BibTeX records: Fenghao Xu

download as .bib file

@article{DBLP:journals/iet-ifs/ChenXDSZ22,
  author       = {Jiongyi Chen and
                  Fenghao Xu and
                  Shuaike Dong and
                  Wei Sun and
                  Kehuan Zhang},
  title        = {Authorisation inconsistency in IoT third-party integration},
  journal      = {{IET} Inf. Secur.},
  volume       = {16},
  number       = {2},
  pages        = {133--143},
  year         = {2022},
  url          = {https://doi.org/10.1049/ise2.12043},
  doi          = {10.1049/ISE2.12043},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ChenXDSZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secon/DuXZZLRDGZ22,
  author       = {Jianqi Du and
                  Fenghao Xu and
                  Chennan Zhang and
                  Zidong Zhang and
                  Xiaoyin Liu and
                  Pengcheng Ren and
                  Wenrui Diao and
                  Shanqing Guo and
                  Kehuan Zhang},
  title        = {Identifying the {BLE} Misconfigurations of IoT Devices through Companion
                  Mobile Apps},
  booktitle    = {19th Annual {IEEE} International Conference on Sensing, Communication,
                  and Networking, {SECON} 2022, Stockholm, Sweden, September 20-23,
                  2022},
  pages        = {343--351},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SECON55815.2022.9918597},
  doi          = {10.1109/SECON55815.2022.9918597},
  timestamp    = {Fri, 04 Nov 2022 13:53:28 +0100},
  biburl       = {https://dblp.org/rec/conf/secon/DuXZZLRDGZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuSDLCLZ21,
  author       = {Fenghao Xu and
                  Siyu Shen and
                  Wenrui Diao and
                  Zhou Li and
                  Yi Chen and
                  Rui Li and
                  Kehuan Zhang},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Android on {PC:} On the Security of End-user Android Emulators},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {1566--1580},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484774},
  doi          = {10.1145/3460120.3484774},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XuSDLCLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/XuDLCZ19,
  author       = {Fenghao Xu and
                  Wenrui Diao and
                  Zhou Li and
                  Jiongyi Chen and
                  Kehuan Zhang},
  title        = {BadBluetooth: Breaking Android Security Mechanisms via Malicious Bluetooth
                  Peripherals},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/badbluetooth-breaking-android-security-mechanisms-via-malicious-bluetooth-peripherals/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/XuDLCZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/DiaoZZ0XPLWZ019,
  author       = {Wenrui Diao and
                  Yue Zhang and
                  Li Zhang and
                  Zhou Li and
                  Fenghao Xu and
                  Xiaorui Pan and
                  Xiangyu Liu and
                  Jian Weng and
                  Kehuan Zhang and
                  XiaoFeng Wang},
  title        = {Kindness is a Risky Business: On the Usage of the Accessibility APIs
                  in Android},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {261--275},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/diao},
  timestamp    = {Wed, 10 Feb 2021 22:02:04 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/DiaoZZ0XPLWZ019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/DongLDLLLXCWZ18,
  author       = {Shuaike Dong and
                  Menghao Li and
                  Wenrui Diao and
                  Xiangyu Liu and
                  Jian Liu and
                  Zhou Li and
                  Fenghao Xu and
                  Kai Chen and
                  Xiaofeng Wang and
                  Kehuan Zhang},
  editor       = {Raheem Beyah and
                  Bing Chang and
                  Yingjiu Li and
                  Sencun Zhu},
  title        = {Understanding Android Obfuscation Techniques: {A} Large-Scale Investigation
                  in the Wild},
  booktitle    = {Security and Privacy in Communication Networks - 14th International
                  Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {254},
  pages        = {172--192},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01701-9\_10},
  doi          = {10.1007/978-3-030-01701-9\_10},
  timestamp    = {Sun, 05 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/DongLDLLLXCWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-01633,
  author       = {Shuaike Dong and
                  Menghao Li and
                  Wenrui Diao and
                  Xiangyu Liu and
                  Jian Liu and
                  Zhou Li and
                  Fenghao Xu and
                  Kai Chen and
                  Xiaofeng Wang and
                  Kehuan Zhang},
  title        = {Understanding Android Obfuscation Techniques: {A} Large-Scale Investigation
                  in the Wild},
  journal      = {CoRR},
  volume       = {abs/1801.01633},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.01633},
  eprinttype    = {arXiv},
  eprint       = {1801.01633},
  timestamp    = {Sun, 05 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-01633.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics