[go: up one dir, main page]

Follow
CHENXIONG QIAN
Title
Cited by
Cited by
Year
Cloak and dagger: from two permissions to complete control of the UI feedback loop
Y Fratantonio, C Qian, SP Chung, W Lee
2017 IEEE Symposium on Security and Privacy (SP), 1041-1057, 2017
1832017
Enforcing unique code target property for control-flow integrity
H Hu, C Qian, C Yagemann, SPH Chung, WR Harris, T Kim, W Lee
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1792018
Efficient protection of {Path-Sensitive} control security
R Ding, C Qian, C Song, B Harris, T Kim, W Lee
26th USENIX Security Symposium (USENIX Security 17), 131-148, 2017
1672017
{RAZOR}: A framework for post-deployment software debloating
C Qian, H Hu, M Alharthi, PH Chung, T Kim, W Lee
28th USENIX security symposium (USENIX Security 19), 1733-1750, 2019
1582019
Towards a scalable resource-driven approach for detecting repackaged android applications
Y Shao, X Luo, C Qian, P Zhu, L Zhang
Proceedings of the 30th Annual Computer Security Applications Conference, 56-65, 2014
1552014
On tracking information flows through jni in android applications
C Qian, X Luo, Y Shao, ATS Chan
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
1252014
Precise and scalable detection of double-fetch bugs in OS kernels
M Xu, C Qian, K Lu, M Backes, T Kim
2018 IEEE Symposium on Security and Privacy (SP), 661-678, 2018
1192018
Toward engineering a secure android ecosystem: A survey of existing techniques
M Xu, C Song, Y Ji, MW Shih, K Lu, C Zheng, R Duan, Y Jang, B Lee, ...
ACM Computing Surveys (CSUR) 49 (2), 1-47, 2016
1162016
Enhancing the description-to-behavior fidelity in android apps with privacy policy
L Yu, X Luo, C Qian, S Wang, HKN Leung
IEEE Transactions on Software Engineering 44 (9), 834-854, 2017
802017
Ndroid: Toward tracking information flows across multiple android contexts
L Xue, C Qian, H Zhou, X Luo, Y Zhou, Y Shao, ATS Chan
IEEE Transactions on Information Forensics and Security 14 (3), 814-828, 2018
772018
Slimium: debloating the chromium browser with feature subsetting
C Qian, H Koo, CS Oh, T Kim, W Lee
Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020
652020
Rootguard: Protecting rooted android phones
Y Shao, X Luo, C Qian
Computer 47 (6), 32-40, 2014
632014
Vulhunter: toward discovering vulnerabilities in android applications
C Qian, X Luo, Y Le, G Gu
IEEE Micro 35 (1), 44-53, 2015
562015
Rampart: Protecting Web Applications from {CPU-Exhaustion}{Denial-of-Service} Attacks
W Meng, C Qian, S Hao, K Borgolte, G Vigna, C Kruegel, W Lee
27th USENIX Security Symposium (USENIX Security 18), 393-410, 2018
432018
Revisiting the description-to-behavior fidelity in android applications
L Yu, X Luo, C Qian, S Wang
2016 IEEE 23rd International Conference on Software Analysis, Evolution, and …, 2016
412016
Androidperf: A cross-layer profiling system for android applications
L Xue, C Qian, X Luo
2015 IEEE 23rd International Symposium on Quality of Service (IWQoS), 115-124, 2015
212015
Revisiting automotive attack surfaces: A practitioners’ perspective
P Jing, Z Cai, Y Cao, L Yu, Y Du, W Zhang, C Qian, X Luo, S Nie, S Wu
2024 IEEE Symposium on Security and Privacy (SP), 2348-2365, 2024
192024
Unearthing gas-wasting code smells in smart contracts with large language models
J Jiang, Z Li, H Qin, M Jiang, X Luo, X Wu, H Wang, Y Tang, C Qian, ...
IEEE Transactions on Software Engineering, 2024
142024
Scaling agents via continual pre-training
L Su, Z Zhang, G Li, Z Chen, C Wang, M Song, X Wang, K Li, J Wu, ...
arXiv preprint arXiv:2509.13310, 2025
102025
CydiOS: A Model-Based Testing Framework for iOS Apps
S Wu, J Li, H Zhou, Y Fang, K Zhao, H Wang, C Qian, X Luo
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
92023
The system can't perform the operation now. Try again later.
Articles 1–20