{BLESA}: Spoofing attacks against reconnections in bluetooth low energy J Wu, Y Nan, V Kumar, DJ Tian, A Bianchi, M Payer, D Xu 14th USENIX Workshop on Offensive Technologies (WOOT 20), 2020 | 58 | 2020 |
{LIGHTBLUE}: Automatic {Profile-Aware} Debloating of Bluetooth Stacks J Wu, R Wu, D Antonioli, M Payer, NO Tippenhauer, D Xu, DJ Tian, ... 30th USENIX Security Symposium (USENIX Security 21), 339-356, 2021 | 33 | 2021 |
{BlueShield}: Detecting spoofing attacks in bluetooth low energy networks J Wu, Y Nan, V Kumar, M Payer, D Xu 23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020 | 31 | 2020 |
Automatically detecting ssl error-handling vulnerabilities in hybrid mobile web apps C Zuo, J Wu, S Guo Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015 | 31 | 2015 |
TrustFound: Towards a Formal Foundation for Model Checking Trusted Computing Platforms G Bai, J Hao, J Wu, Y Liu, Z Liang, A Martin FM 2014: Formal Methods: 19th International Symposium, Singapore, May 12-16 …, 2014 | 31 | 2014 |
Paddyfrog: systematically detecting confused deputy vulnerability in android applications J Wu, T Cui, T Ban, S Guo, L Cui Security and Communication Networks 8 (13), 2338-2349, 2015 | 28 | 2015 |
Formal model-driven discovery of bluetooth protocol design vulnerabilities J Wu, R Wu, D Xu, DJ Tian, A Bianchi 2022 IEEE Symposium on Security and Privacy (SP), 2285-2303, 2022 | 27 | 2022 |
All your sessions are belong to us: Investigating authenticator leakage through backup channels on android G Bai, J Sun, J Wu, Q Ye, L Li, JS Dong, S Guo 2015 20th International Conference on Engineering of Complex Computer …, 2015 | 23 | 2015 |
Are you spying on me?{Large-Scale} analysis on {IoT} data exposure through companion apps Y Nan, X Wang, L Xing, X Liao, R Wu, J Wu, Y Zhang, XF Wang 32nd USENIX Security Symposium (USENIX Security 23), 6665-6682, 2023 | 20 | 2023 |
Dave (Jing) Tian, Antonio Bianchi, Mathias Payer, and Dongyan Xu. BLESA: spoofing attacks against reconnections in bluetooth low energy J Wu, Y Nan, V Kumar Proceedings of the USENIX Workshop on Offensive Technologies (WOOT), 2020 | 12 | 2020 |
SoK: The Long Journey of Exploiting and Defending the Legacy of King Harald Bluetooth J Wu, R Wu, D Xu, D Tian, A Bianchi 2024 IEEE Symposium on Security and Privacy (SP), 23-23, 2023 | 8 | 2023 |
{ProFactory}: Improving {IoT} Security via Formalized Protocol Customization F Wang, J Wu, Y Nan, Y Aafer, X Zhang, D Xu, M Payer 31st USENIX Security Symposium (USENIX Security 22), 3879-3896, 2022 | 7 | 2022 |
Dave (Jing) Tian, and Antonio Bianchi. 2021. LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks J Wu, R Wu, D Antonioli, M Payer, NO Tippenhauer, D Xu 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 339-356, 0 | 7 | |
Policy-based Discovery and Patching of Logic Bugs in Robotic Vehicles H Kim, MO Ozmen, A Bianchi, ZB Celik, D Xu Proceedings of the Workshop on Automotive and Autonomous Vehicle Security …, 2022 | 1 | 2022 |
Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations J Wu, P Traynor, D Xu, DJ Tian, A Bianchi 33rd USENIX Security Symposium (USENIX Security 24), 4499-4516, 2024 | | 2024 |
thesis. pdf J Wu Purdue University Graduate School, 2023 | | 2023 |