Volgen
Song Li
Song Li
Geverifieerd e-mailadres voor zju.edu.cn - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
(Cross-) browser fingerprinting via OS and hardware level features
Y Cao, S Li, E Wijmans
Proceedings 2017 Network and Distributed System Security Symposium, 2017
1642017
Detecting node. js prototype pollution vulnerabilities via object lookup analysis
S Li, M Kang, J Hou, Y Cao
Proceedings of the 29th ACM Joint Meeting on European Software Engineering …, 2021
532021
Mining Node. js Vulnerabilities via Object Dependence Graph and Query
S Li, M Kang, J Hou, Y Cao
31th USENIX Security Symposium 22, 2022
472022
Deterministic browser
Y Cao, Z Chen, S Li, S Wu
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
402017
Rendered private: Making {GLSL} execution uniform to prevent {WebGL-based} browser fingerprinting
S Wu, S Li, Y Cao, N Wang
28th USENIX Security Symposium (USENIX Security 19), 1645-1660, 2019
342019
Probe the Proto: Measuring Client-Side Prototype Pollution Vulnerabilities of One Million Real-world Websites
Z Kang, S Li, Y Cao
NDSS '22, 2022
222022
Who touched my browser fingerprint? a large-scale measurement study and classification of fingerprint dynamics
S Li, Y Cao
Proceedings of the ACM Internet Measurement Conference, 370-385, 2020
212020
Scaling javascript abstract interpretation to detect and exploit node. js taint-style vulnerability
M Kang, Y Xu, S Li, R Gjomemo, J Hou, VN Venkatakrishnan, Y Cao
2023 IEEE Symposium on Security and Privacy (SP), 1059-1076, 2023
122023
CoCo: Efficient Browser Extension Vulnerability Detection via Coverage-guided, Concurrent Abstract Interpretation
J Yu, S Li, J Zhu, Y Cao
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
82023
Towards Making JavaScript Applications Secure and Private
S Li
Johns Hopkins University, 2022
22022
Sensitive Behavioral Chain-focused Android Malware Detection Fused with AST Semantics
J Gong, W Niu, S Li, M Zhang, X Zhang
IEEE Transactions on Information Forensics and Security, 2024
2024
GraphTunnel: Robust DNS Tunnel Detection Based on DNS Recursive Resolution Graph
G Gao, W Niu, J Gong, D Gu, S Li, M Zhang, X Zhang
IEEE Transactions on Information Forensics and Security, 2024
2024
Assessing thresholds of resistance prevalence at which empiric treatment of gonorrhea should change among men who have sex with men in the US: A cost-effectiveness analysis
X Yin, Y Li, MM Rönn, S Li, Y Yuan, TL Gift, K Hsu, JA Salomon, YH Grad, ...
Plos Medicine 21 (7), e1004424, 2024
2024
What’s the Real: A Novel Design Philosophy for Robust AI-Synthesized Voice Detection
X Hai, X Liu, Y Tan, G Liu, S Li, W Niu, R Zhou, X Zhou
ACM Multimedia 2024, 2024
2024
GraphTrack: A Graph-based Cross-Device Tracking Framework
B Wang, T Zhou, S Li, Y Cao, N Gong
ACM ASIA Conference on Computer and Communications Security, 2022
2022
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–15