Author of the publication

Identifying the BLE Misconfigurations of IoT Devices through Companion Mobile Apps.

, , , , , , , , and . SECON, page 343-351. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthy with Inaudible Sound., , , and . CoRR, (2014)Android Custom Permissions Demystified: A Comprehensive Security Evaluation., , , , , and . IEEE Trans. Software Eng., 48 (11): 4465-4484 (2022)Bad Apples: Understanding the Centralized Security Risks in Decentralized Ecosystems., , , , and . WWW, page 2274-2283. ACM, (2023)ShadowDroid: Practical Black-box Attack against ML-based Android Malware Detection., , , , , and . ICPADS, page 629-636. IEEE, (2021)Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible Sound., , , and . CCS, page 429-440. ACM, (2014)Demystifying Android Non-SDK APls: Measurement and Understanding., , , , and . ICSE, page 647-658. ACM, (2022)An empirical study of potentially malicious third-party libraries in Android apps., , , , , and . WISEC, page 144-154. ACM, (2020)Can We Trust the Phone Vendors? Comprehensive Security Measurements on the Android Firmware Ecosystem., , , , , , , , , and 1 other author(s). IEEE Trans. Software Eng., 49 (7): 3901-3921 (July 2023)No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis., , , and . IEEE Symposium on Security and Privacy, page 414-432. IEEE Computer Society, (2016)Gateless Treasure: How to Get Sensitive Information from Unprotected External Storage on Android Phones., , , , and . CoRR, (2014)