Demos

BibTex

All Your Sessions Are Belong to Us: Investigating Authenticator Leakage Through Backup Channels on Android

BibTex

BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy

BibTex

BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks

BibTex

SoK: The Long Journey of Exploiting and Defending the Legacy of King Harald Bluetooth

BibTex

Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities

BibTex

Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps

BibTex

LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks

BibTex

PaddyFrog: systematically detecting confused deputy vulnerability in Android applications

BibTex

ProFactory: Improving IoT Security via Formalized Protocol Customization

BibTex

Automatically Detecting SSL Error-Handling Vulnerabilities in Hybrid Mobile Web Apps

BibTex

TrustFound: Towards a Formal Foundation for Model Checking Trusted Computing Platforms