Biblio

Export 8 results:
Filters: Author is Yuhong Nan  [Clear All Filters]
2022
Wang F, Wu J, Nan Y, Aafer Y, Zhang X, Xu D, Payer M.  2022.  ProFactory: Improving IoT Security via Formalized Protocol Customization. 31st USENIX Security Symposium (USENIX Security 22). :3879--3896.
2021
Alsaheel A, Nan Y, Ma S, Yu L, Walkup G, Z. Celik B, Zhang X, Xu D.  2021.  ATLAS: A Sequence-based Learning Approach for Attack Investigation. 30th USENIX Security Symposium (USENIX Security 21). :3005--3022.
Wang J, Xiao Y, Wang X, Nan Y, Xing L, Liao X, Dong JW, Serrano N, Lu H, Wang XF et al..  2021.  Understanding Malicious Cross-library Data Harvesting on Android. 30th USENIX Security Symposium (USENIX Security 21). :4133--4150.
2020
Wu J, Nan Y, Kumar V, Tian D, Bianchi A, Payer M, Xu D.  2020.  BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy. 14th USENIX Workshop on Offensive Technologies (WOOT 20).
Wu J, Nan Y, Kumar V, Payer M, Xu D.  2020.  BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks. 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). :397--411.
2015
Nan Y, Yang M, Yang Z, Zhou S, Gu G, Wang XF.  2015.  UIPicker: User-Input Privacy Identification in Mobile Applications. 24th USENIX Security Symposium (USENIX Security 15). :993--1008.