Man-in-the-browser-cache: persisting HTTPS attacks via browser cache poisoning Y Jia, Y Chen, X Dong, P Saxena, J Mao, Z Liang computers & security 55, 62-80, 2015 | 54 | 2015 |
DroidVault: A trusted data vault for Android devices X Li, H Hu, G Bai, Y Jia, Z Liang, P Saxena 2014 19th International Conference on Engineering of Complex Computer …, 2014 | 52 | 2014 |
Web-to-application injection attacks on android: Characterization and detection B Hassanshahi, Y Jia, RHC Yap, P Saxena, Z Liang European Symposium on Research in Computer Security, 577-598, 2015 | 45 | 2015 |
I know where you've been: Geo-inference attacks via the browser cache Y Jia, X Dong, Z Liang, P Saxena IEEE Internet Computing 19 (1), 44-53, 2014 | 45 | 2014 |
" The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing Y Jia, ZL Chua, H Hu, S Chen, P Saxena, Z Liang Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 30 | 2016 |
Abusing CDNs for fun and profit: Security issues in CDNs' origin validation R Guo, J Chen, B Liu, J Zhang, C Zhang, H Duan, T Wan, J Jiang, S Hao, ... 2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS), 1-10, 2018 | 16 | 2018 |
{OblivP2P}: An Oblivious {Peer-to-Peer} Content Sharing System Y Jia, T Moataz, S Tople, P Saxena 25th USENIX Security Symposium (USENIX Security 16), 945-962, 2016 | 16 | 2016 |
Detecting injected behaviors in HTML5-based Android applications J Mao, R Wang, Y Chen, Y Jia Journal of High Speed Networks 22 (1), 15-34, 2016 | 14 | 2016 |
You can’t be me: Enabling trusted paths and user sub-origins in web browsers E Budianto, Y Jia, X Dong, P Saxena, Z Liang International Workshop on Recent Advances in Intrusion Detection, 150-171, 2014 | 13 | 2014 |
Toward exposing timing-based probing attacks in web applications J Mao, Y Chen, F Shi, Y Jia, Z Liang Sensors 17 (3), 464, 2017 | 11 | 2017 |
Anonymity in Peer-assisted CDNs: Inference Attacks and Mitigation. Y Jia, G Bai, P Saxena, Z Liang Proc. Priv. Enhancing Technol. 2016 (4), 294-314, 2016 | 7 | 2016 |
Automatic permission inference for hybrid mobile apps J Mao, H Ma, Y Chen, Y Jia, Z Liang Journal of High Speed Networks 22 (1), 55-64, 2016 | 7 | 2016 |
{PRO-ORAM}: Practical {Read-Only} Oblivious {RAM} S Tople, Y Jia, P Saxena 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 6 | 2019 |
Robust detection of android UI similarity J Mao, J Bian, H Ma, Y Jia, Z Liang, X Jiang 2018 IEEE International Conference on Communications (ICC), 1-6, 2018 | 4 | 2018 |
Robust Synchronous P2P Primitives Using SGX Enclaves. Y Jia, S Tople, T Moataz, D Gong, P Saxena, Z Liang IACR Cryptol. ePrint Arch. 2017, 180, 2017 | 4 | 2017 |
Traffickstop: Detecting and measuring illicit traffic monetization through large-scale dns analysis B Liu, Z Li, P Zong, C Lu, H Duan, Y Liu, S Alrwais, X Wang, S Hao, Y Jia, ... 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 560-575, 2019 | 3 | 2019 |
PRO-ORAM: constant latency read-only oblivious RAM S Tople, Y Jia, P Saxena Cryptology ePrint Archive, 2018 | 3 | 2018 |
A function-level behavior model for anomalous behavior detection in hybrid mobile applications J Mao, R Wang, Y Chen, Y Xiao, Y Jia, Z Liang 2016 International Conference on Identification, Information and Knowledge …, 2016 | 2 | 2016 |
Robust {P2P} Primitives Using {SGX} Enclaves Y Jia, S Tople, T Moataz, D Gong, P Saxena, Z Liang 23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020 | | 2020 |
I Know Where You’ve Been Y Jia, X Dong, Z Liang, P Saxena | | |