Follow
Juanru Li
Juanru Li
Verified email at sjtu.edu.cn - Homepage
Title
Cited by
Cited by
Year
Differential fault analysis on the ARIA algorithm
W Li, D Gu, J Li
Information Sciences 178 (19), 3727-3737, 2008
1032008
From collision to exploitation: Unleashing use-after-free vulnerabilities in linux kernel
W Xu, J Li, J Shu, W Yang, T Xie, Y Zhang, D Gu
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1022015
Appspear: Bytecode decrypting and dex reassembling for packed android malware
W Yang, Y Zhang, J Li, J Shu, B Li, W Hu, D Gu
International Symposium on Recent Advances in Intrusion Detection, 359-381, 2015
992015
Binary code clone detection across architectures and compiling configurations
Y Hu, Y Zhang, J Li, D Gu
2017 IEEE/ACM 25th International Conference on Program Comprehension (ICPC …, 2017
892017
Smartshield: Automatic smart contract protection made easy
Y Zhang, S Ma, J Li, K Li, S Nepal, D Gu
2020 IEEE 27th International Conference on Software Analysis, Evolution and …, 2020
832020
Android malware forensics: Reconstruction of malicious events
J Li, D Gu, Y Luo
2012 32nd International Conference on Distributed Computing Systems …, 2012
652012
Vulnerability assessment of oauth implementations in android applications
H Wang, Y Zhang, J Li, H Liu, W Yang, B Li, D Gu
Proceedings of the 31st annual computer security applications conference, 61-70, 2015
632015
icryptotracer: Dynamic analysis on misuse of cryptography functions in ios applications
Y Li, Y Zhang, J Li, D Gu
Network and System Security: 8th International Conference, NSS 2014, Xi’an …, 2014
572014
Ethploit: From fuzzing to efficient exploit generation against smart contracts
Q Zhang, Y Wang, J Li, S Ma
2020 IEEE 27th International Conference on Software Analysis, Evolution and …, 2020
552020
Cross-architecture binary semantics understanding via similar code comparison
Y Hu, Y Zhang, J Li, D Gu
2016 IEEE 23rd international conference on software analysis, evolution, and …, 2016
492016
Show Me the Money! Finding Flawed Implementations of Third-party In-app Payment in Android Apps.
W Yang, Y Zhang, J Li, H Liu, Q Wang, Y Zhang, D Gu
NDSS, 2017
482017
K-Hunt: Pinpointing insecure cryptographic keys from execution traces
J Li, Z Lin, J Caballero, Y Zhang, D Gu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
452018
Binmatch: A semantics-based hybrid approach on binary code clone analysis
Y Hu, Y Zhang, J Li, H Wang, B Li, D Gu
2018 IEEE international conference on software maintenance and evolution …, 2018
422018
APKLancet: tumor payload diagnosis and purification for android applications
W Yang, J Li, Y Zhang, Y Li, J Shu, D Gu
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
402014
Smart solution, poor protection: An empirical study of security and privacy issues in developing and deploying smart home devices
H Liu, C Li, X Jin, J Li, Y Zhang, D Gu
Proceedings of the 2017 Workshop on Internet of Things security and privacy …, 2017
362017
An empirical study of sms one-time password authentication in android apps
S Ma, R Feng, J Li, Y Liu, S Nepal, Diethelm, E Bertino, RH Deng, Z Ma, ...
Proceedings of the 35th annual computer security applications conference …, 2019
332019
Security analysis of third-party in-app payment in mobile applications
W Yang, J Li, Y Zhang, D Gu
Journal of Information Security and Applications 48, 102358, 2019
332019
The achilles heel of OAuth: a multi-platform study of OAuth-based authentication
H Wang, Y Zhang, J Li, D Gu
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
322016
Detection and analysis of cryptographic data inside software
R Zhao, D Gu, J Li, R Yu
Information Security: 14th International Conference, ISC 2011, Xi’an, China …, 2011
282011
AppSpear: Automating the hidden-code extraction and reassembling of packed android malware
B Li, Y Zhang, J Li, W Yang, D Gu
Journal of Systems and Software 140, 3-16, 2018
252018
The system can't perform the operation now. Try again later.
Articles 1–20