Login / Signup
Yuhong Nan
ORCID
Publication Activity (10 Years)
Years Active: 2015-2024
Publications (10 Years): 27
Top Topics
Mobile Applications
Low Energy
Unsupervised Learning
Static Analysis
Top Venues
USENIX Security Symposium
NDSS
CoRR
ISSTA
</>
Publications
</>
Yifan Zhang
,
Zhaojie Hu
,
Xueqiang Wang
,
Yuhui Hong
,
Yuhong Nan
,
XiaoFeng Wang
,
Jiatao Cheng
,
Luyi Xing
Navigating the Privacy Compliance Maze: Understanding Risks with Privacy-Configurable Mobile SDKs.
USENIX Security Symposium
(2024)
Zian Jia
,
Yun Xiong
,
Yuhong Nan
,
Yao Zhang
,
Jinjing Zhao
,
Mi Wen
MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning.
USENIX Security Symposium
(2024)
Zeqin Liao
,
Yuhong Nan
,
Henglong Liang
,
Sicheng Hao
,
Juan Zhai
,
Jiajing Wu
,
Zibin Zheng
SmartAxe: Detecting Cross-Chain Vulnerabilities in Bridge Smart Contracts via Fine-Grained Static Analysis.
Proc. ACM Softw. Eng.
1 (FSE) (2024)
Zhijie Zhong
,
Zibin Zheng
,
Hong-Ning Dai
,
Qing Xue
,
Junjia Chen
,
Yuhong Nan
PrettySmart: Detecting Permission Re-delegation Vulnerability for Token Behaviors in Smart Contracts.
ICSE
(2024)
Zeqin Liao
,
Sicheng Hao
,
Yuhong Nan
,
Zibin Zheng
SmartState: Detecting State-Reverting Vulnerabilities in Smart Contracts via Fine-Grained State-Dependency Analysis.
CoRR
(2024)
Zeqin Liao
,
Yuhong Nan
,
Henglong Liang
,
Sicheng Hao
,
Juan Zhai
,
Jiajing Wu
,
Zibin Zheng
SmartAxe: Detecting Cross-Chain Vulnerabilities in Bridge Smart Contracts via Fine-Grained Static Analysis.
CoRR
(2024)
Sicheng Hao
,
Yuhong Nan
,
Zibin Zheng
,
Xiaohui Liu
SmartCoCo: Checking Comment-Code Inconsistency in Smart Contracts via Constraint Propagation and Binding.
ASE
(2023)
Mingxi Ye
,
Yuhong Nan
,
Zibin Zheng
,
Dongpeng Wu
,
Huizhong Li
Detecting State Inconsistency Bugs in DApps via On-Chain Transaction Replay and Fuzzing.
ISSTA
(2023)
Zian Jia
,
Yun Xiong
,
Yuhong Nan
,
Yao Zhang
,
Jinjing Zhao
,
Mi Wen
MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning.
CoRR
(2023)
Zhaoxin Cai
,
Yuhong Nan
,
Xueqiang Wang
,
Mengyi Long
,
Qihua Ou
,
Min Yang
,
Zibin Zheng
DARPA: Combating Asymmetric Dark UI Patterns on Android with Run-time View Decorator.
DSN
(2023)
Yuhong Nan
,
Xueqiang Wang
,
Luyi Xing
,
Xiaojing Liao
,
Ruoyu Wu
,
Jianliang Wu
,
Yifan Zhang
,
XiaoFeng Wang
Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps.
USENIX Security Symposium
(2023)
Zeqin Liao
,
Sicheng Hao
,
Yuhong Nan
,
Zibin Zheng
SmartState: Detecting State-Reverting Vulnerabilities in Smart Contracts via Fine-Grained State-Dependency Analysis.
ISSTA
(2023)
Hailun Ding
,
Juan Zhai
,
Yuhong Nan
,
Shiqing Ma
AIRTAG: Towards Automated Attack Investigation by Unsupervised Learning with Log Texts.
USENIX Security Symposium
(2023)
Mengyi Long
,
Yue Xu
,
Jiangrong Wu
,
Qihua Ou
,
Yuhong Nan
Understanding Dark UI Patterns in the Mobile Ecosystem: A Case Study of Apps in China.
SaTS@CCS
(2023)
Ziyi Zhou
,
Xing Han
,
Zeyuan Chen
,
Yuhong Nan
,
Juanru Li
,
Dawu Gu
SIMulation: Demystifying (Insecure) Cellular Network based One-Tap Authentication Services.
DSN
(2022)
Mingming Zha
,
Jice Wang
,
Yuhong Nan
,
Xiaofeng Wang
,
Yuqing Zhang
,
Zelin Yang
Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems.
NDSS
(2022)
Zeqin Liao
,
Zibin Zheng
,
Xiao Chen
,
Yuhong Nan
SmartDagger: a bytecode-based static analysis approach for detecting cross-contract vulnerability.
ISSTA
(2022)
Fei Wang
,
Jianliang Wu
,
Yuhong Nan
,
Yousra Aafer
,
Xiangyu Zhang
,
Dongyan Xu
,
Mathias Payer
ProFactory: Improving IoT Security via Formalized Protocol Customization.
USENIX Security Symposium
(2022)
Jianzhong Su
,
Jiyi Liu
,
Yuhong Nan
,
Yin Li
Security Evaluation of Smart Contracts based on Code and Transaction - A Survey.
ICSS
(2022)
Zeyu Lei
,
Yuhong Nan
,
Yanick Fratantonio
,
Antonio Bianchi
On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices.
NDSS
(2021)
Jice Wang
,
Yue Xiao
,
Xueqiang Wang
,
Yuhong Nan
,
Luyi Xing
,
Xiaojing Liao
,
Jinwei Dong
,
Nicolás Serrano
,
Haoran Lu
,
XiaoFeng Wang
,
Yuqing Zhang
Understanding Malicious Cross-library Data Harvesting on Android.
USENIX Security Symposium
(2021)
Abdulellah Alsaheel
,
Yuhong Nan
,
Shiqing Ma
,
Le Yu
,
Gregory Walkup
,
Z. Berkay Celik
,
Xiangyu Zhang
,
Dongyan Xu
ATLAS: A Sequence-based Learning Approach for Attack Investigation.
USENIX Security Symposium
(2021)
Jianliang Wu
,
Yuhong Nan
,
Vireshwar Kumar
,
Mathias Payer
,
Dongyan Xu
BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks.
RAID
(2020)
Jianliang Wu
,
Yuhong Nan
,
Vireshwar Kumar
,
Dave (Jing) Tian
,
Antonio Bianchi
,
Mathias Payer
,
Dongyan Xu
BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy.
WOOT @ USENIX Security Symposium
(2020)
Yuhong Nan
,
Zhemin Yang
,
Xiaofeng Wang
,
Yuan Zhang
,
Donglai Zhu
,
Min Yang
Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps.
NDSS
(2018)
Geng Hong
,
Zhemin Yang
,
Sen Yang
,
Lei Zhang
,
Yuhong Nan
,
Zhibo Zhang
,
Min Yang
,
Yuan Zhang
,
Zhiyun Qian
,
Hai-Xin Duan
How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World.
CCS
(2018)
Yuhong Nan
,
Zhemin Yang
,
Min Yang
,
Shunfan Zhou
,
Yuan Zhang
,
Guofei Gu
,
Xiaofeng Wang
,
Limin Sun
Identifying User-Input Privacy in Mobile Applications at a Large Scale.
IEEE Trans. Inf. Forensics Secur.
12 (3) (2017)
Yuhong Nan
,
Min Yang
,
Zhemin Yang
,
Shunfan Zhou
,
Guofei Gu
,
Xiaofeng Wang
UIPicker: User-Input Privacy Identification in Mobile Applications.
USENIX Security Symposium
(2015)