Yuan Zhang
Fudan University
H-index: 19
Asia-China
Top articles of Yuan Zhang
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Aem: Facilitating cross-version exploitability assessment of linux kernel vulnerabilities | Zheyue Jiang Yuan Zhang Jun Xu Xinqian Sun Zhuang Liu | 2023/5/21 | |
Remote Code Execution from {SSTI} in the Sandbox: Automatically Detecting and Exploiting Template Escape Bugs | Yudi Zhao Yuan Zhang Min Yang | 2023 | |
Trusteddomain compromise attack in app-in-app ecosystems | Zhibo Zhang Zhangyue Zhang Keke Lian Guangliang Yang Lei Zhang | 2023/11/26 | |
NestFuzz: Enhancing Fuzzing with Comprehensive Understanding of Input Processing Logic | Peng Deng Zhemin Yang Lei Zhang Guangliang Yang Wenzheng Hong | 2023/11/15 | |
Understanding the (in) security of cross-side face verification systems in mobile apps: a system perspective | Xiaohan Zhang Haoqi Ye Ziqi Huang Xiao Ye Yinzhi Cao | 2023/5/21 | |
Understanding the practice of security patch management across multiple branches in oss projects | Xin Tan Yuan Zhang Jiajun Cao Kun Sun Mi Zhang | 2022/4/25 | |
Slowing down the aging of learning-based malware detectors with api knowledge | IEEE Transactions on Dependable and Secure Computing | Xiaohan Zhang Mi Zhang Yuan Zhang Ming Zhong Xin Zhang | 2022/1/25 |
Identity confusion in {WebView-based} mobile app-in-app ecosystems | Lei Zhang Zhibo Zhang Ancong Liu Yinzhi Cao Xiaohan Zhang | 2022 | |
Precise (Un) Affected Version Analysis for Web Vulnerabilities | Youkun Shi Yuan Zhang Tianhan Luo Xiangyu Mao Min Yang | 2022/10/10 | |
Backporting security patches of web applications: A prototype design and implementation on injection vulnerability patches | Youkun Shi Yuan Zhang Tianhan Luo Xiangyu Mao Yinzhi Cao | 2022 | |
Refcount Field Identification for Linux Kernel Based on Deep Learning. | International Journal of Sustainable Development & Planning | Xin Tan Xiyu Yang Jiajun Cao Yuan Zhang | 2022/8/1 |
Exploit the last straw that breaks android systems | Lei Zhang Keke Lian Haoyu Xiao Zhibo Zhang Peng Liu | 2022/5/22 | |
Locating the security patches for disclosed oss vulnerabilities with vulnerability-commit correlation ranking | Xin Tan Yuan Zhang Chenyuan Mi Jiajun Cao Kun Sun | 2021/11/12 | |
Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking | Xin Tan Yuan Zhang Xiyu Yang Kangjie Lu Min Yang | 2021/8/11 | |
Facilitating vulnerability assessment through poc migration | Jiarun Dai Yuan Zhang Hailong Xu Haiming Lyu Zicheng Wu | 2021/11/12 | |
Hybrid malware detection approach with feedback-directed machine learning | Information Sciences | Yuan Zhang Zhibo Wang | 2020/3 |
{BScout}: Direct whole patch presence test for java executables | Jiarun Dai Yuan Zhang Zheyue Jiang Yingtian Zhou Junyan Chen | 2020 | |
Pdiff: Semantic-based patch presence testing for downstream kernels | Zheyue Jiang Yuan Zhang Jun Xu Qi Wen Zhenghe Wang | 2020/10/30 | |
An ever-evolving game: Evaluation of real-world attacks and defenses in ethereum ecosystem | Shunfan Zhou Malte Möser Zhemin Yang Ben Adida Thorsten Holz | 2020 | |
Enhancing state-of-the-art classifiers with api semantics to detect evolved android malware | Xiaohan Zhang Yuan Zhang Ming Zhong Daizong Ding Yinzhi Cao | 2020/10/30 |