BibTex
All Your Sessions Are Belong to Us: Investigating Authenticator Leakage Through Backup Channels on Android
All Your Sessions Are Belong to Us: Investigating Authenticator Leakage Through Backup Channels on Android
BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy
BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks
SoK: The Long Journey of Exploiting and Defending the Legacy of King Harald Bluetooth
Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities
Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps
LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks
PaddyFrog: systematically detecting confused deputy vulnerability in Android applications
ProFactory: Improving IoT Security via Formalized Protocol Customization
Automatically Detecting SSL Error-Handling Vulnerabilities in Hybrid Mobile Web Apps
TrustFound: Towards a Formal Foundation for Model Checking Trusted Computing Platforms