Ronghai Yang
Ronghai Yang
Information Enginnering Department, The Chinese University of Hong Kong
Verified email at - Homepage
Cited by
Cited by
IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.
J Chen, W Diao, Q Zhao, C Zuo, Z Lin, XF Wang, WC Lau, M Sun, R Yang, ...
NDSS, 2018
Model-based security testing: An empirical study on oauth 2.0 implementations
R Yang, G Li, WC Lau, K Zhang, P Hu
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
Application impersonation: problems of OAuth and API design in online social networks
P Hu, R Yang, Y Li, WC Lau
Proceedings of the second ACM conference on Online social networks, 271-278, 2014
Breaking and fixing mobile app authentication with OAuth2. 0-based protocols
R Yang, WC Lau, S Shi
Applied Cryptography and Network Security: 15th International Conference …, 2017
Signing into one billion mobile app accounts effortlessly with oauth2. 0
R Yang, WC Lau, T Liu
Black Hat Europe, 2016
Scalable detection of promotional website defacements in black hat {SEO} campaigns
R Yang, X Wang, C Chi, D Wang, J He, S Pang, WC Lau
30th USENIX Security Symposium (USENIX Security 21), 3703-3720, 2021
Vetting Single {Sign-On}{SDK} Implementations via Symbolic Reasoning
R Yang, WC Lau, J Chen, K Zhang
27th USENIX Security Symposium (USENIX Security 18), 1459-1474, 2018
Search & catch: Detecting promotion infection in the underground through search engines
R Yang, J Liu, L Gu, Y Chen
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
Make redirection evil again: Url parser issues in oauth
X Wang, WC Lau, R Yang, S Shi
BlackHat Asia 2019, 2019
An empirical study on mobile payment credential leaks and their exploits
S Shi, X Wang, K Zeng, R Yang, WC Lau
Security and Privacy in Communication Networks: 17th EAI International …, 2021
Fingerprint-jacking: Practical fingerprint authorization hijacking in Android apps
X Wang, Y Chen, R Yang, S Shi, WC Lau
Blackhat, Europe, Tech. Rep. Blackhat 2020, 2020
Solving Large Graph Problems in MapReduce-Like Frameworks via Optimized Parameter Configuration
H Xu, R Yang, Z Yang, WC Lau
Algorithms and Architectures for Parallel Processing: 15th International …, 2015
Security and Privacy of Single Sign-On Protocols: Vulnerability Analysis and Automated Testing
R Yang
PQDT-Global, 2017
The system can't perform the operation now. Try again later.
Articles 1–13