Author of the publication

Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations.

, , , , and . AsiaCCS, page 501-515. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SeamBlue: Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices., , , and . EWSN, page 132-143. Junction Publishing, Canada / ACM, (2017)LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE., , , and . NDSS, The Internet Society, (2018)Analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating users' privacy., , , , and . WISEC, page 133-143. ACM, (2020)Opening Pandora's box through ATFuzzer: dynamic analysis of AT interface for Android smartphones., , , , and . ACSAC, page 529-543. ACM, (2019)Logic Gone Astray: A Security Analysis Framework for the Control Plane Protocols of 5G Basebands., , , , , , and . USENIX Security Symposium, USENIX Association, (2024)In Wallet We Trust: Bypassing the Digital Wallets Payment Security for Free Shopping., , and . USENIX Security Symposium, USENIX Association, (2024)ATFuzzer: Dynamic Analysis Framework of AT Interface for Android Smartphones., , , , and . DTRAP, 1 (4): 23:1-23:29 (2020)Secure Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices., , , and . IEEE Trans. Mob. Comput., 17 (4): 927-944 (2018)Insecure connection bootstrapping in cellular networks: the root of all evil., , , , and . WiSec, page 1-11. ACM, (2019)5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol., , , , and . ACM Conference on Computer and Communications Security, page 669-684. ACM, (2019)