Demystifying Hidden Privacy Settings in Mobile Apps |
40th IEEE Symposium on Security and Privacy
|
Revery: from Proof-of-Concept to Exploitable (One Step towards Automatic Exploit Generation) |
ACM CCS 2018
|
Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS |
37th IEEE Symposium on Security and Privacy
|