Dao

@dao0x

Research Assistant Professor at CUHK, doing security/system/network research.

Hong Kong
Vrijeme pridruživanja: lipanj 2012.

Tweetovi

Blokirali ste korisnika/cu @dao0x

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @dao0x

  1. Prikvačeni tweet
    29. stu 2019.

    If you are an oversea (non-mainland/HK) student, and want to pursue PhD in mobile/blockchain/vulnerability security research at the Chinese University of Hong Kong. Feel free to contact me. More details are attached and available in

    Poništi
  2. proslijedio/la je Tweet
    29. stu 2019.

    If you are an oversea (non-mainland/HK) student, and want to pursue PhD in mobile/blockchain/vulnerability security research at the Chinese University of Hong Kong. Feel free to contact me. More details are attached and available in

    Poništi
  3. 11. ruj 2019.

    I'd like to advertise a little bit about our recent technical report on fuzzing Android systems' VoIP components: Seems google search cannot index this link. It is actually the first public paper after I joined CUHK IE in mid Aug. :)

    Poništi
  4. 9. srp 2019.

    Thx. My slides are available at If you need an original PPT version, pls check it at my homepage. We plan to release our dataset after finishing the on-going journal extension. Stay tuned!

    Poništi
  5. 8. srp 2019.

    All AsiaCCS'19 paper are available at

    Poništi
  6. 22. svi 2019.

    I am very excited to share that I have successfully passed my PhD dissertation defense today! :) After staying at Singapore for four years (actually 3.5 years till this Aug due to an oversea internship), I can finally go back to Hong Kong to start my new career.

    Poništi
  7. 17. svi 2019.

    DSN 2019 accepted papers and programs: Surprising to see no mobile security papers involved :) Two sessions for machine learning security.

    Poništi
  8. 5. svi 2019.
    Poništi
  9. 15. tra 2019.

    Glad to share that our paper, titled "An Empirical Study of Mobile Network Behavior and Application Performance in the Wild", has been accepted by 2019. This paper empirically analyzed a two-year per-app mobile network dataset via our MopEye app (USENIX ATC'17)

    Poništi
  10. 12. tra 2019.

    I am more than happy to share that I will join Chinese University of Hong Kong (CUHK) as Research Assistant Professor in Aug 2019. Feel free to ask me to review papers, lol. :) I will focus on vulnerability and privacy research in the domains of mobile, web, and smart contracts.

    Poništi
  11. 9. tra 2019.

    I am glad to share that our paper, entitled "Towards Understanding Android System Vulnerabilities: Techniques and Insights", has been accepted by . Basically we did an empirical study of 2,179 vulnerabilities on the Android Security Bulletin program over ~three years.

    Poništi
  12. 1. ožu 2019.

    The slides of our 2019 paper, "Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment", might be interested by industry security people.

    Prikaži ovu nit
    Poništi
  13. 27. velj 2019.

    The slides of my talk on open ports in Android apps are available here: Also the pdf version: Received five interesting questions yesterday in Q&A. Hope you enjoyed!

    Prikaži ovu nit
    Poništi
  14. 18. velj 2019.

    After ChangeDetector shutdowns, I lost a little happiness to track the latest accepted papers from different researchers' homepages via Feedly... Any alternative web service? (Visual ping is quite bad...)

    Poništi
  15. 20. sij 2019.

    2019 accepted papers: The program looks great this year! It is a pity that I had the chance but didn't submit my paper.

    Poništi
  16. 18. pro 2018.

    The key of our approach is to employ crowdsourcing, instead of static analysis, for the open port discovery, and use static analysis only for the diagnosis of discovered open ports. Our crowdsourcing app, NetMon, is available at

    Prikaži ovu nit
    Poništi
  17. 18. pro 2018.

    our paper on Open Ports in Android Apps is online at We found open ports in 925 popular apps and 725 built-in system apps, including vulnerable ones in Facebook SDK and Instagram.

    Prikaži ovu nit
    Poništi
  18. 6. pro 2018.

    accepted papers: I am in particular interested in these two papers: "Corking by Forking: Vulnerability Analysis of Blockchain" and "Countering Cryptojacking and Parasitic Miners on the Web".

    Poništi
  19. 16. stu 2018.

    This site looks good for listing all the Oakland SoK papers:

    Poništi
  20. 14. stu 2018.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·