[go: up one dir, main page]

Follow
Ronghai Yang
Ronghai Yang
Information Enginnering Department, The Chinese University of Hong Kong
Verified email at ie.cuhk.edu.hk - Homepage
Title
Cited by
Cited by
Year
IoTFuzzer: Discovering memory corruptions in IoT through app-based fuzzing.
J Chen, W Diao, Q Zhao, C Zuo, Z Lin, XF Wang, WC Lau, M Sun, R Yang, ...
NDSS, 1-15, 2018
5272018
Model-based security testing: An empirical study on oauth 2.0 implementations
R Yang, G Li, WC Lau, K Zhang, P Hu
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
852016
Application impersonation: problems of OAuth and API design in online social networks
P Hu, R Yang, Y Li, WC Lau
Proceedings of the second ACM conference on Online social networks, 271-278, 2014
492014
Scalable detection of promotional website defacements in black hat {SEO} campaigns
R Yang, X Wang, C Chi, D Wang, J He, S Pang, WC Lau
30th USENIX Security Symposium (USENIX Security 21), 3703-3720, 2021
372021
Vetting single {sign-on}{sdk} implementations via symbolic reasoning
R Yang, WC Lau, J Chen, K Zhang
27th USENIX Security Symposium (USENIX Security 18), 1459-1474, 2018
282018
Breaking and fixing mobile app authentication with OAuth2. 0-based protocols
R Yang, WC Lau, S Shi
International Conference on Applied Cryptography and Network Security, 313-335, 2017
222017
Signing into one billion mobile app accounts effortlessly with oauth2. 0
R Yang, WC Lau, T Liu
Black Hat Europe, 2016
222016
Search & catch: Detecting promotion infection in the underground through search engines
R Yang, J Liu, L Gu, Y Chen
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
82020
Make redirection evil again: Url parser issues in oauth
X Wang, WC Lau, R Yang, S Shi
BlackHat Asia 2019, 2019
72019
An empirical study on mobile payment credential leaks and their exploits
S Shi, X Wang, K Zeng, R Yang, WC Lau
International Conference on Security and Privacy in Communication Systems, 79-98, 2021
52021
Fingerprint-jacking: Practical fingerprint authorization hijacking in Android apps
X Wang, Y Chen, R Yang, S Shi, WC Lau
Blackhat, Europe, Tech. Rep. Blackhat 2020, 2020
52020
SWIDE: A Semantic-aware Detection Engine for Successful Web Injection Attacks
R Yang, X Wang, K Luo, X Lei, K Li, J Xin, WC Lau
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and …, 2024
12024
Solving Large Graph Problems in MapReduce-Like Frameworks via Optimized Parameter Configuration
H Xu, R Yang, Z Yang, WC Lau
International Conference on Algorithms and Architectures for Parallel …, 2015
12015
Security and Privacy of Single Sign-On Protocols: Vulnerability Analysis and Automated Testing
R Yang
PQDT-Global, 2017
2017
Model-based Security Testing
R Yang, G Li, WC Lau, K Zhang, P Hu
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–15