​
Login / Signup
Nan Zhang
ORCID
Publication Activity (10 Years)
Years Active: 2014-2024
Publications (10 Years): 14
Top Topics
Smart Home
Mobile Apps
Repertory Grid
Situation Aware
Top Venues
IEEE Symposium on Security and Privacy
CoRR
USENIX Security Symposium
CCS
</>
Publications
</>
Jianwei Zheng
,
Zhenhua Li
,
Feng Qian
,
Wei Liu
,
Hao Lin
,
Yunhao Liu
,
Tianyin Xu
,
Nan Zhang
,
Ju Wang
,
Cang Zhang
Rethinking Process Management for Interactive Mobile Systems.
MobiCom
(2024)
Yeonjoon Lee
,
Yue Zhao
,
Jiutian Zeng
,
Kwangwuk Lee
,
Nan Zhang
,
Faysal Hossain Shezan
,
Yuan Tian
,
Kai Chen
,
XiaoFeng Wang
Using Sonar for Liveness Detection to Protect Smart Speakers against Remote Attackers.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.
4 (1) (2020)
Yi Chen
,
Mingming Zha
,
Nan Zhang
,
Dandan Xu
,
Qianqian Zhao
,
Xuan Feng
,
Kan Yuan
,
Fnu Suya
,
Yuan Tian
,
Kai Chen
,
XiaoFeng Wang
,
Wei Zou
Demystifying Hidden Privacy Settings in Mobile Apps.
IEEE Symposium on Security and Privacy
(2019)
Nan Zhang
,
Xianghang Mi
,
Xuan Feng
,
XiaoFeng Wang
,
Yuan Tian
,
Feng Qian
Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems.
IEEE Symposium on Security and Privacy
(2019)
Nan Zhang
,
Xianghang Mi
,
Xuan Feng
,
XiaoFeng Wang
,
Yuan Tian
,
Feng Qian
Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home.
CoRR
(2018)
Yuan Tian
,
Nan Zhang
,
Yue-Hsun Lin
,
XiaoFeng Wang
,
Blase Ur
,
Xianzheng Guo
,
Patrick Tague
SmartAuth: User-Centered Authorization for the Internet of Things.
USENIX Security Symposium
(2017)
Xiaolong Bai
,
Luyi Xing
,
Nan Zhang
,
XiaoFeng Wang
,
Xiaojing Liao
,
Tongxin Li
,
Shi-Min Hu
Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos.
IEEE Secur. Priv.
15 (2) (2017)
Tongxin Li
,
Xueqiang Wang
,
Mingming Zha
,
Kai Chen
,
XiaoFeng Wang
,
Luyi Xing
,
Xiaolong Bai
,
Nan Zhang
,
Xinhui Han
Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews.
CCS
(2017)
Xiaolong Bai
,
Zhe Zhou
,
XiaoFeng Wang
,
Zhou Li
,
Xianghang Mi
,
Nan Zhang
,
Tongxin Li
,
Shi-Min Hu
,
Kehuan Zhang
Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment.
USENIX Security Symposium
(2017)
Yeonjoon Lee
,
Tongxin Li
,
Nan Zhang
,
Soteris Demetriou
,
Mingming Zha
,
XiaoFeng Wang
,
Kai Chen
,
Xiao-yong Zhou
,
Xinhui Han
,
Michael Grace
Ghost Installer in the Shadow: Security Analysis of App Installation on Android.
DSN
(2017)
Nan Zhang
,
Soteris Demetriou
,
Xianghang Mi
,
Wenrui Diao
,
Kan Yuan
,
Peiyuan Zong
,
Feng Qian
,
XiaoFeng Wang
,
Kai Chen
,
Yuan Tian
,
Carl A. Gunter
,
Kehuan Zhang
,
Patrick Tague
,
Yue-Hsun Lin
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be.
CoRR
(2017)
Soteris Demetriou
,
Nan Zhang
,
Yeonjoon Lee
,
XiaoFeng Wang
,
Carl A. Gunter
,
Xiao-yong Zhou
,
Michael Grace
Guardian of the HAN: Thwarting Mobile Attacks on Smart-Home Devices Using OS-level Situation Awareness.
CoRR
(2017)
Soteris Demetriou
,
Nan Zhang
,
Yeonjoon Lee
,
XiaoFeng Wang
,
Carl A. Gunter
,
Xiao-yong Zhou
,
Michael Grace
HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps.
WISEC
(2017)
Xiaolong Bai
,
Luyi Xing
,
Nan Zhang
,
XiaoFeng Wang
,
Xiaojing Liao
,
Tongxin Li
,
Shi-Min Hu
Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf.
IEEE Symposium on Security and Privacy
(2016)
Nan Zhang
,
Kan Yuan
,
Muhammad Naveed
,
Xiao-yong Zhou
,
XiaoFeng Wang
Leave Me Alone: App-Level Protection against Runtime Information Gathering on Android.
IEEE Symposium on Security and Privacy
(2015)
Yousra Aafer
,
Nan Zhang
,
Zhongwen Zhang
,
Xiao Zhang
,
Kai Chen
,
XiaoFeng Wang
,
Xiao-yong Zhou
,
Wenliang Du
,
Michael Grace
Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References.
CCS
(2015)
Kai Chen
,
Peng Wang
,
Yeonjoon Lee
,
XiaoFeng Wang
,
Nan Zhang
,
Heqing Huang
,
Wei Zou
,
Peng Liu
Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale.
USENIX Security Symposium
(2015)
Xiao-yong Zhou
,
Yeonjoon Lee
,
Nan Zhang
,
Muhammad Naveed
,
XiaoFeng Wang
The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations.
IEEE Symposium on Security and Privacy
(2014)