BibTeX records: Chaoshun Zuo

download as .bib file

@inproceedings{DBLP:conf/icse/RenZLDZG24,
  author       = {Pengcheng Ren and
                  Chaoshun Zuo and
                  Xiaofeng Liu and
                  Wenrui Diao and
                  Qingchuan Zhao and
                  Shanqing Guo},
  title        = {{DEMISTIFY:} Identifying On-device Machine Learning Models Stealing
                  and Reuse Vulnerabilities in Mobile Apps},
  booktitle    = {Proceedings of the 46th {IEEE/ACM} International Conference on Software
                  Engineering, {ICSE} 2024, Lisbon, Portugal, April 14-20, 2024},
  pages        = {41:1--41:13},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3597503.3623325},
  doi          = {10.1145/3597503.3623325},
  timestamp    = {Tue, 23 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/RenZLDZG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/ChenTZZ0LZ24,
  author       = {Yongliang Chen and
                  Ruoqin Tang and
                  Chaoshun Zuo and
                  Xiaokuan Zhang and
                  Lei Xue and
                  Xiapu Luo and
                  Qingchuan Zhao},
  title        = {Attention! Your Copied Data is Under Monitoring: {A} Systematic Study
                  of Clipboard Usage in Android Apps},
  booktitle    = {Proceedings of the 46th {IEEE/ACM} International Conference on Software
                  Engineering, {ICSE} 2024, Lisbon, Portugal, April 14-20, 2024},
  pages        = {63:1--63:13},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3597503.3623317},
  doi          = {10.1145/3597503.3623317},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/ChenTZZ0LZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/SivakumaranZLB23,
  author       = {Pallavi Sivakumaran and
                  Chaoshun Zuo and
                  Zhiqiang Lin and
                  Jorge Blasco},
  editor       = {Joseph K. Liu and
                  Yang Xiang and
                  Surya Nepal and
                  Gene Tsudik},
  title        = {Uncovering Vulnerabilities of Bluetooth Low Energy IoT from Companion
                  Mobile Apps with Ble-Guuide},
  booktitle    = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14,
                  2023},
  pages        = {1004--1015},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579856.3595806},
  doi          = {10.1145/3579856.3595806},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/SivakumaranZLB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicom/NiLZZWXLZ23,
  author       = {Tao Ni and
                  Jianfeng Li and
                  Xiaokuan Zhang and
                  Chaoshun Zuo and
                  Wubing Wang and
                  Weitao Xu and
                  Xiapu Luo and
                  Qingchuan Zhao},
  editor       = {Xavier Costa{-}P{\'{e}}rez and
                  Joerg Widmer and
                  Diego Perino and
                  Domenico Giustiniano and
                  Haitham Al{-}Hassanieh and
                  Arash Asadi and
                  Landon P. Cox},
  title        = {Exploiting Contactless Side Channels in Wireless Charging Power Banks
                  for User Privacy Inference via Few-shot Learning},
  booktitle    = {Proceedings of the 29th Annual International Conference on Mobile
                  Computing and Networking, {ACM} MobiCom 2023, Madrid, Spain, October
                  2-6, 2023},
  pages        = {73:1--73:15},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3570361.3613288},
  doi          = {10.1145/3570361.3613288},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobicom/NiLZZWXLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/AnwarZYL23,
  author       = {Md Sakib Anwar and
                  Chaoshun Zuo and
                  Carter Yagemann and
                  Zhiqiang Lin},
  title        = {Extracting Threat Intelligence From Cheat Binaries For Anti-Cheating},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {17--31},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607211},
  doi          = {10.1145/3607199.3607211},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/AnwarZYL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/NiZZLYWXLZ23,
  author       = {Tao Ni and
                  Xiaokuan Zhang and
                  Chaoshun Zuo and
                  Jianfeng Li and
                  Zhenyu Yan and
                  Wubing Wang and
                  Weitao Xu and
                  Xiapu Luo and
                  Qingchuan Zhao},
  title        = {Uncovering User Interactions on Smartphones via Contactless Wireless
                  Charging Side Channels},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {3399--3415},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179322},
  doi          = {10.1109/SP46215.2023.10179322},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/NiZZLYWXLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZuoWL23,
  author       = {Chaoshun Zuo and
                  Chao Wang and
                  Zhiqiang Lin},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {A Peek into the Metaverse: Detecting 3D Model Clones in Mobile Games},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {3925--3942},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/zuo},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ZuoWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/ZhaoZBL22,
  author       = {Qingchuan Zhao and
                  Chaoshun Zuo and
                  Jorge Blasco and
                  Zhiqiang Lin},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined
                  Bluetooth Peripherals},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {521--533},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3517410},
  doi          = {10.1145/3488932.3517410},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/ZhaoZBL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YangEZ0SL22,
  author       = {Yuqing Yang and
                  Mohamed Elsabagh and
                  Chaoshun Zuo and
                  Ryan Johnson and
                  Angelos Stavrou and
                  Zhiqiang Lin},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Detecting and Measuring Misconfigured Manifests in Android Apps},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {3063--3077},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560607},
  doi          = {10.1145/3548606.3560607},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/YangEZ0SL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZuoL22,
  author       = {Chaoshun Zuo and
                  Zhiqiang Lin},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Playing Without Paying: Detecting Vulnerable Payment Verification
                  in Native Binaries of Unity Mobile Games},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {3093--3110},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/zuo},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ZuoL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pomacs/ZhangTYZL21,
  author       = {Yue Zhang and
                  Bayan Turkistani and
                  Allen Yuqing Yang and
                  Chaoshun Zuo and
                  Zhiqiang Lin},
  title        = {A Measurement Study of Wechat Mini-Apps},
  journal      = {Proc. {ACM} Meas. Anal. Comput. Syst.},
  volume       = {5},
  number       = {2},
  pages        = {14:1--14:25},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460081},
  doi          = {10.1145/3460081},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pomacs/ZhangTYZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmetrics/0025TYZL21,
  author       = {Yue Zhang and
                  Bayan Turkistani and
                  Allen Yuqing Yang and
                  Chaoshun Zuo and
                  Zhiqiang Lin},
  editor       = {Longbo Huang and
                  Anshul Gandhi and
                  Negar Kiyavash and
                  Jia Wang},
  title        = {A Measurement Study of Wechat Mini-Apps},
  booktitle    = {{SIGMETRICS} '21: {ACM} {SIGMETRICS} / International Conference on
                  Measurement and Modeling of Computer Systems, Virtual Event, China,
                  June 14-18, 2021},
  pages        = {19--20},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3410220.3460106},
  doi          = {10.1145/3410220.3460106},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigmetrics/0025TYZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhaoZDPL20,
  author       = {Qingchuan Zhao and
                  Chaoshun Zuo and
                  Brendan Dolan{-}Gavitt and
                  Giancarlo Pellegrino and
                  Zhiqiang Lin},
  title        = {Automatic Uncovering of Hidden Behaviors From Input Validation in
                  Mobile Apps},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {1106--1120},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00072},
  doi          = {10.1109/SP40000.2020.00072},
  timestamp    = {Thu, 21 Sep 2023 15:57:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ZhaoZDPL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Elsabagh0SZZL20,
  author       = {Mohamed Elsabagh and
                  Ryan Johnson and
                  Angelos Stavrou and
                  Chaoshun Zuo and
                  Qingchuan Zhao and
                  Zhiqiang Lin},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {{FIRMSCOPE:} Automatic Uncovering of Privilege-Escalation Vulnerabilities
                  in Pre-Installed Apps in Android Firmware},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {2379--2396},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/elsabagh},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Elsabagh0SZZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ZhangDHGZ020,
  author       = {Zicheng Zhang and
                  Wenrui Diao and
                  Chengyu Hu and
                  Shanqing Guo and
                  Chaoshun Zuo and
                  Li Li},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {An empirical study of potentially malicious third-party libraries
                  in Android apps},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {144--154},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399346},
  doi          = {10.1145/3395351.3399346},
  timestamp    = {Tue, 29 Dec 2020 18:27:47 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ZhangDHGZ020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-13362,
  author       = {Yuxiang Luo and
                  Cheng Zhang and
                  Yunqi Zhang and
                  Chaoshun Zuo and
                  Dong Xuan and
                  Zhiqiang Lin and
                  Adam C. Champion and
                  Ness B. Shroff},
  title        = {{ACOUSTIC-TURF:} Acoustic-based Privacy-Preserving {COVID-19} Contact
                  Tracing},
  journal      = {CoRR},
  volume       = {abs/2006.13362},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.13362},
  eprinttype    = {arXiv},
  eprint       = {2006.13362},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-13362.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZuoWLZ19,
  author       = {Chaoshun Zuo and
                  Haohuang Wen and
                  Zhiqiang Lin and
                  Yinqian Zhang},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Automatic Fingerprinting of Vulnerable {BLE} IoT Devices with Static
                  UUIDs from Mobile Apps},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {1469--1483},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3354240},
  doi          = {10.1145/3319535.3354240},
  timestamp    = {Tue, 10 Nov 2020 20:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZuoWLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/ChenZDDZSLZZ19,
  author       = {Jiongyi Chen and
                  Chaoshun Zuo and
                  Wenrui Diao and
                  Shuaike Dong and
                  Qingchuan Zhao and
                  Menghan Sun and
                  Zhiqiang Lin and
                  Yinqian Zhang and
                  Kehuan Zhang},
  title        = {Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices
                  and Users},
  booktitle    = {49th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2019, Portland, OR, USA, June 24-27, 2019},
  pages        = {222--233},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/DSN.2019.00034},
  doi          = {10.1109/DSN.2019.00034},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/ChenZDDZSLZZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ZhaoZPL19,
  author       = {Qingchuan Zhao and
                  Chaoshun Zuo and
                  Giancarlo Pellegrino and
                  Zhiqiang Lin},
  title        = {Geo-locating Drivers: {A} Study of Sensitive Data Leakage in Ride-Hailing
                  Services},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/geo-locating-drivers-a-study-of-sensitive-data-leakage-in-ride-hailing-services/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ZhaoZPL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZuoLZ19,
  author       = {Chaoshun Zuo and
                  Zhiqiang Lin and
                  Yinqian Zhang},
  title        = {Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from
                  Mobile Apps},
  booktitle    = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
                  CA, USA, May 19-23, 2019},
  pages        = {1296--1310},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SP.2019.00009},
  doi          = {10.1109/SP.2019.00009},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ZuoLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AlrawiZDKLS19,
  author       = {Omar Alrawi and
                  Chaoshun Zuo and
                  Ruian Duan and
                  Ranjita Pai Kasturi and
                  Zhiqiang Lin and
                  Brendan Saltaformaggio},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile
                  Backends},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {551--566},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/alrawi},
  timestamp    = {Mon, 01 Feb 2021 08:43:12 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AlrawiZDKLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/www/LiuZZGX18,
  author       = {Yang Liu and
                  Chaoshun Zuo and
                  Zonghua Zhang and
                  Shanqing Guo and
                  Xin{-}Shun Xu},
  title        = {An automatically vetting mechanism for {SSL} error-handling vulnerability
                  in android hybrid Web apps},
  journal      = {World Wide Web},
  volume       = {21},
  number       = {1},
  pages        = {127--150},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11280-017-0458-9},
  doi          = {10.1007/S11280-017-0458-9},
  timestamp    = {Wed, 24 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/www/LiuZZGX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ChenDZZL0LSYZ18,
  author       = {Jiongyi Chen and
                  Wenrui Diao and
                  Qingchuan Zhao and
                  Chaoshun Zuo and
                  Zhiqiang Lin and
                  XiaoFeng Wang and
                  Wing Cheong Lau and
                  Menghan Sun and
                  Ronghai Yang and
                  Kehuan Zhang},
  title        = {IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based
                  Fuzzing},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_01A-1\_Chen\_paper.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/ChenDZZL0LSYZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZuoZL17,
  author       = {Chaoshun Zuo and
                  Qingchuan Zhao and
                  Zhiqiang Lin},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {{AUTHSCOPE:} Towards Automatic Discovery of Vulnerable Authorizations
                  in Online Services},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {799--813},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134089},
  doi          = {10.1145/3133956.3134089},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZuoZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/ZuoL17,
  author       = {Chaoshun Zuo and
                  Zhiqiang Lin},
  editor       = {Rick Barrett and
                  Rick Cummings and
                  Eugene Agichtein and
                  Evgeniy Gabrilovich},
  title        = {{SMARTGEN:} Exposing Server URLs of Mobile Apps With Selective Symbolic
                  Execution},
  booktitle    = {Proceedings of the 26th International Conference on World Wide Web,
                  {WWW} 2017, Perth, Australia, April 3-7, 2017},
  pages        = {867--876},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3038912.3052609},
  doi          = {10.1145/3038912.3052609},
  timestamp    = {Tue, 06 Nov 2018 16:57:07 +0100},
  biburl       = {https://dblp.org/rec/conf/www/ZuoL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ZuoWLW16,
  author       = {Chaoshun Zuo and
                  Wubing Wang and
                  Zhiqiang Lin and
                  Rui Wang},
  title        = {Automatic Forgery of Cryptographically Consistent Messages to Identify
                  Security Vulnerabilities in Mobile Services},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/automatic-forgery-cryptographically-consistent-messages-identify-security-vulnerabilities.pdf},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/ZuoWLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZuoWG15,
  author       = {Chaoshun Zuo and
                  Jianliang Wu and
                  Shanqing Guo},
  editor       = {Feng Bao and
                  Steven Miller and
                  Jianying Zhou and
                  Gail{-}Joon Ahn},
  title        = {Automatically Detecting {SSL} Error-Handling Vulnerabilities in Hybrid
                  Mobile Web Apps},
  booktitle    = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
                  2015},
  pages        = {591--596},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2714576.2714583},
  doi          = {10.1145/2714576.2714583},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZuoWG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/YangZGHC15,
  author       = {Cuixia Yang and
                  Chaoshun Zuo and
                  Shanqing Guo and
                  Chengyu Hu and
                  Lizhen Cui},
  title        = {{UI} Ripping in Android: Reverse Engineering of Graphical User Interfaces
                  and its Application},
  booktitle    = {{IEEE} Conference on Collaboration and Internet Computing, {CIC} 2015,
                  Hangzhou, China, October 27-30, 2015},
  pages        = {160--167},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CIC.2015.22},
  doi          = {10.1109/CIC.2015.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coinco/YangZGHC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iov/ZhangZGCC14,
  author       = {Haibo Zhang and
                  Chaoshun Zuo and
                  Shanqing Guo and
                  Lizhen Cui and
                  Jun Chen},
  editor       = {Ching{-}Hsien Robert Hsu and
                  Shangguang Wang},
  title        = {SafeBrowsingCloud: Detecting Drive-by-Downloads Attack Using Cloud
                  Computing Environment},
  booktitle    = {Internet of Vehicles - Technologies and Services - First International
                  Conference, IOV, Beijing, China, September 1-3, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8662},
  pages        = {292--303},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11167-4\_29},
  doi          = {10.1007/978-3-319-11167-4\_29},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/iov/ZhangZGCC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics