Login / Signup
Luyi Xing
ORCID
Publication Activity (10 Years)
Years Active: 2010-2024
Publications (10 Years): 31
Top Topics
Security Risks
Misuse Detection
Resource Management
Mobile Apps
Top Venues
CCS
USENIX Security Symposium
IEEE Symposium on Security and Privacy
CoRR
</>
Publications
</>
Yifan Zhang
,
Zhaojie Hu
,
Xueqiang Wang
,
Yuhui Hong
,
Yuhong Nan
,
XiaoFeng Wang
,
Jiatao Cheng
,
Luyi Xing
Navigating the Privacy Compliance Maze: Understanding Risks with Privacy-Configurable Mobile SDKs.
USENIX Security Symposium
(2024)
Hongbo Chen
,
Yifan Zhang
,
Xing Han
,
Huanyao Rong
,
Yuheng Zhang
,
Tianhao Mao
,
Hang Zhang
,
XiaoFeng Wang
,
Luyi Xing
,
Xun Chen
WitheredLeaf: Finding Entity-Inconsistency Bugs with LLMs.
CoRR
(2024)
Dexin Liu
,
Yue Xiao
,
Chaoqi Zhang
,
Kaitao Xie
,
Xiaolong Bai
,
Shikun Zhang
,
Luyi Xing
iHunter: Hunting Privacy Violations at Scale in the Software Supply Chain on iOS.
USENIX Security Symposium
(2024)
Haoran Lu
,
Yichen Liu
,
Xiaojing Liao
,
Luyi Xing
Towards Privacy-Preserving Social-Media SDKs on Android.
USENIX Security Symposium
(2024)
Yue Xiao
,
Zhengyi Li
,
Yue Qin
,
Xiaolong Bai
,
Jiale Guan
,
Xiaojing Liao
,
Luyi Xing
Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels.
USENIX Security Symposium
(2023)
Bin Yuan
,
Yuhan Wu
,
Maogen Yang
,
Luyi Xing
,
Xuchang Wang
,
Deqing Zou
,
Hai Jin
SmartPatch: Verifying the Authenticity of the Trigger-Event in the IoT Platform.
IEEE Trans. Dependable Secur. Comput.
20 (2) (2023)
Xueqiang Wang
,
Yifan Zhang
,
XiaoFeng Wang
,
Yan Jia
,
Luyi Xing
Union under Duress: Understanding Hazards of Duplicate Resource Mismediation in Android Software Supply Chain.
USENIX Security Symposium
(2023)
Yuhong Nan
,
Xueqiang Wang
,
Luyi Xing
,
Xiaojing Liao
,
Ruoyu Wu
,
Jianliang Wu
,
Yifan Zhang
,
XiaoFeng Wang
Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps.
USENIX Security Symposium
(2023)
Zihao Wang
,
Jiale Guan
,
XiaoFeng Wang
,
Wenhao Wang
,
Luyi Xing
,
Fares Alharbi
The Danger of Minimum Exposures: Understanding Cross-App Information Leaks on iOS through Multi-Side-Channel Learning.
CCS
(2023)
Zhi Li
,
Weijie Liu
,
Hongbo Chen
,
XiaoFeng Wang
,
Xiaojing Liao
,
Luyi Xing
,
Mingming Zha
,
Hai Jin
,
Deqing Zou
Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms.
IEEE Symposium on Security and Privacy
(2022)
Xin'an Zhou
,
Jiale Guan
,
Luyi Xing
,
Zhiyun Qian
Perils and Mitigation of Security Risks of Cooperation in Mobile-as-a-Gateway IoT.
CCS
(2022)
Ze Jin
,
Luyi Xing
,
Yiwei Fang
,
Yan Jia
,
Bin Yuan
,
Qixu Liu
P-Verifier: Understanding and Mitigating Security Risks in Cloud-based IoT Access Policies.
CCS
(2022)
Yijing Liu
,
Yan Jia
,
Qingyin Tan
,
Zheli Liu
,
Luyi Xing
How Are Your Zombie Accounts? Understanding Users' Practices and Expectations on Mobile App Account Deletion.
USENIX Security Symposium
(2022)
Yue Xiao
,
Zhengyi Li
,
Yue Qin
,
Xiaolong Bai
,
Jiale Guan
,
Xiaojing Liao
,
Luyi Xing
Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels at Scale.
CoRR
(2022)
Yan Jia
,
Bin Yuan
,
Luyi Xing
,
Dongfang Zhao
,
Yifan Zhang
,
XiaoFeng Wang
,
Yijing Liu
,
Kaimin Zheng
,
Peyton Crnjak
,
Yuqing Zhang
,
Deqing Zou
,
Hai Jin
Who's In Control? On Security Risks of Disjointed IoT Device Management Channels.
CCS
(2021)
Jice Wang
,
Yue Xiao
,
Xueqiang Wang
,
Yuhong Nan
,
Luyi Xing
,
Xiaojing Liao
,
Jinwei Dong
,
Nicolás Serrano
,
Haoran Lu
,
XiaoFeng Wang
,
Yuqing Zhang
Understanding Malicious Cross-library Data Harvesting on Android.
USENIX Security Symposium
(2021)
Liya Su
,
Xinyue Shen
,
Xiangyu Du
,
Xiaojing Liao
,
XiaoFeng Wang
,
Luyi Xing
,
Baoxu Liu
Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications.
USENIX Security Symposium
(2021)
Haoran Lu
,
Luyi Xing
,
Yue Xiao
,
Yifan Zhang
,
Xiaojing Liao
,
XiaoFeng Wang
,
Xueqiang Wang
Demystifying Resource Management Risks in Emerging Mobile App-in-App Ecosystems.
CCS
(2020)
Bin Yuan
,
Yan Jia
,
Luyi Xing
,
Dongfang Zhao
,
XiaoFeng Wang
,
Deqing Zou
,
Hai Jin
,
Yuqing Zhang
Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation.
USENIX Security Symposium
(2020)
Xiaolong Bai
,
Luyi Xing
,
Min Zheng
,
Fuping Qu
iDEA: Static Analysis on the Security of Apple Kernel Drivers.
CCS
(2020)
Tao Lv
,
Ruishi Li
,
Yi Yang
,
Kai Chen
,
Xiaojing Liao
,
XiaoFeng Wang
,
Peiwei Hu
,
Luyi Xing
RTFM! Automatic Assumption Discovery and Verification Derivation from Library Document for API Misuse Detection.
CCS
(2020)
Weijie Liu
,
Wenhao Wang
,
XiaoFeng Wang
,
Xiaozhu Meng
,
Yaosong Lu
,
Hongbo Chen
,
Xinyu Wang
,
Qingtao Shen
,
Kai Chen
,
Haixu Tang
,
Yi Chen
,
Luyi Xing
Confidential Attestation: Efficient in-Enclave Verification of Privacy Policy Compliance.
CoRR
(2020)
Yan Jia
,
Luyi Xing
,
Yuhang Mao
,
Dongfang Zhao
,
XiaoFeng Wang
,
Shangru Zhao
,
Yuqing Zhang
Burglars' IoT Paradise: Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds.
IEEE Symposium on Security and Privacy
(2020)
Yi Chen
,
Luyi Xing
,
Yue Qin
,
Xiaojing Liao
,
XiaoFeng Wang
,
Kai Chen
,
Wei Zou
Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation Analysis.
USENIX Security Symposium
(2019)
Xiaojing Liao
,
Sumayah A. Alrwais
,
Kan Yuan
,
Luyi Xing
,
XiaoFeng Wang
,
Shuang Hao
,
Raheem Beyah
Cloud repository as a malicious service: challenge, identification and implication.
Cybersecur.
1 (1) (2018)
Xiaolong Bai
,
Luyi Xing
,
Nan Zhang
,
XiaoFeng Wang
,
Xiaojing Liao
,
Tongxin Li
,
Shi-Min Hu
Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos.
IEEE Secur. Priv.
15 (2) (2017)
Tongxin Li
,
Xueqiang Wang
,
Mingming Zha
,
Kai Chen
,
XiaoFeng Wang
,
Luyi Xing
,
Xiaolong Bai
,
Nan Zhang
,
Xinhui Han
Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews.
CCS
(2017)
Xiaojing Liao
,
Sumayah A. Alrwais
,
Kan Yuan
,
Luyi Xing
,
XiaoFeng Wang
,
Shuang Hao
,
Raheem A. Beyah
Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service.
CCS
(2016)
Xiaojing Liao
,
Kan Yuan
,
XiaoFeng Wang
,
Zhongyu Pei
,
Hao Yang
,
Jianjun Chen
,
Hai-Xin Duan
,
Kun Du
,
Eihal Alowaisheq
,
Sumayah A. Alrwais
,
Luyi Xing
,
Raheem A. Beyah
Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search.
IEEE Symposium on Security and Privacy
(2016)
Xiaojing Liao
,
Kan Yuan
,
XiaoFeng Wang
,
Zhou Li
,
Luyi Xing
,
Raheem A. Beyah
Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence.
CCS
(2016)
Xiaolong Bai
,
Luyi Xing
,
Nan Zhang
,
XiaoFeng Wang
,
Xiaojing Liao
,
Tongxin Li
,
Shi-Min Hu
Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf.
IEEE Symposium on Security and Privacy
(2016)
Luyi Xing
,
Xiaolong Bai
,
Tongxin Li
,
XiaoFeng Wang
,
Kai Chen
,
Xiaojing Liao
,
Shi-Min Hu
,
Xinhui Han
Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS.
CCS
(2015)
Luyi Xing
,
Xiaolong Bai
,
Tongxin Li
,
XiaoFeng Wang
,
Kai Chen
,
Xiaojing Liao
,
Shi-Min Hu
,
Xinhui Han
Unauthorized Cross-App Resource Access on MAC OS X and iOS.
CoRR
(2015)
Tongxin Li
,
Xiao-yong Zhou
,
Luyi Xing
,
Yeonjoon Lee
,
Muhammad Naveed
,
XiaoFeng Wang
,
Xinhui Han
Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services.
CCS
(2014)
Luyi Xing
,
Xiaorui Pan
,
Rui Wang
,
Kan Yuan
,
XiaoFeng Wang
Upgrading Your Android, Elevating My Malware: Privilege Escalation through Mobile OS Updating.
IEEE Symposium on Security and Privacy
(2014)
Rui Wang
,
Luyi Xing
,
XiaoFeng Wang
,
Shuo Chen
Unauthorized origin crossing on mobile platforms: threats and mitigation.
CCS
(2013)
Luyi Xing
,
Yangyi Chen
,
XiaoFeng Wang
,
Shuo Chen
InteGuard: Toward Automatic Protection of Third-Party Web Service Integrations.
NDSS
(2013)
Luyi Xing
,
Yuqing Zhang
,
Shenlong Chen
A Client-Based and Server-Enhanced Defense Mechanism for Cross-Site Request Forgery.
RAID
(2010)