Author of the publication

LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks.

, , , , , , , and . USENIX Security Symposium, page 339-356. USENIX Association, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CPAC: securing critical infrastructure with cyber-physical access control., , , , and . ACSAC, page 139-152. ACM, (2016)BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy., , , , , , and . WOOT @ USENIX Security Symposium, USENIX Association, (2020)ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem., , , , , , , , , and 1 other author(s). USENIX Security Symposium, page 273-290. USENIX Association, (2018)M2MON: Building an MMIO-based Security Reference Monitor for Unmanned Vehicles., , , , , and . USENIX Security Symposium, page 285-302. USENIX Association, (2021)Towards Improving Container Security by Preventing Runtime Escapes., , , and . SecDev, page 38-46. IEEE, (2021)FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution., , , , and . CCS, page 2245-2262. ACM, (2017)A Hybrid Approach to Secure Function Evaluation using SGX., , , , , , , and . AsiaCCS, page 100-113. ACM, (2019)LBM: A Security Framework for Peripherals within the Linux Kernel., , , , , and . IEEE Symposium on Security and Privacy, page 967-984. IEEE, (2019)From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAY., , , , , , , , and . USENIX Security Symposium, page 913-930. USENIX Association, (2020)PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications., , , , , , , and . USENIX Security Symposium, page 249-266. USENIX Association, (2021)