Остановите войну!
for scientists:
default search action
Yinzhi Cao
- > Home > Persons > Yinzhi Cao
Publications
- 2023
- [j7]Ling Jin, Yinzhi Cao, Yan Chen, Di Zhang, Simone Campanoni:
ExGen: Cross-platform, Automated Exploit Generation for Smart Contract Vulnerabilities. IEEE Trans. Dependable Secur. Comput. 20(1): 650-664 (2023) - [j5]Xuechao Du, Xiang Pan, Yinzhi Cao, Boyuan He, Gan Fang, Yan Chen, Daigang Xu:
FlowCog: Context-Aware Semantic Extraction and Analysis of Information Flow Leaks in Android Apps. IEEE Trans. Mob. Comput. 22(11): 6460-6476 (2023) - 2018
- [c22]Xiang Pan, Yinzhi Cao, Xuechao Du, Boyuan He, Gan Fang, Rui Shao, Yan Chen:
FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps. USENIX Security Symposium 2018: 1669-1685 - 2016
- [c18]Xiang Pan, Yinzhi Cao, Shuangping Liu, Yu Zhou, Yan Chen, Tingzhe Zhou:
CSPAutoGen: Black-box Enforcement of Content Security Policy upon Real-world Websites. CCS 2016: 653-665 - 2015
- [c17]Yinzhi Cao, Xiang Pan, Yan Chen:
SafePay: Protecting against credit card forgery with existing magnetic card readers. CNS 2015: 164-172 - [c16]Yinzhi Cao, Yanick Fratantonio, Antonio Bianchi, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Yan Chen:
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework. NDSS 2015 - [c15]Xiang Pan, Yinzhi Cao, Yan Chen:
I Do Not Know What You Visited Last Summer: Protecting users from stateful third-party web tracking with TrackingFree browser. NDSS 2015 - [c14]Vaibhav Rastogi, Zhengyang Qu, Jedidiah McClurg, Yinzhi Cao, Yan Chen:
Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android. SecureComm 2015: 256-276 - [c12]Boyuan He, Vaibhav Rastogi, Yinzhi Cao, Yan Chen, V. N. Venkatakrishnan, Runqing Yang, Zhenrui Zhang:
Vetting SSL Usage in Applications with SSLINT. IEEE Symposium on Security and Privacy 2015: 519-534 - 2014
- [c11]Yinzhi Cao, Xiang Pan, Yan Chen, Jianwei Zhuge:
JShield: towards real-time and vulnerability-based detection of polluted drive-by download attacks. ACSAC 2014: 466-475 - [c10]Yinzhi Cao, Yan Shoshitaishvili, Kevin Borgolte, Christopher Krügel, Giovanni Vigna, Yan Chen:
Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel. RAID 2014: 276-298 - [c9]Yinzhi Cao, Chao Yang, Vaibhav Rastogi, Yan Chen, Guofei Gu:
Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-On Cross Site Scripting Attacks. SecureComm (1) 2014: 582-601 - 2013
- [j1]Yao Zhao, Yinzhi Cao, Yan Chen, Ming Zhang, Anup Goyal:
Rake: Semantics Assisted Network-Based Tracing Framework. IEEE Trans. Netw. Serv. Manag. 10(1): 3-14 (2013) - [c8]Yinzhi Cao, Vaibhav Rastogi, Zhichun Li, Yan Chen, Alexander Moshchuk:
Redefining web browser principals with a Configurable Origin Policy. DSN 2013: 1-12 - [c7]Xun Lu, Jianwei Zhuge, Ruoyu Wang, Yinzhi Cao, Yan Chen:
De-obfuscation and Detection of Malicious PDF Files with High Accuracy. HICSS 2013: 4890-4899 - 2012
- [c6]Yinzhi Cao, Zhichun Li, Vaibhav Rastogi, Yan Chen, Xitao Wen:
Virtual browser: a virtualized browser to sandbox third-party JavaScripts with enhanced security. AsiaCCS 2012: 8-9 - [c5]Yinzhi Cao, Vinod Yegneswaran, Phillip A. Porras, Yan Chen:
PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks. NDSS 2012 - 2011
- [c4]Yinzhi Cao, Vinod Yegneswaran, Phillip A. Porras, Yan Chen:
Poster: a path-cutting approach to blocking XSS worms in social web networks. CCS 2011: 745-748 - [c3]Yao Zhao, Yinzhi Cao, Yan Chen, Ming Zhang, Anup Goyal:
Rake: Semantics assisted network-based tracing framework. IWQoS 2011: 1-9 - [c2]Zhichun Li, Yi Tang, Yinzhi Cao, Vaibhav Rastogi, Yan Chen, Bin Liu, Clint Sbisa:
WebShield: Enabling Various Web Defense Techniques without Client Side Modifications. NDSS 2011 - 2010
- [c1]Yinzhi Cao, Zhichun Li, Vaibhav Rastogi, Yan Chen:
Virtual browser: a web-level sandbox to secure third-party JavaScript without sacrificing functionality. CCS 2010: 654-656
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-03-26 21:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint