Automatic fingerprinting of vulnerable ble iot devices with static uuids from mobile apps C Zuo, H Wen, Z Lin, Y Zhang Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 92 | 2019 |
A study of the privacy of covid-19 contact tracing apps H Wen, Q Zhao, Z Lin, D Xuan, N Shroff Security and Privacy in Communication Networks: 16th EAI International …, 2020 | 89 | 2020 |
{Plug-N-Pwned}: Comprehensive vulnerability analysis of {OBD-II} dongles as a new {Over-the-Air} attack surface in automotive {IoT} H Wen, QA Chen, Z Lin 29th USENIX security symposium (USENIX Security 20), 949-965, 2020 | 62 | 2020 |
On the accuracy of measured proximity of bluetooth-based contact tracing apps Q Zhao, H Wen, Z Lin, D Xuan, N Shroff Security and Privacy in Communication Networks: 16th EAI International …, 2020 | 57 | 2020 |
Firmxray: Detecting bluetooth link layer vulnerabilities from bare-metal firmware H Wen, Z Lin, Y Zhang Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020 | 46 | 2020 |
Automated cross-platform reverse engineering of CAN bus commands from mobile apps H Wen, Q Zhao, QA Chen, Z Lin Proceedings 2020 Network and Distributed System Security Symposium (NDSS'20), 2020 | 31 | 2020 |
An empirical study of sdk credential misuse in ios apps H Wen, J Li, Y Zhang, D Gu 2018 25th Asia-Pacific Software Engineering Conference (APSEC), 258-267, 2018 | 11 | 2018 |
Pargen: A parallel method for partitioning data stream applications in mobile edge computing H Wen, L Yang, Z Wang IEEE Access 6, 5037-5048, 2017 | 8 | 2017 |
A fine-grained telemetry stream for security services in 5g open radio access networks H Wen, P Porras, V Yegneswaran, Z Lin Proceedings of the 1st International Workshop on Emerging Topics in Wireless …, 2022 | 4 | 2022 |
Thwarting Smartphone SMS Attacks at the Radio Interface Layer H Wen, P Porras, V Yegneswaran, Z Lin Proceedings of the 30th Annual Network and Distributed System Security …, 2023 | 3 | 2023 |
5G-Spector: An O-RAN Compliant Layer-3 Cellular Attack Detection Service H Wen, P Porras, V Yegneswaran, A Gehani, Z Lin Proceedings of the 31st Annual Network and Distributed System Security …, 2024 | 2 | 2024 |
Egg Hunt in Tesla Infotainment: A First Look at Reverse Engineering of Qt Binaries H Wen, Z Lin 32nd USENIX Security Symposium (USENIX Security 23), 2023 | 2 | 2023 |
Replay (far) away: Exploiting and fixing google/apple exposure notification contact tracing C Ellis, H Wen, Z Lin, A Arora Proceedings on Privacy Enhancing Technologies, 2022 | 1 | 2022 |
Systems and Methods for Monitoring and Detection of Anomalous Activity in Software-Defined Radio Access Networks PA Porras, VT Yegneswaran, H Wen US Patent App. 18/516,449, 2024 | | 2024 |
What You See is Not What You Get: Revealing Hidden Memory Mapping for Peripheral Modeling JY Won, H Wen, Z Lin Proceedings of the 25th International Symposium on Research in Attacks …, 2022 | | 2022 |