Towards continuous access control validation and forensics C Xiang, Y Wu, B Shen, M Shen, H Huang, T Xu, Y Zhou, C Moore, X Jin, ... Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 47 | 2019 |
Can systems explain permissions better? understanding users' misperceptions under smartphone runtime permission model B Shen, L Wei, C Xiang, Y Wu, M Shen, Y Zhou, X Jin 30th USENIX Security Symposium (USENIX Security 21), 751-768, 2021 | 42 | 2021 |
Offloading in HCNs: Congestion-aware network selection and user incentive design Y Li, B Shen, J Zhang, X Gan, J Wang, X Wang IEEE Transactions on Wireless Communications 16 (10), 6479-6492, 2017 | 35 | 2017 |
Protecting Data Integrity of Web Applications with Database Constraints Inferred from Application Code H Huang, B Shen, L Zhong, Y Zhou Proceedings of the 28th Conference on Architectural Support for Programming …, 2023 | 16 | 2023 |
Automatic Methods to Enhance Server Systems in Access Control Diagnosis B Shen University of California, San Diego, 2022 | 8 | 2022 |
Improving Logging to Reduce Permission Over-Granting Mistakes B Shen, T Shan, Y Zhou USENIX Security Symposium, 2023 | 4 | 2023 |
Multiview: Finding Blind Spots in {Access-Deny} Issues Diagnosis B Shen, T Shan, Y Zhou 32nd USENIX Security Symposium (USENIX Security 23), 7499-7516, 2023 | 4 | 2023 |
A survey of access control misconfiguration detection techniques B Shen arXiv preprint arXiv:2304.07704, 2023 | 2 | 2023 |
Effective Bug Detection with Unused Definitions L Zhong, C Xiang, H Huang, B Shen, E Mugnier, Y Zhou Proceedings of the Nineteenth European Conference on Computer Systems, 2024 | | 2024 |