Follow
Juanru Li
Juanru Li
Verified email at sjtu.edu.cn - Homepage
Title
Cited by
Cited by
Year
From collision to exploitation: Unleashing use-after-free vulnerabilities in linux kernel
W Xu, J Li, J Shu, W Yang, T Xie, Y Zhang, D Gu
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1162015
Binary code clone detection across architectures and compiling configurations
Y Hu, Y Zhang, J Li, D Gu
2017 IEEE/ACM 25th International Conference on Program Comprehension (ICPC …, 2017
1112017
Smartshield: Automatic smart contract protection made easy
Y Zhang, S Ma, J Li, K Li, S Nepal, D Gu
2020 IEEE 27th International Conference on Software Analysis, Evolution and …, 2020
1052020
Differential fault analysis on the ARIA algorithm
W Li, D Gu, J Li
Information Sciences 178 (19), 3727-3737, 2008
1052008
Appspear: Bytecode decrypting and dex reassembling for packed android malware
W Yang, Y Zhang, J Li, J Shu, B Li, W Hu, D Gu
International Symposium on Recent Advances in Intrusion Detection, 359-381, 2015
1002015
Ethploit: From fuzzing to efficient exploit generation against smart contracts
Q Zhang, Y Wang, J Li, S Ma
2020 IEEE 27th International Conference on Software Analysis, Evolution and …, 2020
762020
Vulnerability assessment of oauth implementations in android applications
H Wang, Y Zhang, J Li, H Liu, W Yang, B Li, D Gu
Proceedings of the 31st annual computer security applications conference, 61-70, 2015
672015
Android malware forensics: Reconstruction of malicious events
J Li, D Gu, Y Luo
2012 32nd International Conference on Distributed Computing Systems …, 2012
662012
icryptotracer: Dynamic analysis on misuse of cryptography functions in ios applications
Y Li, Y Zhang, J Li, D Gu
Network and System Security: 8th International Conference, NSS 2014, Xi’an …, 2014
652014
Cross-architecture binary semantics understanding via similar code comparison
Y Hu, Y Zhang, J Li, D Gu
2016 IEEE 23rd international conference on software analysis, evolution, and …, 2016
562016
K-Hunt: Pinpointing insecure cryptographic keys from execution traces
J Li, Z Lin, J Caballero, Y Zhang, D Gu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
542018
Show Me the Money! Finding Flawed Implementations of Third-party In-app Payment in Android Apps.
W Yang, Y Zhang, J Li, H Liu, Q Wang, Y Zhang, D Gu
NDSS, 2017
542017
Binmatch: A semantics-based hybrid approach on binary code clone analysis
Y Hu, Y Zhang, J Li, H Wang, B Li, D Gu
2018 IEEE international conference on software maintenance and evolution …, 2018
482018
An empirical study of sms one-time password authentication in android apps
S Ma, R Feng, J Li, Y Liu, S Nepal, Diethelm, E Bertino, RH Deng, Z Ma, ...
Proceedings of the 35th annual computer security applications conference …, 2019
432019
Security analysis of third-party in-app payment in mobile applications
W Yang, J Li, Y Zhang, D Gu
Journal of Information Security and Applications 48, 102358, 2019
432019
Smart solution, poor protection: An empirical study of security and privacy issues in developing and deploying smart home devices
H Liu, C Li, X Jin, J Li, Y Zhang, D Gu
Proceedings of the 2017 Workshop on Internet of Things security and privacy …, 2017
422017
APKLancet: tumor payload diagnosis and purification for android applications
W Yang, J Li, Y Zhang, Y Li, J Shu, D Gu
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
412014
The achilles heel of OAuth: a multi-platform study of OAuth-based authentication
H Wang, Y Zhang, J Li, D Gu
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
372016
Annotating, tracking, and protecting cryptographic secrets with cryptompk
X Jin, X Xiao, S Jia, W Gao, D Gu, H Zhang, S Ma, Z Qian, J Li
2022 IEEE Symposium on Security and Privacy (SP), 650-665, 2022
302022
Detection and analysis of cryptographic data inside software
R Zhao, D Gu, J Li, R Yu
Information Security: 14th International Conference, ISC 2011, Xi’an, China …, 2011
292011
The system can't perform the operation now. Try again later.
Articles 1–20