Peng Wang
Title
Cited by
Cited by
Year
Asdroid: Detecting stealthy behaviors in android applications by user interface and program behavior contradiction
J Huang, X Zhang, L Tan, P Wang, B Liang
Proceedings of the 36th International Conference on Software Engineering …, 2014
2342014
Finding unknown malice in 10 seconds: Mass vetting for new threats at the google-play scale
K Chen, P Wang, Y Lee, XF Wang, N Zhang, H Huang, W Zou, P Liu
24th {USENIX} Security Symposium ({USENIX} Security 15), 659-674, 2015
2142015
Following devil's footprints: Cross-platform analysis of potentially harmful libraries on android and ios
K Chen, X Wang, Y Chen, P Wang, Y Lee, XF Wang, B Ma, A Wang, ...
2016 IEEE Symposium on Security and Privacy (SP), 357-376, 2016
842016
Under the shadow of sunshine: Understanding and detecting bulletproof hosting on legitimate service provider networks
S Alrwais, X Liao, X Mi, P Wang, XF Wang, F Qian, R Beyah, D McCoy
2017 IEEE Symposium on Security and Privacy (SP), 805-823, 2017
312017
Reference hijacking: Patching, protecting and analyzing on unmodified and non-rooted android devices
W You, B Liang, W Shi, S Zhu, P Wang, S Xie, X Zhang
2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE …, 2016
282016
Automatic Android GUI traversal with high coverage
P Wang, B Liang, W You, J Li, W Shi
2014 Fourth International Conference on Communication Systems and Network …, 2014
282014
TaintMan: An ART-compatible dynamic taint analysis framework on unmodified and non-rooted Android devices
W You, B Liang, W Shi, P Wang, X Zhang
IEEE Transactions on Dependable and Secure Computing 17 (1), 209-222, 2017
232017
Cracking wall of confinement: Understanding and analyzing malicious domain takedowns
E Alowaisheq
The Network and Distributed System Security Symposium (NDSS), 2019
152019
Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations
P Wang, X Mi, X Liao, XF Wang, K Yuan, F Qian, R Beyah
Proceedings of The 25th Annual Network And Distributed System Security Symposium, 2018
102018
Into the Deep Web: Understanding E-commerce Fraud from Autonomous Chat with Cybercriminals
P Wang, X Liao, Y Qin, XF Wang
The Network and Distributed System Security Symposium, 2020
22020
Filtering for Malice through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level
K Chen, T Li, B Ma, P Wang, XF Wang, P Zong
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2017
22017
Control dependency analyses for detecting remote control Android malware
J LI, B LIANG, W YOU, P WANG, W SHI
Journal of Tsinghua University (Science and Technology), 01, 2014
2014
一种在Android中植入动态污点分析模块的方法
梁彬, 游伟, 王鹏, 石文昌
CN Patent CN103,177,210 A, 2013
2013
The system can't perform the operation now. Try again later.
Articles 1–13