Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Fenghao Xu
@article{DBLP:journals/iet-ifs/ChenXDSZ22, author = {Jiongyi Chen and Fenghao Xu and Shuaike Dong and Wei Sun and Kehuan Zhang}, title = {Authorisation inconsistency in IoT third-party integration}, journal = {{IET} Inf. Secur.}, volume = {16}, number = {2}, pages = {133--143}, year = {2022}, url = {https://doi.org/10.1049/ise2.12043}, doi = {10.1049/ISE2.12043}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ChenXDSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secon/DuXZZLRDGZ22, author = {Jianqi Du and Fenghao Xu and Chennan Zhang and Zidong Zhang and Xiaoyin Liu and Pengcheng Ren and Wenrui Diao and Shanqing Guo and Kehuan Zhang}, title = {Identifying the {BLE} Misconfigurations of IoT Devices through Companion Mobile Apps}, booktitle = {19th Annual {IEEE} International Conference on Sensing, Communication, and Networking, {SECON} 2022, Stockholm, Sweden, September 20-23, 2022}, pages = {343--351}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SECON55815.2022.9918597}, doi = {10.1109/SECON55815.2022.9918597}, timestamp = {Fri, 04 Nov 2022 13:53:28 +0100}, biburl = {https://dblp.org/rec/conf/secon/DuXZZLRDGZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuSDLCLZ21, author = {Fenghao Xu and Siyu Shen and Wenrui Diao and Zhou Li and Yi Chen and Rui Li and Kehuan Zhang}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Android on {PC:} On the Security of End-user Android Emulators}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {1566--1580}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484774}, doi = {10.1145/3460120.3484774}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuSDLCLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/XuDLCZ19, author = {Fenghao Xu and Wenrui Diao and Zhou Li and Jiongyi Chen and Kehuan Zhang}, title = {BadBluetooth: Breaking Android Security Mechanisms via Malicious Bluetooth Peripherals}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/badbluetooth-breaking-android-security-mechanisms-via-malicious-bluetooth-peripherals/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/XuDLCZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/DiaoZZ0XPLWZ019, author = {Wenrui Diao and Yue Zhang and Li Zhang and Zhou Li and Fenghao Xu and Xiaorui Pan and Xiangyu Liu and Jian Weng and Kehuan Zhang and XiaoFeng Wang}, title = {Kindness is a Risky Business: On the Usage of the Accessibility APIs in Android}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {261--275}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/diao}, timestamp = {Wed, 10 Feb 2021 22:02:04 +0100}, biburl = {https://dblp.org/rec/conf/raid/DiaoZZ0XPLWZ019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/DongLDLLLXCWZ18, author = {Shuaike Dong and Menghao Li and Wenrui Diao and Xiangyu Liu and Jian Liu and Zhou Li and Fenghao Xu and Kai Chen and Xiaofeng Wang and Kehuan Zhang}, editor = {Raheem Beyah and Bing Chang and Yingjiu Li and Sencun Zhu}, title = {Understanding Android Obfuscation Techniques: {A} Large-Scale Investigation in the Wild}, booktitle = {Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {254}, pages = {172--192}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01701-9\_10}, doi = {10.1007/978-3-030-01701-9\_10}, timestamp = {Sun, 05 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/DongLDLLLXCWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-01633, author = {Shuaike Dong and Menghao Li and Wenrui Diao and Xiangyu Liu and Jian Liu and Zhou Li and Fenghao Xu and Kai Chen and Xiaofeng Wang and Kehuan Zhang}, title = {Understanding Android Obfuscation Techniques: {A} Large-Scale Investigation in the Wild}, journal = {CoRR}, volume = {abs/1801.01633}, year = {2018}, url = {http://arxiv.org/abs/1801.01633}, eprinttype = {arXiv}, eprint = {1801.01633}, timestamp = {Sun, 05 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-01633.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.