Jianliang Wu
Jianliang Wu
Verified email at - Homepage
Cited by
Cited by
BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy.
J Wu, Y Nan, V Kumar, Dave (Jing) Tian, A Bianchi, M Payer, D Xu
WOOT@ USENIX Security Symposium, 2020
TrustFound: Towards a Formal Foundation for Model Checking Trusted Computing Platforms
G Bai, J Hao, J Wu, Y Liu, Z Liang, A Martin
FM 2014: Formal Methods: 19th International Symposium, Singapore, May 12-16 …, 2014
Automatically detecting ssl error-handling vulnerabilities in hybrid mobile web apps
C Zuo, J Wu, S Guo
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
Paddyfrog: systematically detecting confused deputy vulnerability in android applications
J Wu, T Cui, T Ban, S Guo, L Cui
Security and Communication Networks 8 (13), 2338-2349, 2015
All your sessions are belong to us: Investigating authenticator leakage through backup channels on android
G Bai, J Sun, J Wu, Q Ye, L Li, JS Dong, S Guo
2015 20th International Conference on Engineering of Complex Computer …, 2015
LIGHTBLUE: Automatic profile-aware debloating of bluetooth stacks
J Wu, R Wu, D Antonioli, M Payer, NO Tippenhauer, D Xu, DJ Tian, ...
Proceedings of the USENIX Security Symposium (USENIX Security), 2021
BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks.
J Wu, Y Nan, V Kumar, M Payer, D Xu
RAID, 397-411, 2020
Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities
J Wu, R Wu, D Xu, DJ Tian, A Bianchi
2022 IEEE Symposium on Security and Privacy (SP), 2285-2303, 2022
Dave (Jing) Tian, Antonio Bianchi, Mathias Payer, and Dongyan Xu. BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy
J Wu, Y Nan, V Kumar
Proceedings of the USENIX Workshop on Offensive Technologies (WOOT), 2020
{ProFactory}: Improving {IoT} Security via Formalized Protocol Customization
F Wang, J Wu, Y Nan, Y Aafer, X Zhang, D Xu, M Payer
31st USENIX Security Symposium (USENIX Security 22), 3879-3896, 2022
Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps
Y Nan, X Wang, L Xing, X Liao, R Wu, J Wu, Y Zhang, XF Wang
Policy-based Discovery and Patching of Logic Bugs in Robotic Vehicles
H Kim, MO Ozmen, A Bianchi, ZB Celik, D Xu
The system can't perform the operation now. Try again later.
Articles 1–12