Follow
Jianliang Wu
Jianliang Wu
Verified email at sfu.ca - Homepage
Title
Cited by
Cited by
Year
{BLESA}: Spoofing attacks against reconnections in bluetooth low energy
J Wu, Y Nan, V Kumar, DJ Tian, A Bianchi, M Payer, D Xu
14th USENIX Workshop on Offensive Technologies (WOOT 20), 2020
672020
{LIGHTBLUE}: Automatic {Profile-Aware} Debloating of Bluetooth Stacks
J Wu, R Wu, D Antonioli, M Payer, NO Tippenhauer, D Xu, DJ Tian, ...
30th USENIX Security Symposium (USENIX Security 21), 339-356, 2021
43*2021
{BlueShield}: Detecting spoofing attacks in bluetooth low energy networks
J Wu, Y Nan, V Kumar, M Payer, D Xu
23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020
402020
Formal model-driven discovery of bluetooth protocol design vulnerabilities
J Wu, R Wu, D Xu, DJ Tian, A Bianchi
2022 IEEE Symposium on Security and Privacy (SP), 2285-2303, 2022
332022
TrustFound: Towards a Formal Foundation for Model Checking Trusted Computing Platforms
G Bai, J Hao, J Wu, Y Liu, Z Liang, A Martin
FM 2014: Formal Methods: 19th International Symposium, Singapore, May 12-16 …, 2014
322014
Automatically detecting ssl error-handling vulnerabilities in hybrid mobile web apps
C Zuo, J Wu, S Guo
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
312015
Are you spying on me?{Large-Scale} analysis on {IoT} data exposure through companion apps
Y Nan, X Wang, L Xing, X Liao, R Wu, J Wu, Y Zhang, XF Wang
32nd USENIX Security Symposium (USENIX Security 23), 6665-6682, 2023
302023
Paddyfrog: systematically detecting confused deputy vulnerability in android applications
J Wu, T Cui, T Ban, S Guo, L Cui
Security and Communication Networks 8 (13), 2338-2349, 2015
302015
All your sessions are belong to us: Investigating authenticator leakage through backup channels on android
G Bai, J Sun, J Wu, Q Ye, L Li, JS Dong, S Guo
2015 20th International Conference on Engineering of Complex Computer …, 2015
242015
Sok: The long journey of exploiting and defending the legacy of king harald bluetooth
J Wu, R Wu, D Xu, DJ Tian, A Bianchi
2024 IEEE Symposium on Security and Privacy (SP), 2847-228066, 2024
172024
Dave (Jing) Tian, Antonio Bianchi, Mathias Payer, and Dongyan Xu. BLESA: spoofing attacks against reconnections in bluetooth low energy
J Wu, Y Nan, V Kumar
Proceedings of the USENIX Workshop on Offensive Technologies (WOOT), 2020
122020
{ProFactory}: Improving {IoT} Security via Formalized Protocol Customization
F Wang, J Wu, Y Nan, Y Aafer, X Zhang, D Xu, M Payer
31st USENIX Security Symposium (USENIX Security 22), 3879-3896, 2022
82022
Why Am I Seeing Double? An Investigation of Device Management Flaws in Voice Assistant Platforms
MO Ozmen, MO Sakaoglu, J Bizjak, J Wu, A Bianchi, DJ Tian, ZB Celik
Proceedings on Privacy Enhancing Technologies YYYY (X) 1, 15, 2024
12024
Policy-based Discovery and Patching of Logic Bugs in Robotic Vehicles
H Kim, MO Ozmen, A Bianchi, ZB Celik, D Xu
Proceedings of the Workshop on Automotive and Autonomous Vehicle Security …, 2022
12022
Finding traceability attacks in the bluetooth low energy specification and its implementations
J Wu, P Traynor, D Xu, DJ Tian, A Bianchi
33rd USENIX Security Symposium (USENIX Security 24), 4499-4516, 2024
2024
MiniBLE: Exploring Insecure BLE API Usages in Mini-Programs
Z Zhang, J Du, W Diao, J Wu
Proceedings of the ACM Workshop on Secure and Trustworthy Superapps, 18-22, 2023
2023
thesis. pdf
J Wu
Purdue University Graduate School, 2023
2023
VERIBIN: Adaptive Verification of Patches at the Binary Level
H Wu, J Wu, R Wu, A Sharma, A Machiry, A Bianchi
The system can't perform the operation now. Try again later.
Articles 1–18