Følg
Sihan Wang
Titel
Citeret af
Citeret af
År
Security threats from bitcoin wallet smartphone applications: Vulnerabilities, attacks, and countermeasures
Y Hu, S Wang, GH Tu, L Xiao, T Xie, X Lei, CY Li
Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021
242021
Insecurity of operational cellular IoT service: New vulnerabilities, attacks, and countermeasures
S Wang, GH Tu, X Lei, T Xie, CY Li, PY Chou, F Hsieh, Y Hu, L Xiao, ...
Proceedings of the 27th Annual International Conference on Mobile Computing …, 2021
102021
Uncovering insecure designs of cellular emergency services (911)
Y Hu, MY Chen, GH Tu, CY Li, S Wang, J Shi, T Xie, L Xiao, C Peng, ...
Proceedings of the 28th Annual International Conference on Mobile Computing …, 2022
92022
BFastPay: A routing-free protocol for fast payment in bitcoin network
X Lei, GH Tu, T Xie, S Wang
Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021
42021
Dissecting operational cellular iot service security: Attacks and defenses
S Wang, T Xie, MY Chen, GH Tu, CY Li, X Lei, PY Chou, F Hsieh, Y Hu, ...
IEEE/ACM Transactions on Networking 32 (2), 1229-1244, 2023
22023
MPKIX: Towards More Accountable and Secure Internet Application Services via Mobile Networked Systems
T Xie*, S Wang*, X Lei, J Shi, GH Tu, CY Li
IEEE Transactions on Mobile Computing, 2022
22022
Unveiling the Insecurity of Operational Cellular Emergency Services (911): Vulnerabilities, Attacks, and Countermeasures
Y Hu, MY Chen, GH Tu, CY Li, S Wang, J Shi, T Xie, L Xiao, C Peng, ...
GetMobile: Mobile Computing and Communications 27 (1), 39-43, 2023
12023
Exploring the insecurity of google account registration protocol via model checking
T Xie, S Wang, GH Tu, CY Li, X Lei
2019 IEEE Symposium Series on Computational Intelligence (SSCI), 3087-3096, 2019
12019
IMS is Not That Secure on Your 5G/4G Phones
J Shi*, S Wang*, MY Chen, GH Tu, T Xie, MH Chen, Y Hu, CY Li, C Peng
Proceedings of the 30th Annual International Conference on Mobile Computing …, 2024
2024
Taming the Insecurity of Cellular Emergency Services (9-1-1): From Vulnerabilities to Secure Designs
MY Chen, Y Hu, GH Tu, CY Li, S Wang, J Shi, T Xie, RC Hsu, L Xiao, ...
IEEE/ACM Transactions on Networking, 2024
2024
When Good Turns Evil: Encrypted 5G/4G Voice Calls Can Leak Your Identities
J Shi, T Xie, GH Tu, C Peng, CY Li, A Hou, S Wang, Y Hu, X Lei, MY Chen, ...
2023 IEEE Conference on Communications and Network Security (CNS), 1-9, 2023
2023
Systemet kan ikke foretage handlingen nu. Prøv igen senere.
Artikler 1–11