Follow
Wang Kailong
Title
Cited by
Cited by
Year
Formal analysis of a single sign-on protocol implementation for android
Q Ye, G Bai, K Wang, JS Dong
2015 20th International Conference on Engineering of Complex Computer …, 2015
272015
It’s not just the site, it’s the contents: intra-domain fingerprinting social media websites through CDN bursts
K Wang, J Zhang, G Bai, R Ko, JS Dong
Proceedings of the Web Conference 2021, 2142-2153, 2021
142021
A framework for formal analysis of privacy on SSO protocols
K Wang, G Bai, N Dong, JS Dong
Security and Privacy in Communication Networks: 13th International …, 2018
72018
Homescan: Scrutinizing implementations of smart home integrations
KT Mahadewa, K Wang, G Bai, L Shi, JS Dong, Z Liang
2018 23rd International Conference on Engineering of Complex Computer …, 2018
62018
Scrutinizing implementations of smart home integrations
K Mahadewa, K Wang, G Bai, L Shi, Y Liu, JS Dong, Z Liang
IEEE Transactions on Software Engineering 47 (12), 2667-2683, 2019
52019
Assessing certificate validation user interfaces of WPA supplicants
K Wang, Y Zheng, Q Zhang, G Bai, M Qin, D Zhang, JS Dong
Proceedings of the 28th Annual International Conference on Mobile Computing …, 2022
22022
Are They Toeing the Line? Diagnosing Privacy Compliance Violations among Browser Extensions
Y Ling, K Wang, G Bai, H Wang, JS Dong
Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022
22022
Analyzing Security and Privacy in Design and Implementation of Web Authentication Protocols
K Wang
Formal Methods and Software Engineering: 20th International Conference on …, 2018
12018
Characterizing Cryptocurrency-themed Malicious Browser Extensions
K Wang, Y Ling, Y Zhang, Z Yu, H Wang, G Bai, BC Ooi, JS Dong
Proceedings of the ACM on Measurement and Analysis of Computing Systems 6 (3 …, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–9