Author of the publication

ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs.

, , , , , , , and . AsiaCCS, page 534-545. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reverse engineering and retrofitting robotic aerial vehicle control firmware using dispatch., , , , , , , , and . MobiSys, page 69-83. ACM, (2022)Cross-Layer Retrofitting of UAVs Against Cyber-Physical Attacks., , , , , , and . ICRA, page 550-557. IEEE, (2018)RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing., , , , , , , , and . USENIX Security Symposium, page 425-442. USENIX Association, (2019)FuzzUSB: Hybrid Stateful Fuzzing of USB Gadget Stacks., , , , , , and . SP, page 2212-2229. IEEE, (2022)LasAR: Laser Pointer Based Mobile Augmented Reality for E-Commerce Services., and . ICHIT (2), volume 310 of Communications in Computer and Information Science, page 333-341. Springer, (2012)PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications., , , , , , , and . USENIX Security Symposium, page 249-266. USENIX Association, (2021)DnD: A Cross-Architecture Deep Neural Network Decompiler., , , , and . USENIX Security Symposium, page 2135-2152. USENIX Association, (2022)From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAY., , , , , , , , and . USENIX Security Symposium, page 913-930. USENIX Association, (2020)ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs., , , , , , , and . AsiaCCS, page 534-545. ACM, (2022)QubeAR: Cube style QR code AR interaction., , and . ISMAR, page 363-364. IEEE Computer Society, (2014)