Geng Hong

ORCID: 0000-0003-1811-9432
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Spam and Phishing Detection
  • Cybercrime and Law Enforcement Studies
  • Blockchain Technology Applications and Security
  • Higher Education and Teaching Methods
  • Software Testing and Debugging Techniques
  • Network Security and Intrusion Detection
  • Security and Verification in Computing
  • Cloud Data Security Solutions
  • Access Control and Trust
  • Technology and Security Systems
  • Educational Technology and Assessment
  • Internet Traffic Analysis and Secure E-voting
  • Power Systems and Technologies
  • Advanced Computational Techniques and Applications
  • Art History and Market Analysis
  • Digital Rights Management and Security
  • Digital and Cyber Forensics
  • Education and Work Dynamics
  • Software Engineering Research

Fudan University
2018-2025

China Academy of Transportation Sciences
2010

Beibu Gulf University
2000-2001

As a new mechanism to monetize web content, cryptocurrency mining is becoming increasingly popular. The idea simple: webpage delivers extra workload (JavaScript) that consumes computational resources on the client machine solve cryptographic puzzles, typically without notifying users or having explicit user consent. This mechanism, often heavily abused and thus considered threat termed "cryptojacking", estimated affect over 10 million every month; however, only few anecdotal reports exist so...

10.1145/3243734.3243840 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2018-10-15

As Android platform evolves in a fast pace, API-related compatibility issues become significant challenge for developers. To handle an incompatible API invocation, developers mainly have two choices: merely performing sufficient checks to avoid invoking APIs on platforms that do not support them, or gracefully providing replacement implementations those platforms. more consistent app behaviors, the latter one is recommended and challenging adopt. However, it still unknown how these are...

10.1145/3377811.3380357 article EN 2020-06-27

In the digital age, device search engines such as Censys and Shodan play crucial roles by scanning internet to catalog online devices, aiding in understanding mitigation of network security risks.While previous research has used these tools detect devices assess vulnerabilities, there remains uncertainty regarding assets they scan, strategies employ, whether adhere ethical guidelines.This study presents first comprehensive examination engines' operational dimensions.We developed a novel...

10.14722/ndss.2025.241924 preprint EN 2025-01-01

With the rise of generative large language models (LLMs) like LLaMA and ChatGPT, these have significantly transformed daily life work by providing advanced insights. However, as jailbreak attacks continue to circumvent built-in safety mechanisms, exploiting carefully crafted scenarios or tokens, risks LLMs come into focus. While numerous defense strategies--such prompt detection, modification, model fine-tuning--have been proposed counter attacks, a critical question arises: do defenses...

10.48550/arxiv.2501.12210 preprint EN arXiv (Cornell University) 2025-01-21

With the growth of mobile computing techniques, gambling scams have seen a rampant increase in recent past. In scams, miscreants deliver scamming messages via instant messaging, host scam platforms on apps, and adopt payment channels. To date, there is little quantitative knowledge about how this trending cybercrime operates, despite causing daily fraud losses estimated at more than ${\$}$522,262 USD. This paper presents first empirical study based ground-truth data associated with 1,461...

10.1109/sp46214.2022.9833665 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2022-05-01

Android integrates an increasing number of features into system services to manage sensitive resources, such as location, medical and social network information. To prevent untrusted apps from abusing the services, implements a comprehensive set access controls ensure proper usage resources. Unlike explicit permission-based that are discussed extensively in past, our paper focuses on widespread yet undocumented input validation problem. As we show paper, there fact more validations acting...

10.1145/3243734.3243843 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2018-10-15

Cryptocurrency mining is a crucial operation in blockchains, and miners often join pools to increase their chances of earning rewards. However, the energy-intensive nature PoW cryptocurrency has led its ban New York State United States, China, India. As result, pools, serving as central hub for activities, have become prime targets regulatory enforcement. Furthermore, cryptojacking malware refers self-owned stealthy evade detection techniques conceal profit wallet addresses. no systematic...

10.1145/3576915.3616677 article EN cc-by Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2023-11-15

Cryptocurrencies, while revolutionary, have become a magnet for malicious actors. With numerous reports underscoring cyberattacks and scams in this domain, our paper takes the lead characterizing visual associated with cryptocurrency wallets---a fundamental component of Web3. Specifically, scammers capitalize on omission vital wallet interface details, such as token symbols, addresses, smart contract function names, to mislead users, potentially resulting unintended financial losses....

10.1145/3589334.3645348 article EN Proceedings of the ACM Web Conference 2022 2024-05-08

Cryptocurrencies have attracted extensive attention from malicious actors. Numerous studies reported various cyber attacks and scams targeting this domain. This paper takes the first step to characterize visual occurring within cryptocurrency wallets. Scammers exploit deceptive features – specifically, omission of detailed information on wallet's interface such as wallet addresses, tokens, smart contract names, confuse or mislead users. could potentially lead users carry out unintended...

10.1145/3603165.3607444 article EN 2023-07-28

As a new type of underground ecosystem, the exploitation Abused IHMs as MalIcious sErvices (AIMIEs) is becoming increasingly prevalent among miscreants to host illegal images and propagate harmful content. However, there has been little effort understand this menace, in terms its magnitude, impact, techniques, not mention any serious detect vulnerable image hosting modules on large scale. To fulfill gap, paper presents first measurement study AIMIEs. By collecting analyzing 89 open-sourced...

10.1145/3576915.3623143 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2023-11-15
Coming Soon ...