researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
Filter by Tag
[+]
OR
AND
NOT
1
C++
Meta-Environment
analysis
architecture
certification
data-flow
design
discovery
e-science
meta-model
mobile
modeling
open-source
protocol
routing
rule-based
security
systematic-approach
tagging
wireless sensor networks
Filter by Author
[+]
OR
AND
NOT
1
A. Selcuk Uluagac
Aanjhan Ranganathan
Ahmad-Reza Sadeghi
Christina Pöpper
Guevara Noubir
Ivan Martinovic
Jens B. Schmitt
Kemal Akkaya
Mathieu Cunche
Matthias Hollick
Matthias Schulz
Mauro Conti
Nitesh Saxena
Panos Papadimitratos
Patrick Tague
Roberto Di Pietro
Sencun Zhu
Srdjan Capkun
Vincent Lenders
William Enck
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
android
attack
attacks
authentication
channel
detection
devices
learning
mobile
network
networks
poster
privacy
secure
security
sensor
systems
using
wireless
WISEC (wisec)
Editions
Publications
Viewing Publication 1 - 100 from 611
2023
SoK: An Analysis of End-to-End Encryption and Authentication Ceremonies in Secure Messaging Systems
Mashari Alatawi
,
Nitesh Saxena
.
wisec 2023
:
187-201
[doi]
EMI-LiDAR: Uncovering Vulnerabilities of LiDAR Sensors in Autonomous Driving Setting using Electromagnetic Interference
Sri Hrushikesh Varma Bhupathiraju
,
Jennifer Sheldon
,
Luke A. Bauer
,
Vincent Bindschaedler
,
Takeshi Sugawara 0001
,
Sara Rampazzi
.
wisec 2023
:
329-340
[doi]
UE Security Reloaded: Developing a 5G Standalone User-Side Security Testing Framework
Evangelos Bitsikas
,
Syed Khandker
,
Ahmad Salous
,
Aanjhan Ranganathan
,
Roger Piqueras Jover
,
Christina Pöpper
.
wisec 2023
:
121-132
[doi]
Provable Non-Frameability for 5G Lawful Interception
Felipe Boeira
,
Mikael Asplund
,
Marinho P. Barcellos
.
wisec 2023
:
109-120
[doi]
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023
Ioana Boureanu
,
Steve Schneider
,
Bradley Reaves
,
Nils Ole Tippenhauer
, editors,
ACM,
2023.
[doi]
Owfuzz: Discovering Wi-Fi Flaws in Modern Devices through Over-The-Air Fuzzing
Hongjian Cao
,
Lin Huang
,
Shuwei Hu
,
Shangcheng Shi
,
Yujia Liu
.
wisec 2023
:
263-273
[doi]
E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem
Marco Casagrande
,
Riccardo Cestaro
,
Eleonora Losiouk
,
Mauro Conti
,
Daniele Antonioli
.
wisec 2023
:
85-95
[doi]
Wavefront Manipulation Attack via Programmable mmWave Metasurfaces: from Theory to Experiments
Haoze Chen
,
Hooman Saeidi
,
Suresh Venkatesh
,
Kaushik Sengupta
,
Yasaman Ghasempour
.
wisec 2023
:
317-328
[doi]
A Key Generation Scheme for IoV Communication Based on Neural Network Autoencoders
Liquan Chen
,
Han Wang
,
Tianyu Lu
,
Zeyu Xu
.
wisec 2023
:
27-32
[doi]
Machine Learning Assisted Physical Layer Secret Key Generation in the One-Time-Pad Encryption Scheme
Liquan Chen
,
Yufan Song
,
Tianyu Lu
,
Peng Zhang
.
wisec 2023
:
45-50
[doi]
HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning
Chongqi Guan
,
Heting Liu
,
Guohong Cao
,
Sencun Zhu
,
Thomas La Porta
.
wisec 2023
:
49-59
[doi]
Proceedings of the 2023 ACM Workshop on Wireless Security and Machine Learning, WiseML2023, Guildford, United Kingdom, 1 June 2023
Deniz Gündüz
,
Mohammad Malekzadeh
,
Melek Önen
,
Yalin Sagduyu
,
Yi Shi
,
Junqing Zhang
, editors,
ACM,
2023.
[doi]
BigMac: Performance Overhead of User Plane Integrity Protection in 5G Networks
Thijs Heijligenberg
,
Guido Knips
,
Christian Böhm
,
David Rupprecht
,
Katharina Kohls
.
wisec 2023
:
145-150
[doi]
LTESniffer: An Open-source LTE Downlink/Uplink Eavesdropper
Tuan Dinh Hoang
,
CheolJun Park
,
Mincheol Son
,
Taekkyung Oh
,
Sangwook Bae
,
Junho Ahn
,
Beomseok Oh
,
Yongdae Kim
.
wisec 2023
:
43-48
[doi]
Circumventing the Defense against Modulation Classification Attacks
Naureen Hoque
,
Hanif Rahbari
.
wisec 2023
:
377-382
[doi]
Countering Relay and Spoofing Attacks in the Connection Establishment Phase of Wi-Fi Systems
Naureen Hoque
,
Hanif Rahbari
.
wisec 2023
:
275-285
[doi]
Mag-Auth: Authenticating Wireless Transmitters and Receivers on the Receiver Side via Magnetic Emissions
Omar Adel Ibrahim
,
Roberto Di Pietro
.
wisec 2023
:
305-316
[doi]
Never Let Me Down Again: Bidding-Down Attacks and Mitigations in 5G and 4G
Bedran Karakoc
,
Nils Fürste
,
David Rupprecht
,
Katharina Kohls
.
wisec 2023
:
97-108
[doi]
European 5G Security in the Wild: Reality versus Expectations
Oscar Lasierra
,
Gines Garcia-Aviles
,
Esteban Municio
,
Antonio F. Skarmeta
,
Xavier Costa-Pérez
.
wisec 2023
:
13-18
[doi]
Verifying List Swarm Attestation Protocols
Jay Le-Papin
,
Brijesh Dongol
,
Helen Treharne
,
Stephan Wesemeyer
.
wisec 2023
:
163-174
[doi]
Android OS Privacy Under the Loupe - A Tale from the East
Haoyu Liu
,
Douglas J. Leith
,
Paul Patras
.
wisec 2023
:
31-42
[doi]
BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks
Alessandro Lotto
,
Vaibhav Singh
,
Bhaskar Ramasubramanian
,
Alessandro Brighente
,
Mauro Conti
,
Radha Poovendran
.
wisec 2023
:
133-144
[doi]
Fortifying Your Defenses: Techniques to Thwart Adversarial Attacks and Boost Performance of Machine Learning-Based Intrusion Detection Systems
Wenjing Lou
.
wisec 2023
:
1
[doi]
How Can the Adversary Effectively Identify Cellular IoT Devices Using LSTM Networks?
Zhengping Jay Luo
,
Will A. Pitera
,
Shangqing Zhao
,
Zhuo Lu
,
Yalin E. Sagduyu
.
wisec 2023
:
9-14
[doi]
Approximate Wireless Communication for Federated Learning
Xiang Ma
,
Haijian Sun
,
Rose Qingyang Hu
,
Yi Qian
.
wisec 2023
:
21-26
[doi]
SoK: A Comprehensive Evaluation of 2FA-based Schemes in the Face of Active Concurrent Attacks from User Terminal
Ahmed Tanvir Mahdad
,
Nitesh Saxena
.
wisec 2023
:
175-186
[doi]
Maverick: An App-independent and Platform-agnostic Approach to Enforce Policies in IoT Systems at Runtime
M. Hammad Mazhar
,
Li Li
,
Md. Endadul Hoque
,
Omar Chowdhury
.
wisec 2023
:
73-84
[doi]
Exploring Adversarial Attacks on Learning-based Localization
Frost Mitchell
,
Phillip Smith
,
Aditya Bhaskara
,
Sneha Kumar Kasera
.
wisec 2023
:
15-20
[doi]
Location-independent GNSS Relay Attacks: A Lazy Attacker's Guide to Bypassing Navigation Message Authentication
Maryam Motallebighomi
,
Harshad Sathaye
,
Mridula Singh
,
Aanjhan Ranganathan
.
wisec 2023
:
365-376
[doi]
JaX: Detecting and Cancelling High-power Jammers Using Convolutional Neural Network
Hai N. Nguyen
,
Guevara Noubir
.
wisec 2023
:
293-304
[doi]
Authenticating Mobile Users to Public Internet Commodity Services Using SIM Technology
Siddharth Prakash Rao
,
Alexandros Bakas
.
wisec 2023
:
151-162
[doi]
Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks
Edd Salkield
,
Marcell Szakály
,
Joshua Smailes
,
Sebastian Köhler
,
Simon Birnbach
,
Martin Strohmeier
,
Ivan Martinovic
.
wisec 2023
:
341-352
[doi]
What is Your Location Privacy Worth? Monetary Valuation of Different Location Types and Privacy Influencing Factors
Vera Schmitt
,
Zhenni Li
,
Maija Poikela
,
Robert P. Spang
,
Sebastian Möller 0001
.
wisec 2023
:
19-29
[doi]
MS-PTP: Protecting Network Timing from Byzantine Attacks
Shanghao Shi
,
Yang Xiao
,
Changlai Du
,
Md Hasan Shahriar
,
Ao Li
,
Ning Zhang
,
Y. Thomas Hou 0001
,
Wenjing Lou
.
wisec 2023
:
61-71
[doi]
Increasing the Robustness of a Machine Learning-based IoT Malware Detection Method with Adversarial Training
József Sándor
,
Roland Nagy
,
Levente Buttyán
.
wisec 2023
:
3-8
[doi]
Machine Learning-Based Jamming Detection and Classification in Wireless Networks
Enrico Testi
,
Luca Arcangeloni
,
Andrea Giorgetti
.
wisec 2023
:
39-44
[doi]
Commercial Anti-Smishing Tools and Their Comparative Effectiveness Against Modern Threats
Daniel Timko
,
Muhammad Lutfor Rahman
.
wisec 2023
:
1-12
[doi]
Testing and Improving the Correctness of Wi-Fi Frame Injection
Mathy Vanhoef
,
Xianjun Jiao
,
Wei Liu 0019
,
Ingrid Moerman
.
wisec 2023
:
287-292
[doi]
BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers
Payton Walker
,
Tianfang Zhang
,
Cong Shi 0004
,
Nitesh Saxena
,
Yingying Chen 0001
.
wisec 2023
:
203-214
[doi]
VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation
Yuanda Wang
,
Hanqing Guo
,
Guangjing Wang
,
Bocheng Chen
,
Qiben Yan
.
wisec 2023
:
239-250
[doi]
Portability of Deep-Learning Side-Channel Attacks against Software Discrepancies
Chenggang Wang
,
Mabon Ninan
,
Shane Reilly
,
Joel Ward
,
William Hawkins
,
Boyang Wang
,
John M. Emmert
.
wisec 2023
:
227-238
[doi]
Hierarchical Over-the-Air Federated Learning with Differential Privacy
Zixi Wang
,
Arick Grootveld
,
Mustafa Cenk Gursoy
.
wisec 2023
:
51-56
[doi]
Analysis of Lossy Generative Data Compression for Robust Remote Deep Inference
Mathew Williams
,
Silvija Kokalj-Filipovic
,
Armani Rodriguez
.
wisec 2023
:
33-38
[doi]
The Devil is in the Details: Hidden Problems of Client-Side Enterprise Wi-Fi Configurators
Ka Lok Wu
,
Man Hong Hue
,
Ka Fun Tang
,
Sze Yiu Chau
.
wisec 2023
:
251-261
[doi]
VoicePM: A Robust Privacy Measurement on Voice Anonymity
Shaohu Zhang
,
Zhouyu Li
,
Anupam Das 0001
.
wisec 2023
:
215-226
[doi]
Malicious Relay Detection and Legitimate Channel Recovery
Xingya Zhao
,
Wei-Han Chen
,
Kannan Srinivasan
.
wisec 2023
:
353-363
[doi]
2022
BP-MAC: Fast Authentication for Short Messages
Eric Wagner 0003
,
Martin Serror
,
Klaus Wehrle
,
Martin Henze
.
wisec 2022
:
201-206
[doi]
Automatic Machine Learning for Multi-Receiver CNN Technology Classifiers
Amir Hossein Yazdani Abyaneh
,
Marwan Krunz
.
wisec 2022
:
39-44
[doi]
On the Security of Thread Networks: Experimentation with OpenThread-Enabled Devices
Dimitrios-Georgios Akestoridis
,
Vyas Sekar
,
Patrick Tague
.
wisec 2022
:
233-244
[doi]
A First Look at Code Obfuscation for WebAssembly
Shrenik Bhansali
,
Ahmet Aris
,
Abbas Acar
,
Harun Oz
,
A. Selcuk Uluagac
.
wisec 2022
:
140-145
[doi]
DyWCP: Dynamic and Lightweight Data-Channel Coupling towards Confidentiality in IoT Security
Shengping Bi
,
Tao Hou
,
Tao Wang
,
Yao Liu
,
Zhuo Lu
,
Qingqi Pei
.
wisec 2022
:
222-232
[doi]
No Doppelgänger: Advancing Mobile Networks Against Impersonation in Adversarial Scenarios
Felipe Boeira
,
Mikael Asplund
,
Marinho P. Barcellos
.
wisec 2022
:
280-281
[doi]
OpenHaystack Mobile - Tracking Custom Find My Accessories on Smartphones
Lukas Burg
,
Max Granzow
,
Alexander Heinrich
,
Matthias Hollick
.
wisec 2022
:
277-279
[doi]
Physical-Layer Attacks and Their Impact on Wireless Networks: Two Case Studies
Srdjan Capkun
.
wisec 2022
:
1
[doi]
Everything is Connected: Security and Reliability for Critical Infrastructure
Gabriela Felicia Ciocarlie
.
wisec 2022
:
3
[doi]
Evil Never Sleeps: When Wireless Malware Stays On after Turning Off iPhones
Jiska Classen
,
Alexander Heinrich
,
Robert Reith
,
Matthias Hollick
.
wisec 2022
:
146-156
[doi]
Analysis of Augmentation Methods for RF Fingerprinting under Impaired Channels
Ceren Cömert
,
Michel Kulhandjian
,
Omer Melih Gul
,
Azzedine Touazi
,
Cliff Ellement
,
Burak Kantarci
,
Claude D'Amours
.
wisec 2022
:
3-8
[doi]
On Post-Quantum Identification in 5G
Mohamed Taoufiq Damir
,
Valtteri Niemi
.
wisec 2022
:
292-294
[doi]
Towards Security-Optimized Placement of ADS-B Sensors
Ala Darabseh
,
Christina Pöpper
.
wisec 2022
:
39-44
[doi]
Accelerating RF Autonomy for Uncertain Environments
John Davies
.
wisec 2022
:
1
[doi]
Reflections on a Decade of Mobile Security Research
William Enck
.
wisec 2022
:
2
[doi]
Sybil-Based Attacks on Google Maps or How to Forge the Image of City Life
Cihan Eryonucu
,
Panos Papadimitratos
.
wisec 2022
:
73-84
[doi]
Lightweight Code Assurance Proof for Wireless Software
Theo Gamboni-Diehl
,
Simeon Wuthier
,
Jinoh Kim
,
Jonghyun Kim
,
Sang-Yoon Chang
.
wisec 2022
:
285-287
[doi]
Deep Learning for Spectrum Awareness and Covert Communications via Unintended RF Emanations
Michael Hegarty
,
Yalin E. Sagduyu
,
Tugba Erpek
,
Yi Shi 0001
.
wisec 2022
:
27-32
[doi]
AirGuard - Protecting Android Users from Stalking Attacks by Apple Find My Devices
Alexander Heinrich
,
Niklas Bittner
,
Matthias Hollick
.
wisec 2022
:
26-38
[doi]
Online Stream Sampling for Low-Memory On-Device Edge Training for WiFi Sensing
Steven M. Hernandez
,
Eyuphan Bulut
.
wisec 2022
:
9-14
[doi]
Post-Quantum Cipher Power Analysis in Lightweight Devices
Kathryn Hines
,
Manohar Raavi
,
John-Michael Villeneuve
,
Simeon Wuthier
,
Javier Moreno-Colin
,
Yan Bai
,
Sang-Yoon Chang
.
wisec 2022
:
282-284
[doi]
Undermining Deep Learning Based Channel Estimation via Adversarial Wireless Signal Fabrication
Tao Hou
,
Tao Wang
,
Zhuo Lu
,
Yao Liu
,
Yalin E. Sagduyu
.
wisec 2022
:
63-68
[doi]
MAG-PUF - Authenticating IoT Devices via Magnetic Physical Unclonable Functions
Omar Adel Ibrahim
,
Savio Sciancalepore
,
Roberto Di Pietro
.
wisec 2022
:
290-291
[doi]
WiseML@WiSec 2022: Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning, San Antonio, TX, USA, 19 May 2022
Murtuza Jadliwala
, editor,
ACM,
2022.
[doi]
WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022
Murtuza Jadliwala
,
Yongdae Kim
,
Alexandra Dmitrienko
, editors,
ACM,
2022.
[doi]
Digital Twin Virtualization with Machine Learning for IoT and Beyond 5G Networks: Research Directions for Security and Optimal Control
Jithin Jagannath
,
Keyvan Ramezanpour
,
Anu Jagannath
.
wisec 2022
:
81-86
[doi]
MR-iNet Gym: Framework for Edge Deployment of Deep Reinforcement Learning on Embedded Software Defined Radio
Jithin Jagannath
,
Kian Hamedani
,
Collin Farquhar
,
Keyvan Ramezanpour
,
Anu Jagannath
.
wisec 2022
:
51-56
[doi]
PAcT: Detecting and Classifying Privacy Behavior of Android Applications
Vijayanta Jain
,
Sanonda Datta Gupta
,
Sepideh Ghanavati
,
Sai Teja Peddinti
,
Collin McMillan
.
wisec 2022
:
104-118
[doi]
Beam Pattern Fingerprinting with Missing Features for Spoofing Attack Detection in Millimeter-Wave Networks
Ya Jiang
,
Long Jiao
,
Liang Zhao
,
Kai Zeng 0001
.
wisec 2022
:
75-80
[doi]
Attack Impact and Misbehavior Detection in Vehicular Platoons
Konstantinos Kalogiannis
,
Mohammad Khodaei
,
Weaam Mostafa Nemr Mohamed Bayaa
,
Panos Papadimitratos
.
wisec 2022
:
45-59
[doi]
Can You Hear It?: Backdoor Attacks via Ultrasonic Triggers
Stefanos Koffas
,
Jing Xu
,
Mauro Conti
,
Stjepan Picek
.
wisec 2022
:
57-62
[doi]
Systems View to Designing RF Fingerprinting for Real-World Operations
Scott Kuzdeba
,
Josh Robinson
,
Joseph M. Carmack
,
David Couto
.
wisec 2022
:
33-38
[doi]
Wireless and Mobile Security Research and Teaching in the Post-Pandemic World
Anindya Maiti
,
Ahmad-Reza Sadeghi
,
Gabriela Felicia Ciocarlie
,
Patrick Tague
.
wisec 2022
:
4-5
[doi]
SoK: Your Mind Tells a Lot About You: On the Privacy Leakage via Brainwave Devices
Anuradha Mandal
,
Nitesh Saxena
.
wisec 2022
:
175-187
[doi]
Deep Learning-based Localization in Limited Data Regimes
Frost Mitchell
,
Aniqua Baset
,
Neal Patwari
,
Sneha Kumar Kasera
,
Aditya Bhaskara
.
wisec 2022
:
15-20
[doi]
Wheels on the Modbus - Attacking ModbusTCP Communications
Abubakar Sadiq Mohammed
,
Neetesh Saxena
,
Omer F. Rana
.
wisec 2022
:
288-289
[doi]
Measuring the Deployment of 5G Security Enhancement
Shiyue Nie
,
Yiming Zhang
,
Tao Wan
,
Haixin Duan
,
Song Li
.
wisec 2022
:
169-174
[doi]
Voice Fingerprinting for Indoor Localization with a Single Microphone Array and Deep Learning
Shivenkumar Parmar
,
Xuyu Wang
,
Chao Yang 0025
,
Shiwen Mao
.
wisec 2022
:
21-26
[doi]
Breathe-to-Pair (B2P): Respiration-Based Pairing Protocol for Wearable Devices
Jafar Pourbemany
,
Ye Zhu 0001
,
Riccardo Bettati
.
wisec 2022
:
188-200
[doi]
Device Re-identification in LoRaWAN through Messages Linkage
Samuel Pélissier
,
Mathieu Cunche
,
Vincent Roca
,
Didier Donsez
.
wisec 2022
:
98-103
[doi]
Automating the Quantitative Analysis of Reproducibility for Build Artifacts derived from the Android Open Source Project
Manuel Pöll
,
Michael Roland 0001
.
wisec 2022
:
6-19
[doi]
On the Robustness of Wi-Fi Deauthentication Countermeasures
Domien Schepers
,
Aanjhan Ranganathan
,
Mathy Vanhoef
.
wisec 2022
:
245-256
[doi]
Can You Still See Me?: Identifying Robot Operations Over End-to-End Encrypted Channels
Ryan Shah
,
Chuadhry Mujeeb Ahmed
,
Shishir Nagaraja
.
wisec 2022
:
298-300
[doi]
Adversarial Metasurfaces: Metasurface-in-the-Middle Attack
Zhambyl Shaikhanov
,
Fahid Hassan
,
Hichem Guerboukha
,
Daniel M. Mittleman
,
Edward W. Knightly
.
wisec 2022
:
274-276
[doi]
Metasurface-in-the-Middle Attack: From Theory to Experiment
Zhambyl Shaikhanov
,
Fahid Hassan
,
Hichem Guerboukha
,
Daniel M. Mittleman
,
Edward W. Knightly
.
wisec 2022
:
257-267
[doi]
Analog Physical-Layer Relay Attacks with Application to Bluetooth and Phase-Based Ranging
Paul Staat
,
Kai Jansen
,
Christian T. Zenger
,
Harald Elders-Boll
,
Christof Paar
.
wisec 2022
:
60-72
[doi]
Passive Drone Localization Using LTE Signals
Mingshun Sun
,
Zhiwu Guo
,
Ming Li
,
Ryan M. Gerdes
.
wisec 2022
:
295-297
[doi]
A Post-Quantum Secure Subscription Concealed Identifier for 6G
Vincent Quentin Ulitzsch
,
Shinjo Park
,
Soundes Marzougui
,
Jean-Pierre Seifert
.
wisec 2022
:
157-168
[doi]
An Investigative Study on the Privacy Implications of Mobile E-scooter Rental Apps
Nisha Vinayaga-Sureshkanth
,
Raveen Wijewickrama
,
Anindya Maiti
,
Murtuza Jadliwala
.
wisec 2022
:
125-139
[doi]
BiasHacker: Voice Command Disruption by Exploiting Speaker Biases in Automatic Speech Recognition
Payton Walker
,
Nathan McClaran
,
Zihao Zheng
,
Nitesh Saxena
,
Guofei Gu
.
wisec 2022
:
119-124
[doi]
KNEW: Key Generation using NEural Networks from Wireless Channels
Xue Wei
,
Dola Saha
.
wisec 2022
:
45-50
[doi]
RRF: A Robust Radiometric Fingerprint System that Embraces Wireless Channel Diversity
Wenqing Yan
,
Thiemo Voigt
,
Christian Rohner
.
wisec 2022
:
85-97
[doi]
Angularly Dispersive Terahertz Links with Secure Coding: From Theoretical Foundations to Experiments
Chia-Yi Yeh
,
Alejandro Cohen
,
Rafael G. L. D'Oliveira
,
Muriel Médard
,
Daniel M. Mittleman
,
Edward W. Knightly
.
wisec 2022
:
268-273
[doi]
PITracker: Detecting Android PendingIntent Vulnerabilities through Intent Flow Analysis
Chennan Zhang
,
Shuang Li
,
Wenrui Diao
,
Shanqing Guo
.
wisec 2022
:
20-25
[doi]
Sign in
or
sign up
to see more results.