Publications

Peng Wang's Google Scholar

[NDSS 22] Demystifying Local Business Search Poisoning for Illicit Drug Promotion

Peng Wang, Zilong Lin, Xiaojing Liao, XiaoFeng Wang

to appear in the Proceedings of Network and Distributed System Security Symposium.


[NDSS 20] Into the Deep Web: Understanding E-commerce Fraud from Autonomous Chat with Cybercriminals [PDF] [Data & Code]

Peng Wang, Xiaojing Liao, Yue Qin, XiaoFeng Wang

In the Proceedings of the Network and Distributed System Security Symposium.


[NDSS 19] Cracking Wall of Confinement:Understanding and Analyzing Malicious Domain Takedowns [PDF]

Eihal Alowaisheq, Peng Wang, Sumayah Alrwais, Xiaojing Liao, XaioFeng Wang, Tasneem Alowaisheq, XiangHang Mi, Siyuan Tang, Baojun Liu

In the Proceedings of the Network and Distributed System Security Symposium. (Distinguished Paper Award)


[NDSS 18] Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations [PDF] [PPT]

Peng Wang, Xianghang Mi, Xiaojing Liao, XiaoFeng Wang, Kan Yuan, Feng Qian, and Raheem Beyah.

In the Proceedings of the Network and Distributed System Security Symposium.

Media coverage: the morning paper, BleepingComputer, Sina, LeiPhone


[RAID 17] Large-Scale PHA Install Detection at the Communication Service Provider Level [PDF]

Kai Chen, Tongxin Li, Bin Ma, Peng Wang, Xiaofeng Wang, Peiyuan Zong.

In the 20th International Symposium on Research in Attacks, Intrusions, and Defenses.


[S&P 17] Understanding and Detecting BulletProof Hosting on Legitimate Service Provider Networks [PDF]

Sumayah Alrwais, Xiaojing Liao, Xianghang Mi, Peng Wang, Xiaofeng Wang, Feng Qian, Raheem Beyah, Damon McCoy.

In the 38th IEEE Symposium on Security and Privacy.


[S&P 16] Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS [PDF] [DEMO]

Kai Chen, Xueqiang Wang, Yi Chen, Peng Wang, Yeonjoon Lee, XiaoFeng Wang, Bin Ma, Aohui Wang, Yingjun Zhang, Wei Zou.

In the 37th IEEE Symposium on Security and Privacy.


[ICSE 16] Patching, Protecting and Analyzing on Unmodified and Non-Rooted Android Devices [PDF]

Wei You, Bin Liang, Wenchang Shi, Shuyang Zhu, Peng Wang, Sikefu Xie, Xiangyu Zhang.

In the 38th International Conference on Software Engineering. ACM, 2016.


[USENIX 15] Finding unknown malice in 10 seconds: Mass vetting for new threats at the google-play scale

Kai Chen, Peng Wang, Yeonjoon Lee, XiaoFeng Wang, Nan Zhang, Heqing Huang, Wei Zou, and Peng Liu.

In the 24th USENIX Security Symposium. 2015. [PDF] [DEMO] [MassVet Platform]


[CSNT 14] Automatic Android GUI traversal with high coverage [PDF]

Peng Wang, Bin Liang, Wei You, Jingzhe Li, and Wenchang Shi.

In the 4th Communication Systems and Network Technologies. IEEE, 2014.


[ICSE 14] AsDroid: Detecting stealthy behaviors in android apps by UI and program behavior contradiction [PDF]

Jianjun Huang, Xiangyu Zhang, Lin Tan, Peng Wang, Bin Liang.

In the 36th International Conference on Software Engineering. ACM, 2014.