XL

Xiaotong Li

3 records found

Existing approaches to defending Use-After-Free (UAF) exploits are usually done using static or dynamic analysis. However, both static and dynamic analysis suffer from intrinsic deficiencies. The existing static analysis is limited in handling loops, optimization of memory repres ...

Trust2Privacy

A novel fuzzy trust-to-privacy mechanism for mobile social networks

Mobile social applications have been widely used by Internet users. Users can efficiently acquire many kinds of information and share their statuses by various social platforms. However, when a user intends to share information through the user's social applications, the user can ...