Medijski sadržaj
- Tweetovi
- Tweetovi i odgovori
- Medijski sadržaj, trenutna stranica.
-
If you are an oversea (non-mainland/HK) student, and want to pursue PhD in mobile/blockchain/vulnerability security research at the Chinese University of Hong Kong. Feel free to contact me. More details are attached and available in https://daoyuan14.github.io/CUHKOverseaPhDAd.pdf …pic.twitter.com/isBrEqbiH6
-
I'd like to advertise a little bit about our recent technical report on fuzzing Android systems' VoIP components: https://daoyuan14.github.io/papers/TR19_VoIPFuzzing.pdf … Seems google search cannot index this link. It is actually the first public paper after I joined CUHK IE in mid Aug. :)pic.twitter.com/QfrnnABAM0
-
Glad to share that our paper, titled "An Empirical Study of Mobile Network Behavior and Application Performance in the Wild", has been accepted by
#IWQoS 2019. This paper empirically analyzed a two-year per-app mobile network dataset via our MopEye app (USENIX ATC'17)@mopeye_apppic.twitter.com/oFVUUxHoX6
-
I am more than happy to share that I will join Chinese University of Hong Kong (CUHK) as Research Assistant Professor in Aug 2019. Feel free to ask me to review papers, lol. :) I will focus on vulnerability and privacy research in the domains of mobile, web, and smart contracts.pic.twitter.com/CYTHKN6hSa
-
I am glad to share that our paper, entitled "Towards Understanding Android System Vulnerabilities: Techniques and Insights", has been accepted by
#AsiaCCS19. Basically we did an empirical study of 2,179 vulnerabilities on the Android Security Bulletin program over ~three years.pic.twitter.com/rcSs3bw4D5
-
The key of our approach is to employ crowdsourcing, instead of static analysis, for the open port discovery, and use static analysis only for the diagnosis of discovered open ports. Our crowdsourcing app, NetMon, is available at https://play.google.com/store/apps/details?id=com.netmon …pic.twitter.com/gZcf6vh7Pt
Prikaži ovu nit -
our
#NDSS19 paper on Open Ports in Android Apps is online at https://daoyuan14.github.io/papers/NDSS19_OpenPort.pdf … We found open ports in 925 popular apps and 725 built-in system apps, including vulnerable ones in Facebook SDK and Instagram.@NDSSSymposium@mobilesecurity_pic.twitter.com/vyMtcQsU0N
Prikaži ovu nit -
Scaling Nakamoto Consensus to Thousands of Transactions per Second, made by Chi-Chih Yao's team, https://arxiv.org/abs/1805.03870 They used EC2 to achieve 6.4K tps for Bitcoin. The key idea is to optimistically process concurrent blocks while lazily reconciling the transaction total orderpic.twitter.com/9cOOAWVJ9v
-
Pls consider support my talk by voting it at https://gsec.hitb.org/vote/ Component Hijacking on Android: From Birth to Death
#HITBGSEC@HITBGSECpic.twitter.com/r4QJ365y6X
-
We finally released the full
@mopeye_app paper, which is currently under the peer review of a top-tier system conf. https://arxiv.org/abs/1703.07551 pic.twitter.com/NySb0Qxt3F
-
My SE course project paper, Measuring the Declared SDK Versions and Their Consistency with API Calls in Android Apps http://tinyurl.com/dsdk17 pic.twitter.com/8BCv0TVVii
-
Steve Jobs The Lost Interview (Full Film) 2012: http://youtu.be/m8mttU82V64 via
@youtube -
Steve Jobs The Lost Interview (Full Film) 2012: http://youtu.be/m8mttU82V64 via
@youtube great idea versus great product! -
Steve Jobs The Lost Interview (Full Film) 2012: http://youtu.be/m8mttU82V64 via
@youtube
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.