Follow
Qingchuan Zhao
Title
Cited by
Cited by
Year
IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.
J Chen, W Diao, Q Zhao, C Zuo, Z Lin, XF Wang, WC Lau, M Sun, R Yang, ...
NDSS, 2018
4492018
PT-CFI: Transparent backward-edge control flow violation detection using intel processor trace
Y Gu, Q Zhao, Y Zhang, Z Lin
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
1032017
A study of the privacy of covid-19 contact tracing apps
H Wen, Q Zhao, Z Lin, D Xuan, N Shroff
Security and Privacy in Communication Networks: 16th EAI International …, 2020
972020
Authscope: Towards automatic discovery of vulnerable authorizations in online services
C Zuo, Q Zhao, Z Lin
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
712017
On the accuracy of measured proximity of bluetooth-based contact tracing apps
Q Zhao, H Wen, Z Lin, D Xuan, N Shroff
Security and Privacy in Communication Networks: 16th EAI International …, 2020
612020
{FIRMSCOPE}: Automatic uncovering of {Privilege-Escalation} vulnerabilities in {Pre-Installed} apps in android firmware
M Elsabagh, R Johnson, A Stavrou, C Zuo, Q Zhao, Z Lin
29th USENIX security symposium (USENIX Security 20), 2379-2396, 2020
542020
Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services.
Q Zhao, C Zuo, G Pellegrino, L Zhiqiang
CISPA, 2019
482019
Your iots are (not) mine: On the remote binding between iot devices and users
J Chen, C Zuo, W Diao, S Dong, Q Zhao, M Sun, Z Lin, Y Zhang, K Zhang
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019
442019
Automatic uncovering of hidden behaviors from input validation in mobile apps
Q Zhao, C Zuo, B Dolan-Gavitt, G Pellegrino, Z Lin
2020 IEEE Symposium on Security and Privacy (SP), 1106-1120, 2020
422020
Automated cross-platform reverse engineering of CAN bus commands from mobile apps
H Wen, Q Zhao, QA Chen, Z Lin
Proceedings 2020 Network and Distributed System Security Symposium (NDSS'20), 2020
362020
Uncovering user interactions on smartphones via contactless wireless charging side channels
T Ni, X Zhang, C Zuo, J Li, Z Yan, W Wang, W Xu, X Luo, Q Zhao
2023 IEEE Symposium on Security and Privacy (SP), 3399-3415, 2023
222023
Eavesdropping Mobile App Activity via {Radio-Frequency} Energy Harvesting
T Ni, G Lan, J Wang, Q Zhao, W Xu
32nd USENIX Security Symposium (USENIX Security 23), 3511-3528, 2023
19*2023
Exploiting contactless side channels in wireless charging power banks for user privacy inference via few-shot learning
T Ni, J Li, X Zhang, C Zuo, W Wang, W Xu, X Luo, Q Zhao
Proceedings of the 29th Annual International Conference on Mobile Computing …, 2023
162023
Recovering Fingerprints from In-Display Fingerprint Sensors via Electromagnetic Side Channel
T Ni, X Zhang, Q Zhao
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
142023
XPorter: A study of the multi-port charger security on privacy leakage and voice injection
T Ni, Y Chen, W Xu, L Xue, Q Zhao
Proceedings of the 29th Annual International Conference on Mobile Computing …, 2023
92023
Towards Effective Detection of Ponzi schemes on Ethereum with Contract Runtime Behavior Graph
R Liang, J Chen, C Wu, K He, Y Wu, W Sun, R Du, Q Zhao, Y Liu
arXiv preprint arXiv:2406.00921, 2024
72024
Detecting and measuring aggressive location harvesting in mobile apps via data-flow path embedding
H Lu, Q Zhao, Y Chen, X Liao, Z Lin
Proceedings of the ACM on Measurement and Analysis of Computing Systems 7 (1 …, 2023
72023
No-fuzz: Efficient anti-fuzzing techniques
Z Zhou, C Wang, Q Zhao
International Conference on Security and Privacy in Communication Systems …, 2022
62022
Ava: Inconspicuous attribute variation-based adversarial attack bypassing deepfake detection
X Meng, L Wang, S Guo, L Ju, Q Zhao
2024 IEEE Symposium on Security and Privacy (SP), 74-90, 2024
52024
DEMISTIFY: Identifying On-device Machine Learning Models Stealing and Reuse Vulnerabilities in Mobile Apps
P Ren, C Zuo, X Liu, W Diao, Q Zhao, S Guo
Proceedings of the 46th IEEE/ACM International Conference on Software …, 2024
42024
The system can't perform the operation now. Try again later.
Articles 1–20