Seminar Schedule
Spring 2021
Date | Speaker | Title | Conference | Download |
3.12 | Le Zhang | EarArray: Defending against DolphinAttack via Acoustic Attenuation | NDSS 2021 | PPT |
Haotian Hu | A Generic Technique for Automatically Finding Defense-Aware Code Reuse Attacks | CCS 2020 | PPT | |
3.19 | Binhan Xi | Security Analysis of the Democracy Live Online Voting System | USENIX 2021 | PPT |
3.26 | Ruoxu Yang | Security of GPS/INS based On-road Location Tracking Systems | NDSS 2019 | PPT |
Suibin Sun | DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels | CCS 2020 | PPT | |
4.2 | Chengyong-xiao Wei | PrivacyFlash Pro: Automating Privacy Policy Generation for Mobile Apps | NDSS 2021 | PPT |
4.9 | Hui Liu | Mind Your Weight(s): A Large-scale Study on Insufficient Machine Learning Model Protection in Mobile APPs | USENIX 2021 | |
Ya Fang | PriSEC: A Privacy Settings Enforcement Controller | USENIX 2021 | PPT | |
4.16 | Youqun Li | Tales of Favicons and Caches: Persistent Tracking in Modern Browsers | NDSS 2021 | PPT |
4.23 | Brandon Falk | |||
Yuxia Zhan | ||||
5.7 | Yan Meng | |||
5.14 | Shaofeng Li | |||
Tong Zhu | ||||
5.21 | Jiachun Li | |||
5.28 | Lu Zhou | |||
Le Yu | ||||
6.4 | Ke Tang | |||
6.11 | Tian Dong | |||
Zirui Peng | ||||
6.18 | Ren Zhou | |||
6.25 | Yichi Zhang | |||
Xinyu Wang |
Fall 2020
Date | Speaker | Title | Conference | Download |
9.11 | Le Zhang | Chaperone: Real-time Locking and Loss Prevention for Smartphones | USENIX 2020 | PPT |
Haotian Hu | Towards HTTPS Everywhere on Android: We Are Not There Yet | USENIX 2020 | PPT | |
9.18 | Binhan Xi | TKPERM: Cross-platform Permission Knowledge Transfer to Detect Overprivileged Third-party Applicaitons | NDSS 2020 | PPT |
9.25 | Le Yu | Sufficient Statistics | RAR | |
Jiachun Li | Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems | USENIX 2020 | PPT | |
10.9 | Youqun Li | Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses | S&P 2020 | PPT |
10.16 | Shaofeng Li | Information Leakage in Embedding Models | CCS 2020 | |
Brandon Falk | OcuLock: Exploring Human Visual Systemfor Authentication in Virtual RealityHead-mounted Display | NDSS 2021 | ||
10.23 | Yan Meng | Thwarting Replay Attacks and Their Defects | PPT | |
10.30 | Suibin Sun | Impersonation-as-a-Service: Characterizing the Emerging Criminal Infrastructure for User Impersonation at Scale | CCS 2020 | PPT |
Ruoxu Yang | Drift with Devil: Security of Multi-Sensor Fusion based Localization in High-Level Autonomous Driving under GPS Spoofing | USENIX 2020 | ||
11.6 | Lu Zhou | Plug N Pwned : Comprehensive Vulnerability Analysis of OBD II Dongles as A New Over the Air Attack Surface in Automotive IoT | USENIX 2020 | |
11.13 | Yichi Zhang | Brainstorm Section | ||
Chengyongxiao Wei | From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security | USENIX 2020 | ||
11.20 | Tong Zhu | FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware | USENIX 2020 | |
11.27 | Hui Liu | Adversarial Semantic Collisions | EMNLP 2020 | PPT |
Spring 2020
Date | Speaker | Title | Conference | Download |
2.14 | Lei Zhang | Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving | CCS 2020 | PPT |
Yichi Zhang | MadDroid: Characterizing and Detecting Devious Ad Contents for Android Apps | i3w 2020 | ||
2.21 | Xinyu Wang | Neural Network Inversionin Adversarial Setting via Background Knowledge Alignment | CCS 2019 | |
Chengyongxiao Wei | (Un)informed Consent: Studying GDPR Consent Notices in the Field | CCS 2019 | PPT | |
2.28 | Ke Tang | What Are You Searching For?A Remote Keylogging Attack on Search Engine Autocomplete | USENIX 2019 | PPT |
Le Yu | Location Privacy Protection in Vehicle-Based Spatial Crowdsourcing via Geo-Indistinguishability | ICDCS 2019 | PPT | |
3.6 | Shaofeng Li | Humpty Dumpty: Controlling Word Meanings via Corpus Poisoning* | Okland 2020 | PPT |
Lu Zhou | EASI: Edge-Based Sender Identification onResource-Constrained Platforms for Automotive Networks | NDSS2020 | PPT | |
3.13 | Suibin Sun | Into the Deep Web: Understanding E-commerceFraud from Autonomous Chat with Cybercriminals | NDSS2020 | PPT |
Tong Zhu | FraudDroid: Automated Ad Fraud Detection for Android APP | ESEC/FSE 2018 | PPT | |
3.20 | Ruoxu Yang | All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems | USENIX 2018 | PPT |
Jinlei Li | PEEVES: Physical Event Verification in Smart Homes | CCS 2019 | PPT | |
4.3 | Brandon Falk | Novel Encryption Method of GPS Information in Image File Using Format-preserving Encryption | IMIS 2019 | |
Yixiao Fei | Privacy Risks of Securing Machine Learning Models against Adversarial Examples | CCS 2019 | PPT | |
4.10 | Jiachun Li | PDVocal: Towards Privacy-preserving Parkinson’s Disease Detection using Non-speech Body Sounds | Mobicom 2019 | PPT |
Peilin Wu | Beyond Digital Domain: Fooling Deep learning Based Recognition System inPhysical World | AAAI 2020 | PPT | |
5.1 | Shufan Zhang | A Brief Tutorial on Sparse Vector Technique | ||
Binhan Xi | Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer | NDSS 2020 | PPT | |
5.8 | Lu Yan | ParmeSan: Sanitizer-guided Greybox Fuzzing | USENIX 2020 | |
Haotian Hu | Encrypted DNS =⇒ Privacy? A Traffic Analysis Perspective | NDSS 2020 | PPT | |
5.22 | Jiahao Yu | Certified Robustness to Adversarial Examples with Differential Privacy | S&P 2019 | PPT |
Hui Liu | Universal Adversarial Training | CVPR 2017 | PPT | |
5.29 | Ren Zhou | Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms | USENIX 2019 | PPT |
Autumn 2019
Date | Speaker | Title | Conference | Download |
10.11 | Ruoxu Yang | ORide: APrivacy-PreservingyetAccountableRide-HailingService | USENIX 2017 | PPT |
Suibin Sun | Business Email Phishing Detection and Characterizing | USENIX 2019 | PPT | |
10.18 | Jinlei Li | Looking from the Mirror: Evaluating IoT Device Security through Mobile Companion Apps | USENIX 2019 | PPT |
Brandon Falk | Data-Intensive Routing in Delay-Tolerant Networks | INFOCOM 2019 | PPT | |
10.25 | Yixiao Fei | Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures | USENIX 2020 | PPT |
Chengyongxiao Wei | Hearst Patterns Revisited: Automatic Hypernym Detection from Large Text Corpora | ACL 2018 | ||
11.1 | Peilin Wu | Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning | Okland 2020 | PPT |
Brandon Falk | VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones | INFOCOM 2019 | ||
11.15 | Suibin Sun | Multi-view clusteringand evaluations | PPT | |
Binhan Xi | Understanding Black-box Predictions via Influence Functions | ICML 2017 | ||
11.22 | Lei Zhang | Light Commands: Laser-Based Audio InjectionAttacks on Voice-Controllable Systems | PPT | |
Lu Yan | ProFuzzer: On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery | INFOCOM 2019 | ||
11.29 | Yichi Zhang | Understanding IOS-based Crowdturfing Through Hidden UI Analysis | USENIX 2019 | PPT |
Xinyu Wang | Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning | |||
12.6 | Zichang Wang | LibreCAN: Automated CAN Message Translator | CCS 2019 | PPT |
Le Yu | All Your Clicks Belong to Me: Investigating Click Interception on the Web | USENIX 2019 |
Spring 2019
Date | Speaker | Title | Conference | Download |
3.14 | Jinlei Li | Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services | NDSS 2019 | PPT PDF |
Suibin Sun | Yet Another Text Captcha Solver:A Generative Adversarial Network Based Approach | CCS 2018 | PPT | |
3.21 | Peilin Wu | ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android | CCS 2018 | PPT |
Shaofeng Li | Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks | IEEE S&P 2019 | PPT | |
3.28 | Xinyu Wang | ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models | NDSS 2019 | PPT |
Tong Zhu | MAPS: Scaling Privacy Compliance Analysis to a Million Apps | PoPETs 2019 | PPT | |
4.4 | Yan Meng | Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services | NDSS 2019 | PPT |
Yichi Zhang | Do Android Taint Analysis Tool Keep their Promises? | ESEC/FSE 2018 | PPT | |
4.11 | Tong Zhu | Can We Trust the Privacy Policies of Android Apps? | DSN 2016 | PPT |
Suibin Sun | Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach | CCS 2018 | PPT | |
4.18 | Ke Tang | IoTGuard Dynamic Enforcement of Security and Safety Policy in Commodity IoT | NDSS 2019 | PPT |
Lu Yan | Exploiting Unintended Feature Leakage in Collaborative Learning | IEEE S&P 2018 | PPT | |
4.25 | Le Yu | Differential Privacy | PPT | |
Yichi Zhang | A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through AppleWireless Direct Link (AWDL) | USENIX 2019 | PPT | |
5.2 | Chong Xiang | No-Jump-into-Latency in China’s Internet! Toward Last-Mile Hop Count Based IP Geo-localization | IWQoS 2019 | PPT |
5.9 | Zichang Wang | Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach | CCS 2018 | PPT |
Ruoxu Yang | On the Economics of Offline Password Cracking | IEEE S&P 2018 | PPT |