Publications

All your sessions are belong to us: Investigating authenticator leakage through backup channels on android

Bai, Guangdong, Jun Sun, Jianliang Wu, Quanqi Ye, Li Li, Jin Song Dong, and Shanqing Guo. “All your sessions are belong to us: Investigating authenticator leakage through backup channels on android.” In 2015 20th International Conference on Engineering of Complex Computer Systems (ICECCS), 2015.

PaddyFrog: systematically detecting confused deputy vulnerability in Android applications

Wu, Jianliang, Tingting Cui, Tao Ban, Shanqing Guo, and Lizhen Cui. “PaddyFrog: systematically detecting confused deputy vulnerability in Android applications.” Security and Communication Networks 8 (SCN), no. 13 (2015): 2338-2349.

Automatically detecting ssl error-handling vulnerabilities in hybrid mobile web apps

Zuo, Chaoshun, Jianliang Wu, and Shanqing Guo. “Automatically detecting ssl error-handling vulnerabilities in hybrid mobile web apps.” In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS), pp. 591-596. ACM, 2015.

TrustFound: Towards a Formal Foundation for Model Checking Trusted Computing Platforms

Bai, Guangdong, Jianan Hao, Jianliang Wu, Yang Liu, Zhenkai Liang, and Andrew Martin. “Trustfound: Towards a formal foundation for model checking trusted computing platforms.” In International Symposium on Formal Methods (FM), pp. 110-126. Springer, Cham, 2014.