Research
System Security
Web Security
Mobile Security
Automatic Detection
Security Patterns
User Fingerprinting
Motion Sensors
Vulnerability Exploration
Mobile Web Users
Executive Functioning
Younger Adults
Password Manager, Password Managers
Browser Extensions
Information Leakage Vulnerabilities
Web Browsers
Security Analysis
Risk Analysis
New Design
List of Publications (15)
In 2019
15
FireBugs: finding and repairing bugs with security patterns. L Singleton, R Zhao, M Song, H Siy Proceedings of the 6th International Conference on Mobile Software , 2019.
Found on Publication Page
14
Traffic-Based Automatic Detection of Browser Fingerprinting. R Zhao, E Chow, C Li International Conference on Security and Privacy in Communication Systems , 2019.
Found on Publication Page
13
Sensor-Based Mobile Web Cross-Site Input Inference Attacks and Defenses. R Zhao, C Yue, Q Han IEEE Transactions on Information Forensics and Security 14 (1), 75-89, 2019.
Found on Publication Page
In 2018
12
Effective Mobile Web User Fingerprinting via Motion Sensors. Z Yang, R Zhao, C Yue 2018 17th IEEE International Conference On Trust, Security And Privacy In , 2018.
Found on Publication Page
In 2017
11
Phishing suspiciousness in older and younger adults: The role of executive functioning. BE Gavett, R Zhao, SE John, CA Bussell, JR Roberts, C Yue PloS one 12 (2), e0171620, 2017.
Found on Publication Page
10
Design and evaluation of the highly insidious extreme phishing attacks. R Zhao, S John, S Karas, C Bussell, J Roberts, D Six, B Gavett, C Yue Computers & Security 70, 634-647, 2017.
Found on Publication Page
9
Cross-site Input Inference Attacks on Mobile Web Users. R Zhao, C Yue, Q Han International Conference on Security and Privacy in Communication Systems , 2017.
Found on Publication Page
In 2016
8
The Highly Insidious Extreme Phishing Attacks. R Zhao, S John, S Karas, C Bussell, J Roberts, D Six, B Gavett, C Yue Computer Communication and Networks (ICCCN), 2016 25th International , 2016.
Found on Publication Page
7
Vulnerability exploration and data protection in end-user applications. R Zhao Colorado School of Mines. Arthur Lakes Library, 2016.
Found on Publication Page
In 2015
6
SafeSky: A Secure Cloud Storage Middleware for End-User Applications. R Zhao, C Yue, B Tak, C Tang Reliable Distributed Systems (SRDS), 2015 IEEE 34th Symposium on, 21-30, 2015.
Found on Publication Page
5
Automatic Detection of Information Leakage Vulnerabilities in Browser Extensions. R Zhao, C Yue, Q Yi Proceedings of the 24th International Conference on World Wide Web, 1384-1394, 2015.
Found on Publication Page
In 2014
4
Toward a secure and usable cloud-based password manager for web browsers. R Zhao, C Yue Computers & Security 46, 32-47, 2014.
Found on Publication Page
In 2013
3
All your browser-saved passwords could belong to us: a security analysis and a cloud-based new design. R Zhao, C Yue Proceedings of the third ACM conference on Data and application security and , 2013.
Found on Publication Page
2
Vulnerability and risk analysis of two commercial browser and cloud based password managers. R Zhao, C Yue, K Sun ASE Science Journal 1 (4), 1-15, 2013.
Found on Publication Page
1
A security analysis of two commercial browser and cloud based password managers. R Zhao, C Yue, K Sun 2013 International Conference on Social Computing, 448-453, 2013.
Found on Publication Page