side Face Verification Systems in Mobile Apps: A System Perspective.
Xiaohan Zhang
Haoqi Ye
Ziqi Huang
Xiao Ye
Yinzhi Cao
Yuan Zhang
Min Yang
2023
conf/ndss
CHKPLUG: Checking GDPR Compliance of WordPress Plugins via Cross-language Code Property Graph.
Faysal Hossain Shezan
Zihao Su
Mingqing Kang
Nicholas Phair
Patrick William Thomas
Michelangelo van Dam
Yinzhi Cao
Yuan Tian
2023
conf/ndss
Him of Many Faces: Characterizing Billion-scale Adversarial and Benign Browser Fingerprints on Commercial Websites.
Shujiang Wu
Pengfei Sun
Yao Zhao
Yinzhi Cao
2023
conf/dsn
Fortifying Federated Learning against Membership Inference Attacks via Client-level Input Perturbation.
Yuchen Yang
Haolin Yuan
Bo Hui
Neil Zhenqiang Gong
Neil Fendley
Philippe Burlina
Yinzhi Cao
2022
conf/uss
Identity Confusion in WebView-based Mobile App-in-app Ecosystems.
Lei Zhang
Zhibo Zhang
Ancong Liu
Yinzhi Cao
Xiaohan Zhang
Yanjun Chen
Yuan Zhang
Guangliang Yang
Min Yang
2022
conf/uss
Mining Node.js Vulnerabilities via Object Dependence Graph and Query.
Song Li
Mingqing Kang
Jianwei Hou
Yinzhi Cao
2022
conf/uss
Rendering Contention Channel Made Practical in Web Browsers.
Shujiang Wu
Jianjia Yu
Min Yang
Yinzhi Cao
2022
conf/uss
Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability Patches.
Youkun Shi
Yuan Zhang
Tianhan Luo
Xiangyu Mao
Yinzhi Cao
Ziwen Wang
Yudi Zhao
Zongan Huang
Min Yang
2022
conf/asiaccs
GraphTrack: A Graph-based Cross-Device Tracking Framework.
Binghui Wang
Tianchen Zhou
Song Li
Yinzhi Cao
Neil Zhenqiang Gong
2022
conf/ndss
Probe the Proto: Measuring Client-Side Prototype Pollution Vulnerabilities of One Million Real-world Websites.
Zifeng Kang
Song Li
Yinzhi Cao
2021
conf/sp
Runtime Recovery of Web Applications under Zero-Day ReDoS Attacks.
Zhihao Bai
Ke Wang
Hang Zhu
Yinzhi Cao
Xin Jin
2021
conf/ndss
Practical Blind Membership Inference Attack via Differential Comparisons.
Bo Hui
Yuchen Yang
Haolin Yuan
Philippe Burlina
Neil Zhenqiang Gong
Yinzhi Cao
2020
conf/ccs
Enhancing State-of-the-art Classifiers with API Semantics to Detect Evolved Android Malware.
Xiaohan Zhang
Yuan Zhang
Ming Zhong
Daizong Ding
Yinzhi Cao
Yukun Zhang
Mi Zhang
Min Yang
2020
conf/uss
An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem.
Shunfan Zhou
Zhemin Yang
Jie Xiang
Yinzhi Cao
Min Yang
Yuan Zhang
2020
conf/sp
TextExerciser: Feedback-driven Text Input Exercising for Android Applications.
Yuyu He
Lei Zhang
Zhemin Yang
Yinzhi Cao
Keke Lian
Shuai Li
Wei Yang
Zhibo Zhang
Min Yang
Yuan Zhang
Haixin Duan
2020
conf/ndss
TKPERM: Cross-platform Permission Knowledge Transfer to Detect Overprivileged Third-party Applications.
Faysal Hossain Shezan
Kaiming Cheng
Zhen Zhang
Yinzhi Cao
Yuan Tian
2020
conf/dsn
JSKernel: Fortifying JavaScript against Web Concurrency Attacks via a Kernel-Like Structure.
Zhanhao Chen
Yinzhi Cao
2019
conf/uss
Rendered Private: Making GLSL Execution Uniform to Prevent WebGL-based Browser Fingerprinting.
Shujiang Wu
Song Li
Yinzhi Cao
Ningfei Wang
2018
conf/ccs
Efficient Repair of Polluted Machine Learning Systems via Causal Unlearning.
Yinzhi Cao
Alexander Fangxiao Yu
Andrew Aday
Eric Stahl
Jon Merwine
Junfeng Yang
2018
conf/uss
FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps.
Xiang Pan
Yinzhi Cao
Xuechao Du
Boyuan He
Gan Fang
Rui Shao
Yan Chen
2018
conf/uss
Towards a Secure Zero-rating Framework with Three Parties.
Zhiheng Liu
Zhen Zhang
Yinzhi Cao
Zhaohan Xi
Shihao Jing
Humberto J. La Roche
2017
conf/ccs
Deterministic Browser.
Yinzhi Cao
Zhanhao Chen
Song Li
Shujiang Wu
2017
conf/ndss
(Cross-)Browser Fingerprinting via OS and Hardware Level Features.
Yinzhi Cao
Song Li
Erik Wijmans
2016
conf/ccs
CSPAutoGen: Black-box Enforcement of Content Security Policy upon Real-world Websites.
Xiang Pan
Yinzhi Cao
Shuangping Liu
Yu Zhou
Yan Chen
Tingzhe Zhou
2015
conf/sp
Vetting SSL Usage in Applications with SSLINT.
Boyuan He
Vaibhav Rastogi
Yinzhi Cao
Yan Chen
V. N. Venkatakrishnan
Runqing Yang
Zhenrui Zhang
2015
conf/sp
Towards Making Systems Forget with Machine Unlearning.
Yinzhi Cao
Junfeng Yang
2015
conf/cns
SafePay: Protecting against credit card forgery with existing magnetic card readers.
Yinzhi Cao
Xiang Pan
Yan Chen
2015
conf/ndss
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.
Yinzhi Cao
Yanick Fratantonio
Antonio Bianchi
Manuel Egele
Christopher Kruegel
Giovanni Vigna
Yan Chen
2015
conf/ndss
I Do Not Know What You Visited Last Summer: Protecting users from stateful third-party web tracking with TrackingFree browser.
Xiang Pan
Yinzhi Cao
Yan Chen
2014
conf/acsac
JShield: towards real-time and vulnerability-based detection of polluted drive-by download attacks.
Yinzhi Cao
Xiang Pan
Yan Chen
Jianwei Zhuge
2013
conf/dsn
Redefining web browser principals with a Configurable Origin Policy.
Yinzhi Cao
Vaibhav Rastogi
Zhichun Li
Yan Chen
Alexander Moshchuk
2012
conf/ccs
Virtual browser: a virtualized browser to sandbox third-party JavaScripts with enhanced security.
Yinzhi Cao
Zhichun Li
Vaibhav Rastogi
Yan Chen
Xitao Wen
2012
conf/ndss
PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks.
Yinzhi Cao
Vinod Yegneswaran
Phillip A. Porras
Yan Chen
2011
conf/ccs
Poster: a path-cutting approach to blocking XSS worms in social web networks.
Yinzhi Cao
Vinod Yegneswaran
Phillip A. Porras
Yan Chen
2011
conf/ndss
WebShield: Enabling Various Web Defense Techniques without Client Side Modifications.
Zhichun Li
Yi Tang
Yinzhi Cao
Vaibhav Rastogi
Yan Chen
Bin Liu
Clint Sbisa
2010
conf/ccs
Virtual browser: a web-level sandbox to secure third-party JavaScript without sacrificing functionality.
Yinzhi Cao
Zhichun Li
Vaibhav Rastogi
Yan Chen
Coauthors
Alexander Fangxiao Yu
(1)
Alexander Moshchuk
(1)
Ancong Liu
(1)
Andrew Aday
(1)
Antonio Bianchi
(1)
Bin Liu
(1)
Binghui Wang
(1)
Bo Hui
(5)
Bofei Chen
(1)
Boyuan He
(2)
Cheng-Long Wang
(1)
Christopher Brix
(1)
Christopher Kruegel
(1)
Clint Sbisa
(1)
Daizong Ding
(1)
Di Wang
(1)
Eran Tromer
(1)
Eric Stahl
(1)
Erik Wijmans
(1)
Faysal Hossain Shezan
(2)
Fute Sun
(1)
Gan Fang
(1)
Giovanni Vigna
(1)
Guangliang Yang
(1)
Haixin Duan
(1)
Hang Zhu
(1)
Haolin Yuan
(5)
Haoqi Ye
(1)
Haoran Zhao
(1)
Huan Zhang
(1)
Humberto J. La Roche
(1)
Jianjia Yu
(4)
Jianwei Hou
(2)
Jianwei Zhuge
(1)
Jiapeng Lin
(1)
Jie Xiang
(1)
Jon Merwine
(1)
Jonathan Prokos
(1)
Junfeng Yang
(2)
Junmin Zhu
(1)
Kaiming Cheng
(1)
Ke Wang
(1)
Kecheng An
(1)
Keke Lian
(3)
Lei Zhang
(5)
Manuel Egele
(1)
Matthew D. Green
(1)
Matthew Green
(1)
Maximilian Zinkus
(1)
Mi Zhang
(1)
Michelangelo van Dam
(1)
Min Yang
(11)
Ming Zhong
(1)
Mingqing Kang
(4)
Muxi Lyu
(1)
Neil Fendley
(2)
Neil Gong
(2)
Neil Zhenqiang Gong
(4)
Nicholas Phair
(1)
Ningfei Wang
(1)
Patrick William Thomas
(1)
Peng Deng
(1)
Pengfei Sun
(1)
Philippe Burlina
(3)
Phillip A. Porras
(2)
Qi Li
(1)
Qichang Liu
(1)
Rigel Gjomemo
(2)
Roei Schuster
(1)
Rui Shao
(1)
Runqi Fan
(1)
Runqing Yang
(1)
Shihao Jing
(1)
Shuai Li
(1)
Shuangping Liu
(1)
Shujiang Wu
(4)
Shunfan Zhou
(1)
Song Li
(1)
Song Li
(8)
Theo Lee
(1)
Tianchen Zhou
(1)
Tianhan Luo
(1)
Tingzhe Zhou
(1)
Tushar M. Jois
(1)
V. N. Venkatakrishnan
(3)
Vaibhav Rastogi
(5)
Vinod Yegneswaran
(2)
Wei Yang
(1)
Xiang Pan
(5)
Xiangyu Mao
(1)
Xiao Ye
(1)
Xiaohan Zhang
(3)
Xiaolin Du
(1)
Xin Jin
(1)
Xinyou Huang
(2)
Xitao Wen
(1)
Xuechao Du
(1)
Yan Chen
(13)
Yanick Fratantonio
(1)
Yanjun Chen
(1)
Yao Zhao
(1)
Yi Tang
(1)
Yichao Xu
(1)
Yinzhi Cao
(53)
Yongheng Liu
(2)
Youkun Shi
(1)
Yu Zhou
(1)
Yuan Tian
(2)
Yuan Zhang
(9)
Yuchen Yang
(1)
Yuchen Yang
(4)
Yudi Zhao
(1)
Yukun Zhang
(1)
Yuyu He
(1)
Zhanhao Chen
(2)
Zhaohan Xi
(1)
Zhemin Yang
(3)
Zhen Zhang
(2)
Zhengyu Liu
(3)
Zhenrui Zhang
(1)
Zhibo Zhang
(2)
Zhichun Li
(4)
Zhihao Bai
(1)
Zhiheng Liu
(1)
Zhiyong Guo
(1)
Zifeng Kang
(3)
Zihang Xiang
(1)
Zihao Su
(1)
Ziqi Huang
(1)
Ziwen Wang
(1)
Zongan Huang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to