Trojaning attack on neural networks Y Liu, S Ma, Y Aafer, WC Lee, J Zhai, W Wang, X Zhang 25th Annual Network And Distributed System Security Symposium (NDSS 2018), 2018 | 1363 | 2018 |
Droidapiminer: Mining api-level features for robust malware detection in android Y Aafer, W Du, H Yin Security and Privacy in Communication Networks: 9th International ICST …, 2013 | 979 | 2013 |
Abs: Scanning neural networks for back-doors by artificial brain stimulation Y Liu, WC Lee, G Tao, S Ma, Y Aafer, X Zhang Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 473 | 2019 |
Detecting attacks against robotic vehicles: A control invariant approach H Choi, WC Lee, Y Aafer, F Fei, Z Tu, X Zhang, D Xu, X Deng Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 213 | 2018 |
Hare hunting in the wild android: A study on the threat of hanging attribute references Y Aafer, N Zhang, Z Zhang, X Zhang, K Chen, XF Wang, X Zhou, W Du, ... Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 74 | 2015 |
Precise android api protection mapping derivation and reasoning Y Aafer, G Tao, J Huang, X Zhang, N Li Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 65 | 2018 |
Harvesting inconsistent security configurations in custom android {ROMs} via differential analysis Y Aafer, X Zhang, W Du 25th USENIX Security Symposium (USENIX Security 16), 1153-1168, 2016 | 47 | 2016 |
Software-based realtime recovery from sensor attacks on robotic vehicles H Choi, S Kate, Y Aafer, X Zhang, D Xu 23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020 | 45 | 2020 |
Life after App Uninstallation: Are the Data Still Alive? Data Residue Attacks on Android. X Zhang, K Ying, Y Aafer, Z Qiu, W Du NDSS, 2016 | 44 | 2016 |
Osprey: Recovery of variable and data structure via probabilistic analysis for stripped binary Z Zhang, Y Ye, W You, G Tao, W Lee, Y Kwon, Y Aafer, X Zhang 2021 IEEE Symposium on Security and Privacy (SP), 813-832, 2021 | 42 | 2021 |
Stochfuzz: Sound and cost-effective fuzzing of stripped binaries by incremental and stochastic rewriting Z Zhang, W You, G Tao, Y Aafer, X Liu, X Zhang 2021 IEEE Symposium on Security and Privacy (SP), 659-676, 2021 | 39 | 2021 |
Analysis of SEAndroid policies: Combining MAC and DAC in Android H Chen, N Li, W Enck, Y Aafer, X Zhang Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017 | 39 | 2017 |
Android {SmartTVs} vulnerability discovery via {log-guided} fuzzing Y Aafer, W You, Y Sun, Y Shi, X Zhang, H Yin 30th USENIX Security Symposium (USENIX Security 21), 2759-2776, 2021 | 35 | 2021 |
AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection. Y Aafer, J Huang, Y Sun, X Zhang, N Li, C Tian NDSS, 2018 | 35 | 2018 |
LAMP: data provenance for graph based machine learning algorithms through derivative computation S Ma, Y Aafer, Z Xu, WC Lee, J Zhai, Y Liu, X Zhang Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017 | 35 | 2017 |
A systematic security evaluation of android's multi-user framework P Ratazzi, Y Aafer, A Ahlawat, H Hao, Y Wang, W Du arXiv preprint arXiv:1410.7752, 2014 | 35 | 2014 |
Pmp: Cost-effective forced execution with probabilistic memory pre-planning W You, Z Zhang, Y Kwon, Y Aafer, F Peng, Y Shi, C Harmon, X Zhang 2020 IEEE Symposium on Security and Privacy (SP), 1121-1138, 2020 | 27 | 2020 |
Dual-force: Understanding webview malware via cross-language forced execution Z Tang, J Zhai, M Pan, Y Aafer, S Ma, X Zhang, J Zhao Proceedings of the 33rd ACM/IEEE International Conference on Automated …, 2018 | 20 | 2018 |
Cyber-physical inconsistency vulnerability identification for safety checks in robotic vehicles H Choi, S Kate, Y Aafer, X Zhang, D Xu Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 17 | 2020 |
Adbudgetkiller: Online advertising budget draining attack IL Kim, W Wang, Y Kwon, Y Zheng, Y Aafer, W Meng, X Zhang Proceedings of the 2018 World Wide Web Conference, 297-307, 2018 | 16 | 2018 |