default search action
Chaoshun Zuo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c26]Pengcheng Ren, Chaoshun Zuo, Xiaofeng Liu, Wenrui Diao, Qingchuan Zhao, Shanqing Guo:
DEMISTIFY: Identifying On-device Machine Learning Models Stealing and Reuse Vulnerabilities in Mobile Apps. ICSE 2024: 41:1-41:13 - [c25]Yongliang Chen, Ruoqin Tang, Chaoshun Zuo, Xiaokuan Zhang, Lei Xue, Xiapu Luo, Qingchuan Zhao:
Attention! Your Copied Data is Under Monitoring: A Systematic Study of Clipboard Usage in Android Apps. ICSE 2024: 63:1-63:13 - 2023
- [c24]Pallavi Sivakumaran, Chaoshun Zuo, Zhiqiang Lin, Jorge Blasco:
Uncovering Vulnerabilities of Bluetooth Low Energy IoT from Companion Mobile Apps with Ble-Guuide. AsiaCCS 2023: 1004-1015 - [c23]Tao Ni, Jianfeng Li, Xiaokuan Zhang, Chaoshun Zuo, Wubing Wang, Weitao Xu, Xiapu Luo, Qingchuan Zhao:
Exploiting Contactless Side Channels in Wireless Charging Power Banks for User Privacy Inference via Few-shot Learning. MobiCom 2023: 73:1-73:15 - [c22]Md Sakib Anwar, Chaoshun Zuo, Carter Yagemann, Zhiqiang Lin:
Extracting Threat Intelligence From Cheat Binaries For Anti-Cheating. RAID 2023: 17-31 - [c21]Tao Ni, Xiaokuan Zhang, Chaoshun Zuo, Jianfeng Li, Zhenyu Yan, Wubing Wang, Weitao Xu, Xiapu Luo, Qingchuan Zhao:
Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels. SP 2023: 3399-3415 - [c20]Chaoshun Zuo, Chao Wang, Zhiqiang Lin:
A Peek into the Metaverse: Detecting 3D Model Clones in Mobile Games. USENIX Security Symposium 2023: 3925-3942 - 2022
- [c19]Qingchuan Zhao, Chaoshun Zuo, Jorge Blasco, Zhiqiang Lin:
PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals. AsiaCCS 2022: 521-533 - [c18]Yuqing Yang, Mohamed Elsabagh, Chaoshun Zuo, Ryan Johnson, Angelos Stavrou, Zhiqiang Lin:
Detecting and Measuring Misconfigured Manifests in Android Apps. CCS 2022: 3063-3077 - [c17]Chaoshun Zuo, Zhiqiang Lin:
Playing Without Paying: Detecting Vulnerable Payment Verification in Native Binaries of Unity Mobile Games. USENIX Security Symposium 2022: 3093-3110 - 2021
- [j2]Yue Zhang, Bayan Turkistani, Allen Yuqing Yang, Chaoshun Zuo, Zhiqiang Lin:
A Measurement Study of Wechat Mini-Apps. Proc. ACM Meas. Anal. Comput. Syst. 5(2): 14:1-14:25 (2021) - [c16]Yue Zhang, Bayan Turkistani, Allen Yuqing Yang, Chaoshun Zuo, Zhiqiang Lin:
A Measurement Study of Wechat Mini-Apps. SIGMETRICS (Abstracts) 2021: 19-20 - 2020
- [c15]Qingchuan Zhao, Chaoshun Zuo, Brendan Dolan-Gavitt, Giancarlo Pellegrino, Zhiqiang Lin:
Automatic Uncovering of Hidden Behaviors From Input Validation in Mobile Apps. SP 2020: 1106-1120 - [c14]Mohamed Elsabagh, Ryan Johnson, Angelos Stavrou, Chaoshun Zuo, Qingchuan Zhao, Zhiqiang Lin:
FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware. USENIX Security Symposium 2020: 2379-2396 - [c13]Zicheng Zhang, Wenrui Diao, Chengyu Hu, Shanqing Guo, Chaoshun Zuo, Li Li:
An empirical study of potentially malicious third-party libraries in Android apps. WISEC 2020: 144-154 - [i1]Yuxiang Luo, Cheng Zhang, Yunqi Zhang, Chaoshun Zuo, Dong Xuan, Zhiqiang Lin, Adam C. Champion, Ness B. Shroff:
ACOUSTIC-TURF: Acoustic-based Privacy-Preserving COVID-19 Contact Tracing. CoRR abs/2006.13362 (2020)
2010 – 2019
- 2019
- [c12]Chaoshun Zuo, Haohuang Wen, Zhiqiang Lin, Yinqian Zhang:
Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps. CCS 2019: 1469-1483 - [c11]Jiongyi Chen, Chaoshun Zuo, Wenrui Diao, Shuaike Dong, Qingchuan Zhao, Menghan Sun, Zhiqiang Lin, Yinqian Zhang, Kehuan Zhang:
Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users. DSN 2019: 222-233 - [c10]Qingchuan Zhao, Chaoshun Zuo, Giancarlo Pellegrino, Zhiqiang Lin:
Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services. NDSS 2019 - [c9]Chaoshun Zuo, Zhiqiang Lin, Yinqian Zhang:
Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps. IEEE Symposium on Security and Privacy 2019: 1296-1310 - [c8]Omar Alrawi, Chaoshun Zuo, Ruian Duan, Ranjita Pai Kasturi, Zhiqiang Lin, Brendan Saltaformaggio:
The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends. USENIX Security Symposium 2019: 551-566 - 2018
- [j1]Yang Liu, Chaoshun Zuo, Zonghua Zhang, Shanqing Guo, Xin-Shun Xu:
An automatically vetting mechanism for SSL error-handling vulnerability in android hybrid Web apps. World Wide Web 21(1): 127-150 (2018) - [c7]Jiongyi Chen, Wenrui Diao, Qingchuan Zhao, Chaoshun Zuo, Zhiqiang Lin, XiaoFeng Wang, Wing Cheong Lau, Menghan Sun, Ronghai Yang, Kehuan Zhang:
IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing. NDSS 2018 - 2017
- [c6]Chaoshun Zuo, Qingchuan Zhao, Zhiqiang Lin:
AUTHSCOPE: Towards Automatic Discovery of Vulnerable Authorizations in Online Services. CCS 2017: 799-813 - [c5]Chaoshun Zuo, Zhiqiang Lin:
SMARTGEN: Exposing Server URLs of Mobile Apps With Selective Symbolic Execution. WWW 2017: 867-876 - 2016
- [c4]Chaoshun Zuo, Wubing Wang, Zhiqiang Lin, Rui Wang:
Automatic Forgery of Cryptographically Consistent Messages to Identify Security Vulnerabilities in Mobile Services. NDSS 2016 - 2015
- [c3]Chaoshun Zuo, Jianliang Wu, Shanqing Guo:
Automatically Detecting SSL Error-Handling Vulnerabilities in Hybrid Mobile Web Apps. AsiaCCS 2015: 591-596 - [c2]Cuixia Yang, Chaoshun Zuo, Shanqing Guo, Chengyu Hu, Lizhen Cui:
UI Ripping in Android: Reverse Engineering of Graphical User Interfaces and its Application. CIC 2015: 160-167 - 2014
- [c1]Haibo Zhang, Chaoshun Zuo, Shanqing Guo, Lizhen Cui, Jun Chen:
SafeBrowsingCloud: Detecting Drive-by-Downloads Attack Using Cloud Computing Environment. IOV 2014: 292-303
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint