Yacong Gu

ORCID: 0000-0003-2221-5689
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Security and Verification in Computing
  • Network Security and Intrusion Detection
  • Software Testing and Debugging Techniques
  • Web Application Security Vulnerabilities
  • Digital and Cyber Forensics
  • User Authentication and Security Systems
  • Information and Cyber Security
  • Software Engineering Research
  • Software System Performance and Reliability

Tsinghua University
2017-2024

Chinese Academy of Sciences
2015-2022

Institute of Software
2017-2022

University Town of Shenzhen
2017

Package registries host reusable code assets, allowing developers to share and reuse packages easily, thus accelerating the software development process. Current registry ecosystems involve multiple independent stakeholders for package management. Unfortunately, abnormal behavior information inconsistency inevitably exist, enabling adversaries conduct malicious activities with minimal effort covertly. In this paper, we investigate potential security vulnerabilities in six popular ecosystems....

10.1109/sp46215.2023.10179332 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2023-05-01

Nowadays, the popular Android is so closely involved in people's daily lives that people rely on to perform critical operations and trust with sensitive information. It of great importance guarantee usability security which, however, such a huge system potential threat may arise from any part it. In this paper, we focus Free Floating window (FF window) which category windows can appear freely above other applications. share screen space FF windows, dialogs, activities. An flexible both its...

10.1145/2897845.2897897 article EN 2016-05-27

Continuous Integration (CI) is a widely-adopted software development practice for automated code integration. A typical CI workflow involves multiple independent stakeholders, including hosting platforms (CHPs), (CPs), and third party services. While can significantly improve efficiency, unfortunately, it also exposes new attack surfaces. As the executed by task may come from less-trusted user, improperly configured with weak isolation mechanisms might enable attackers to inject malicious...

10.1109/sp46215.2023.10179471 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2023-05-01

Android system applies a permission-based security model to restrict unauthorized apps from accessing services, however, this cannot constrain authorized sending excessive service requests exhaust the limited resource allocated for each service. As references native code Java object, JNI Global References (JGR) are prone memory leaks, since they not automatically garbage collected. Moreover, JGR exhaustion may lead process abort or even reboot when victim could afford triggered by malicious...

10.1109/dsn.2017.40 article EN 2017-06-01

Android allows apps to communicate with its system services via service helpers so that these can use various functions provided by the services. Meanwhile, rely on their enforce security checks for protection. Unfortunately, in may be bypassed directly exploiting non-SDK (hidden) APIs, degrading stability and posing severe threats such as privilege escalation, automatic function execution without users' interactions, crashes, DoS attacks. Google has proposed approaches address this problem,...

10.1109/tdsc.2022.3160872 article EN IEEE Transactions on Dependable and Secure Computing 2022-03-22

In order to effectively detect malware in Android, dynamic analysis techniques with Android emulators are widely adopted. Emulators can be deployed for large-scale detection and restored an ensured clean state a short period after each app process such that upon malware. Moreover, significantly reduce the cost compared real devices. However, emulator-based has limited capability detecting evasive presence of environment hide its malicious behaviors. this paper, we propose RealDroid, system...

10.1109/icccn.2017.8038419 article EN 2017-07-01

System services and resources in Android are accessed through IPC based mechanisms. Previous research has demonstrated that they vulnerable to the denial-of-service attack (DoS attack). For instance, JNI global reference (JGR), which is widely used by system services, can be exhausted cause reboot (hence name JGRE Even though team tries fix problem enforcing security checks, we find it still possible construct a JGR exhaustion DoS latest system. In this paper, propose new attack, effective...

10.48550/arxiv.2405.00526 preprint EN arXiv (Cornell University) 2024-05-01

Mini-programs are lightweight apps running in super (such as WeChat, Baidu, Alipay, and TikTok), an emerging paradigm the era of mobile computing. With growing popularity mini-programs, there is increasing concern for their security privacy. In essence, mini-programs WebView-based apps. This means that they may be vulnerable to same risks associated with web this work, we discovered a new mini-program vulnerability called MiniCPRF (Cross-Page Request Forgery Mini-Programs). The exploit easy,...

10.1145/3658644.3670294 article EN other-oa 2024-12-02

Mainstream Continuous Integration (CI) platforms have provided the plugin functionality to accelerate development of CI pipelines. Unfortunately, plugins, which are essentially reusable code snippets, also expose new attack surfaces as plugins might be developed by less trusted users. In this paper, we present an in-depth study understand potential security risks in existing plugins. We conduct a comprehensive analysis implementations on four mainstream (GitHub Actions, GitLab CI, CircleCI,...

10.1145/3658644.3670366 article EN 2024-12-02

Android provides flexible inter-application communication by exporting the components of one app to others. Each can define customized permissions control access from other apps its exposed components. However, an attacker easily exported and private information evading permission checks in Android. In this article, authors discuss a new attack called direct resource hijacking (or attack), which directly hijacks or on owned benign app. They find that among top 230 popular apps, 53 are...

10.1109/mic.2015.138 article EN IEEE Internet Computing 2015-11-11

System services and resources in Android are accessed through IPC-based mechanisms. Previous research has demonstrated that they vulnerable to the denial-of-service attack (DoS attack). For instance, JNI global reference (JGR), which is widely used by system services, can be exhausted cause reboot (hence name JGRE Even though team tries fix problem enforcing security checks, we find it still possible construct a JGR exhaustion DoS latest system. In this article, propose new attack, effective...

10.1109/tdsc.2020.2995542 article EN IEEE Transactions on Dependable and Secure Computing 2020-05-18

Android provides flexible inter-application (or app) communication by exporting the components of one app to others. Each can define customized permissions control access from others its exposed components. However, an attacker easily exported and private information evading permission check in Android. In this article, we present a new attack called direct resource hijacking or on We find that among top 230 popular apps 53 are vulnerable attack. To tackle vulnerability, propose fine-grained...

10.1109/mic.2018.326143537 article EN IEEE Internet Computing 2018-08-15
Coming Soon ...