(Cross-) browser fingerprinting via OS and hardware level features Y Cao, S Li, E Wijmans Proceedings 2017 Network and Distributed System Security Symposium, 2017 | 165 | 2017 |
Detecting node. js prototype pollution vulnerabilities via object lookup analysis S Li, M Kang, J Hou, Y Cao Proceedings of the 29th ACM Joint Meeting on European Software Engineering …, 2021 | 55 | 2021 |
Mining Node. js Vulnerabilities via Object Dependence Graph and Query S Li, M Kang, J Hou, Y Cao 31th USENIX Security Symposium 22, 2022 | 50 | 2022 |
Deterministic browser Y Cao, Z Chen, S Li, S Wu Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 41 | 2017 |
Rendered private: Making {GLSL} execution uniform to prevent {WebGL-based} browser fingerprinting S Wu, S Li, Y Cao, N Wang 28th USENIX Security Symposium (USENIX Security 19), 1645-1660, 2019 | 34 | 2019 |
Probe the Proto: Measuring Client-Side Prototype Pollution Vulnerabilities of One Million Real-world Websites Z Kang, S Li, Y Cao NDSS '22, 2022 | 27 | 2022 |
Who touched my browser fingerprint? a large-scale measurement study and classification of fingerprint dynamics S Li, Y Cao Proceedings of the ACM Internet Measurement Conference, 370-385, 2020 | 21 | 2020 |
Scaling javascript abstract interpretation to detect and exploit node. js taint-style vulnerability M Kang, Y Xu, S Li, R Gjomemo, J Hou, VN Venkatakrishnan, Y Cao 2023 IEEE Symposium on Security and Privacy (SP), 1059-1076, 2023 | 14 | 2023 |
CoCo: Efficient Browser Extension Vulnerability Detection via Coverage-guided, Concurrent Abstract Interpretation J Yu, S Li, J Zhu, Y Cao Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 9 | 2023 |
Towards Making JavaScript Applications Secure and Private S Li Johns Hopkins University, 2022 | 2 | 2022 |
What's the Real: A Novel Design Philosophy for Robust AI-Synthesized Voice Detection X Hai, X Liu, Y Tan, G Liu, S Li, W Niu, R Zhou, X Zhou Proceedings of the 32nd ACM International Conference on Multimedia, 6900-6909, 2024 | | 2024 |
Sensitive Behavioral Chain-focused Android Malware Detection Fused with AST Semantics J Gong, W Niu, S Li, M Zhang, X Zhang IEEE Transactions on Information Forensics and Security, 2024 | | 2024 |
GraphTunnel: Robust DNS Tunnel Detection Based on DNS Recursive Resolution Graph G Gao, W Niu, J Gong, D Gu, S Li, M Zhang, X Zhang IEEE Transactions on Information Forensics and Security, 2024 | | 2024 |
Assessing thresholds of resistance prevalence at which empiric treatment of gonorrhea should change among men who have sex with men in the US: A cost-effectiveness analysis X Yin, Y Li, MM Rönn, S Li, Y Yuan, TL Gift, K Hsu, JA Salomon, YH Grad, ... Plos Medicine 21 (7), e1004424, 2024 | | 2024 |
GraphTrack: A Graph-based Cross-Device Tracking Framework B Wang, T Zhou, S Li, Y Cao, N Gong ACM ASIA Conference on Computer and Communications Security, 2022 | | 2022 |