XiaoFeng Wang
XiaoFeng Wang
James H. Rudy Professor of Computer Science, Indiana University at Bloomington
Verified email at indiana.edu - Homepage
Cited by
Cited by
Effective and efficient malware detection at the end host.
C Kolbitsch, PM Comparetti, C Kruegel, E Kirda, X Zhou, XF Wang
USENIX security symposium 4 (1), 351-366, 2009
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones.
R Schlegel, K Zhang, X Zhou, M Intwala, A Kapadia, XF Wang
NDSS 11, 17-33, 2011
Side-channel leaks in web applications: A reality today, a challenge tomorrow
S Chen, R Wang, XF Wang, K Zhang
2010 IEEE Symposium on Security and Privacy, 191-206, 2010
The tangled web of password reuse.
A Das, J Bonneau, M Caesar, N Borisov, XF Wang
NDSS 14 (2014), 23-26, 2014
Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services
R Wang, S Chen, XF Wang
2012 IEEE Symposium on Security and Privacy, 365-379, 2012
Defending against denial-of-service attacks with puzzle auctions
XF Wang, MK Reiter
2003 Symposium on Security and Privacy, 2003., 78-92, 2003
Reinforcement learning to play an optimal Nash equilibrium in team Markov games
X Wang, T Sandholm
Advances in neural information processing systems, 1603-1610, 2003
Sedic: privacy-aware data intensive computing on hybrid clouds
K Zhang, X Zhou, Y Chen, XF Wang, Y Ruan
Proceedings of the 18th ACM conference on Computer and communications …, 2011
Learning your identity and disease from research papers: information leaks in genome wide association study
R Wang, YF Li, XF Wang, H Tang, X Zhou
Proceedings of the 16th ACM conference on Computer and communications …, 2009
Knowing your enemy: understanding and detecting malicious web advertising
Z Li, K Zhang, Y Xie, F Yu, XF Wang
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Privacy in the genomic era
M Naveed, E Ayday, EW Clayton, J Fellay, CA Gunter, JP Hubaux, ...
ACM Computing Surveys (CSUR) 48 (1), 1-44, 2015
Identity, location, disease and more: Inferring your secrets from android public resources
X Zhou, S Demetriou, D He, M Naveed, X Pan, XF Wang, CA Gunter, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Finding unknown malice in 10 seconds: Mass vetting for new threats at the google-play scale
K Chen, P Wang, Y Lee, XF Wang, N Zhang, H Huang, W Zou, P Liu
24th {USENIX} Security Symposium ({USENIX} Security 15), 659-674, 2015
Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX
W Wang, G Chen, X Pan, Y Zhang, XF Wang, V Bindschaedler, H Tang, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
How to Shop for Free Online--Security Analysis of Cashier-as-a-Service Based Web Stores
R Wang, S Chen, XF Wang, S Qadeer
Security and Privacy (SP), 2011 IEEE Symposium on, 465-480, 2011
Upgrading your android, elevating my malware: Privilege escalation through mobile os updating
L Xing, X Pan, R Wang, K Yuan, XF Wang
2014 IEEE Symposium on Security and Privacy, 393-408, 2014
Mitigating bandwidth-exhaustion attacks using congestion puzzles
XF Wang, MK Reiter
Proceedings of the 11th ACM conference on Computer and communications …, 2004
Privacy loss in apple's implementation of differential privacy on macos 10.12
J Tang, A Korolova, X Bai, X Wang, X Wang
arXiv preprint arXiv:1709.02753, 2017
Screenmilker: How to Milk Your Android Screen for Secrets.
CC Lin, H Li, X Zhou, XF Wang
NDSS, 2014
The peril of fragmentation: Security hazards in android device driver customizations
X Zhou, Y Lee, N Zhang, M Naveed, XF Wang
2014 IEEE Symposium on Security and Privacy, 409-423, 2014
The system can't perform the operation now. Try again later.
Articles 1–20