default search action
Juanru Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Yiwei Zhang, Siqi Ma, Tiancheng Chen, Juanru Li, Robert H. Deng, Elisa Bertino:
EvilScreen Attack: Smart TV Hijacking via Multi-Channel Remote Control Mimicry. IEEE Trans. Dependable Secur. Comput. 21(4): 1544-1556 (2024) - [j12]Ruidong Han, Huihui Gong, Siqi Ma, Juanru Li, Chang Xu, Elisa Bertino, Surya Nepal, Zhuo Ma, Jianfeng Ma:
A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects. IEEE Trans. Inf. Forensics Secur. 19: 722-734 (2024) - [j11]Ruidong Han, Siqi Ma, Juanru Li, Surya Nepal, David Lo, Zhuo Ma, Jianfeng Ma:
Range Specification Bug Detection in Flight Control System Through Fuzzing. IEEE Trans. Software Eng. 50(3): 461-473 (2024) - [i5]Carsten Baum, Jens Berlips, Walther Chen, Hongrui Cui, Ivan Damgård, Jiangbin Dong, Kevin M. Esvelt, Mingyu Gao, Dana Gretton, Leonard Foner, Martin Kysel, Kaiyi Zhang, Juanru Li, Xiang Li, Omer Paneth, Ronald L. Rivest, Francesca Sage-Ling, Adi Shamir, Yue Shen, Meicen Sun, Vinod Vaikuntanathan, Lynn Van Hauwe, Theia Vogel, Benjamin Weinstein-Raun, Yun Wang, Daniel Wichs, Stephen Wooster, Andrew C. Yao, Yu Yu, Haoling Zhang:
A system capable of verifiably and privately screening global DNA synthesis. CoRR abs/2403.14023 (2024) - 2023
- [c56]Xing Han, Yuheng Zhang, Xue Zhang, Zeyuan Chen, Mingzhe Wang, Yiwei Zhang, Siqi Ma, Yu Yu, Elisa Bertino, Juanru Li:
Medusa Attack: Exploring Security Hazards of In-App QR Code Scanning. USENIX Security Symposium 2023: 4607-4624 - 2022
- [j10]Hehao Li, Yizhuo Wang, Yiwei Zhang, Juanru Li, Dawu Gu:
PEDroid: Automatically Extracting Patches from Android App Updates (Artifact). Dagstuhl Artifacts Ser. 8(2): 24:1-24:2 (2022) - [j9]Siqi Ma, Juanru Li, Surya Nepal, Diethelm Ostry, David Lo, Sanjay K. Jha, Robert H. Deng, Elisa Bertino:
Orchestration or Automation: Authentication Flaw Detection in Android Apps. IEEE Trans. Dependable Secur. Comput. 19(4): 2165-2178 (2022) - [c55]Yiwei Zhang, Siqi Ma, Juanru Li, Dawu Gu, Elisa Bertino:
KingFisher: Unveiling Insecurely Used Credentials in IoT-to-Mobile Communications. DSN 2022: 488-500 - [c54]Ziyi Zhou, Xing Han, Zeyuan Chen, Yuhong Nan, Juanru Li, Dawu Gu:
SIMulation: Demystifying (Insecure) Cellular Network based One-Tap Authentication Services. DSN 2022: 534-546 - [c53]Hehao Li, Yizhuo Wang, Yiwei Zhang, Juanru Li, Dawu Gu:
PEDroid: Automatically Extracting Patches from Android App Updates. ECOOP 2022: 21:1-21:31 - [c52]Ruidong Han, Chao Yang, Siqi Ma, Jianfeng Ma, Cong Sun, Juanru Li, Elisa Bertino:
Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search. ICSE 2022: 462-473 - [c51]Yiwei Zhang, Juanru Li, Dawu Gu:
Rethinking the security of IoT from the perspective of developer customized device-cloud interaction. SAC 2022: 210-213 - [c50]Xuancheng Jin, Xuangan Xiao, Songlin Jia, Wang Gao, Dawu Gu, Hang Zhang, Siqi Ma, Zhiyun Qian, Juanru Li:
Annotating, Tracking, and Protecting Cryptographic Secrets with CryptoMPK. SP 2022: 650-665 - [c49]Yunlong Lyu, Yi Fang, Yiwei Zhang, Qibin Sun, Siqi Ma, Elisa Bertino, Kangjie Lu, Juanru Li:
Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis. SP 2022: 2096-2113 - [i4]Yiwei Zhang, Siqi Ma, Tiancheng Chen, Juanru Li, Robert H. Deng, Elisa Bertino:
EvilScreen Attack: Smart TV Hijacking via Multi-channel Remote Control Mimicry. CoRR abs/2210.03014 (2022) - 2021
- [c48]Yunlong Lyu, Wang Gao, Siqi Ma, Qibin Sun, Juanru Li:
SparrowHawk: Memory Safety Flaw Detection via Data-Driven Source Code Annotation. Inscrypt 2021: 129-148 - [c47]Chi Xu, Juanru Li, Junrong Liu:
Yet Another Traffic Black Hole: Amplifying CDN Fetching Traffic with RangeFragAmp Attacks. CollaborateCom (1) 2021: 439-459 - [c46]Siqi Ma, Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal, Diethelm Ostry, Cong Sun:
Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps. ICSE 2021: 1671-1682 - [c45]Wenya Wang, Yakang Li, Chao Wang, Yuan Yan, Juanru Li, Dawu Gu:
Re-Check Your Certificates! Experiences and Lessons Learnt from Real-World HTTPS Certificate Deployments. NSS 2021: 17-37 - [i3]Siqi Ma, Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal, Diethelm Ostry, Cong Sun:
Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps. CoRR abs/2103.05758 (2021) - [i2]Ruidong Han, Chao Yang, Siqi Ma, Jianfeng Ma, Cong Sun, Juanru Li, Elisa Bertino:
Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search. CoRR abs/2112.03511 (2021) - 2020
- [j8]Hui Liu, Juanru Li, Dawu Gu:
Understanding the security of app-in-the-middle IoT. Comput. Secur. 97: 102000 (2020) - [c44]Siqi Ma, Hehao Li, Wenbo Yang, Juanru Li, Surya Nepal, Elisa Bertino:
Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services. ACSAC 2020: 320-331 - [c43]Yuyao Zhang, Siqi Ma, Juanru Li, Kailai Li, Surya Nepal, Dawu Gu:
SMARTSHIELD: Automatic Smart Contract Protection Made Easy. SANER 2020: 23-34 - [c42]Qingzhao Zhang, Yizhuo Wang, Juanru Li, Siqi Ma:
EthPloit: From Fuzzing to Efficient Exploit Generation against Smart Contracts. SANER 2020: 116-126
2010 – 2019
- 2019
- [j7]Wenbo Yang, Juanru Li, Yuanyuan Zhang, Dawu Gu:
Security analysis of third-party in-app payment in mobile applications. J. Inf. Secur. Appl. 48 (2019) - [c41]Siqi Ma, Runhan Feng, Juanru Li, Yang Liu, Surya Nepal, Diethelm Ostry, Elisa Bertino, Robert H. Deng, Zhuo Ma, Sanjay Jha:
An empirical study of SMS one-time password authentication in Android apps. ACSAC 2019: 339-354 - [c40]Siqi Ma, Elisa Bertino, Surya Nepal, Juanru Li, Diethelm Ostry, Robert H. Deng, Sanjay Jha:
Finding Flaws from Password Authentication Code in Android Apps. ESORICS (1) 2019: 619-637 - [c39]Long Mai, Yuan Yan, Songlin Jia, Shuran Wang, Jianqiang Wang, Juanru Li, Siqi Ma, Dawu Gu:
Accelerating SM2 Digital Signature Algorithm Using Modern Processor Features. ICICS 2019: 430-446 - [c38]Jianqiang Wang, Siqi Ma, Yuanyuan Zhang, Juanru Li, Zheyu Ma, Long Mai, Tiancheng Chen, Dawu Gu:
NLP-EYE: Detecting Memory Corruptions via Semantic-Aware Memory Operation Function Identification. RAID 2019: 309-321 - [c37]Bodong Li, Yuanyuan Zhang, Juanru Li, Runhan Feng, Dawu Gu:
APPCOMMUNE: Automated Third-Party Libraries De-duplicating and Updating for Android Apps. SANER 2019: 344-354 - 2018
- [j6]Bodong Li, Yuanyuan Zhang, Juanru Li, Wenbo Yang, Dawu Gu:
AppSpear: Automating the hidden-code extraction and reassembling of packed android malware. J. Syst. Softw. 140: 3-16 (2018) - [c36]Haohuang Wen, Juanru Li, Yuanyuan Zhang, Dawu Gu:
An Empirical Study of SDK Credential Misuse in iOS Apps. APSEC 2018: 258-267 - [c35]Juanru Li, Zhiqiang Lin, Juan Caballero, Yuanyuan Zhang, Dawu Gu:
K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces. CCS 2018: 412-425 - [c34]Yikun Hu, Yuanyuan Zhang, Juanru Li, Hui Wang, Bodong Li, Dawu Gu:
BinMatch: A Semantics-Based Hybrid Approach on Binary Code Clone Analysis. ICSME 2018: 104-114 - [c33]Junliang Shu, Juanru Li, Yuanyuan Zhang, Dawu Gu:
Burn After Reading: Expunging Execution Footprints of Android Apps. NSS 2018: 46-63 - [c32]Changyu Li, Quanpu Cai, Juanru Li, Hui Liu, Yuanyuan Zhang, Dawu Gu, Yu Yu:
Passwords in the Air: Harvesting Wi-Fi Credentials from SmartCfg Provisioning. WISEC 2018: 1-11 - [i1]Yikun Hu, Yuanyuan Zhang, Juanru Li, Hui Wang, Bodong Li, Dawu Gu:
BinMatch: A Semantics-based Hybrid Approach on Binary Code Clone Analysis. CoRR abs/1808.06216 (2018) - 2017
- [j5]Junliang Shu, Yuanyuan Zhang, Juanru Li, Bodong Li, Dawu Gu:
Why Data Deletion Fails? A Study on Deletion Flaws and Data Remanence in Android Systems. ACM Trans. Embed. Comput. Syst. 16(2): 61:1-61:22 (2017) - [c31]Qi Zhang, Juanru Li, Yuanyuan Zhang, Hui Wang, Dawu Gu:
Oh-Pwn-VPN! Security Analysis of OpenVPN-Based Android Apps. CANS 2017: 373-389 - [c30]Hui Liu, Changyu Li, Xuancheng Jin, Juanru Li, Yuanyuan Zhang, Dawu Gu:
Smart Solution, Poor Protection: An Empirical Study of Security and Privacy Issues in Developing and Deploying Smart Home Devices. IoT S&P@CCS 2017: 13-18 - [c29]Qing Wang, Juanru Li, Yuanyuan Zhang, Hui Wang, Yikun Hu, Bodong Li, Dawu Gu:
NativeSpeaker: Identifying Crypto Misuses in Android Native Code Libraries. Inscrypt 2017: 301-320 - [c28]Zhenghao Hu, Yuanyuan Zhang, Hui Wang, Juanru Li, Wenbo Yang, Dawu Gu:
MIRAGE: Randomizing large chunk allocation via dynamic binary instrumentation. DSC 2017: 98-106 - [c27]Xuewen Zhang, Yuanyuan Zhang, Juanru Li, Yikun Hu, Huayi Li, Dawu Gu:
Embroidery: Patching Vulnerable Binary Code of Fragmentized Android Devices. ICSME 2017: 47-57 - [c26]Haijiang Xie, Yuanyuan Zhang, Juanru Li, Dawu Gu:
Nightingale: Translating Embedded VM Code in x86 Binary Executables. ISC 2017: 387-404 - [c25]Yikun Hu, Yuanyuan Zhang, Juanru Li, Dawu Gu:
Binary code clone detection across architectures and compiling configurations. ICPC 2017: 88-98 - [c24]Wenbo Yang, Yuanyuan Zhang, Juanru Li, Hui Liu, Qing Wang, Yueheng Zhang, Dawu Gu:
Show Me the Money! Finding Flawed Implementations of Third-party In-app Payment in Android Apps. NDSS 2017 - 2016
- [c23]Hui Wang, Yuanyuan Zhang, Juanru Li, Dawu Gu:
The Achilles heel of OAuth: a multi-platform study of OAuth-based authentication. ACSAC 2016: 167-176 - [c22]Hui Liu, Yuanyuan Zhang, Juanru Li, Hui Wang, Dawu Gu:
Open Sesame! Web Authentication Cracking via Mobile App Analysis. APWeb (2) 2016: 483-487 - [c21]Yesheng Zhi, Yuanyuan Zhang, Juanru Li, Dawu Gu:
Security Testing of Software on Embedded Devices Using x86 Platform. CollaborateCom 2016: 497-504 - [c20]Muqing Liu, Yuanyuan Zhang, Juanru Li, Junliang Shu, Dawu Gu:
Security Analysis of Vendor Customized Code in Firmware of Embedded Device. SecureComm 2016: 722-739 - [c19]Tianyi Xie, Yuanyuan Zhang, Juanru Li, Hui Liu, Dawu Gu:
New Exploit Methods against Ptmalloc of GLIBC. Trustcom/BigDataSE/ISPA 2016: 646-653 - [c18]Yikun Hu, Yuanyuan Zhang, Juanru Li, Dawu Gu:
Cross-Architecture Binary Semantics Understanding via Similar Code Comparison. SANER 2016: 57-67 - 2015
- [c17]Hui Wang, Yuanyuan Zhang, Juanru Li, Hui Liu, Wenbo Yang, Bodong Li, Dawu Gu:
Vulnerability Assessment of OAuth Implementations in Android Applications. ACSAC 2015: 61-70 - [c16]Wen Xu, Juanru Li, Junliang Shu, Wenbo Yang, Tianyi Xie, Yuanyuan Zhang, Dawu Gu:
From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel. CCS 2015: 414-425 - [c15]Bodong Li, Yuanyuan Zhang, Chen Lyu, Juanru Li, Dawu Gu:
SSG: Sensor Security Guard for Android Smartphones. CollaborateCom 2015: 221-233 - [c14]Wenbo Yang, Yuanyuan Zhang, Juanru Li, Junliang Shu, Bodong Li, Wenjun Hu, Dawu Gu:
AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware. RAID 2015: 359-381 - 2014
- [c13]Juanru Li, Yuanyuan Zhang, Wenbo Yang, Junliang Shu, Dawu Gu:
DIAS: Automated Online Analysis for Android Applications. CIT 2014: 307-314 - [c12]Wenbo Yang, Juanru Li, Yuanyuan Zhang, Yong Li, Junliang Shu, Dawu Gu:
APKLancet: tumor payload diagnosis and purification for android applications. AsiaCCS 2014: 483-494 - [c11]Junliang Shu, Juanru Li, Yuanyuan Zhang, Dawu Gu:
Android App Protection via Interpretation Obfuscation. DASC 2014: 63-68 - [c10]Hui Liu, Yuanyuan Zhang, Hui Wang, Wenbo Yang, Juanru Li, Dawu Gu:
TagDroid: Hybrid SSL Certificate Verification in Android. ICICS 2014: 120-131 - [c9]Yong Li, Yuanyuan Zhang, Juanru Li, Dawu Gu:
iCryptoTracer: Dynamic Analysis on Misuse of Cryptography Functions in iOS Applications. NSS 2014: 349-362 - 2013
- [c8]Ruoxu Zhao, Dawu Gu, Juanru Li, Yuanyuan Zhang:
Automatic Detection and Analysis of Encrypted Messages in Malware. Inscrypt 2013: 101-117 - 2012
- [c7]Dawu Gu, Juanru Li, Sheng Li, Zhouqian Ma, Zheng Guo, Junrong Liu:
Differential Fault Analysis on Lightweight Blockciphers with Statistical Cryptanalysis Techniques. FDTC 2012: 27-33 - [c6]Juanru Li, Dawu Gu, Yuhao Luo:
Android Malware Forensics: Reconstruction of Malicious Events. ICDCS Workshops 2012: 552-558 - [c5]Ruoxu Zhao, Dawu Gu, Juanru Li, Hui Liu:
Detecting Encryption Functions via Process Emulation and IL-Based Program Analysis. ICICS 2012: 252-263 - 2011
- [j4]Wei Li, Xiaoling Xia, Dawu Gu, Zhiqiang Liu, Juanru Li, Ya Liu:
A New Differential Fault Attack on SPN Structure, with Application to AES Cipher. J. Comput. 6(2): 216-223 (2011) - [c4]Zhiqiang Liu, Dawu Gu, Ya Liu, Juanru Li, Wei Li:
Linear Cryptanalysis of ARIA Block Cipher. ICICS 2011: 242-254 - [c3]Ruoxu Zhao, Dawu Gu, Juanru Li, Ran Yu:
Detection and Analysis of Cryptographic Data Inside Software. ISC 2011: 182-196 - 2010
- [j3]Wei Li, Dawu Gu, Juanru Li, Zhiqiang Liu, Ya Liu:
Differential fault analysis on Camellia. J. Syst. Softw. 83(5): 844-851 (2010) - [c2]Juanru Li, Dawu Gu, Chaoguo Deng, Yuhao Luo:
Digital Forensic Analysis on Runtime Instruction Flow. e-Forensics 2010: 168-178
2000 – 2009
- 2009
- [c1]Wei Li, Dawu Gu, Yong Wang, Juanru Li, Zhiqiang Liu:
An Extension of Differential Fault Analysis on AES. NSS 2009: 443-446 - 2008
- [j2]Yuanyuan Zhang, Dawu Gu, Juanru Li:
Exploiting unidirectional links for key establishment protocols in heterogeneous sensor networks. Comput. Commun. 31(13): 2959-2971 (2008) - [j1]Wei Li, Dawu Gu, Juanru Li:
Differential fault analysis on the ARIA algorithm. Inf. Sci. 178(19): 3727-3737 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 00:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint