Bryan Pearson

According to our database1, Bryan Pearson authored at least 14 papers between 2017 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
On Security of TrustZone-M-Based IoT Systems.
IEEE Internet Things J., 2022

FUME: Fuzzing Message Queuing Telemetry Transport Brokers.
Proceedings of the IEEE INFOCOM 2022, 2022

Implication of Animation on Android Security.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

On Security of Proof-of-Policy (PoP) in the Execute-Order-Validate Blockchain Paradigm.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

2021
Secure boot, trusted boot and remote attestation for ARM TrustZone-based IoT Nodes.
J. Syst. Archit., 2021

Prison Break of Android Reflection Restriction and Defense.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

On Automating BACnet Device Discovery and Property Identification.
Proceedings of the ICC 2021, 2021

2020
BLESS: A BLE Application Security Scanning Framework.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

SIC<sup>2</sup>: Securing Microcontroller Based IoT Devices with Low-cost Crypto Coprocessors.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

2019
Building a Low-Cost and State-of-the-Art IoT Security Hands-On Laboratory.
Proceedings of the Internet of Things. A Confluence of Many Disciplines, 2019

Microcontroller Based IoT System Firmware Security: Case Studies.
Proceedings of the IEEE International Conference on Industrial Internet, 2019

On Misconception of Hardware and Cost in IoT Security and Privacy.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
On the Security and Data Integrity of Low-Cost Sensor Networks for Air Quality Monitoring.
Sensors, 2018

2017
Exploitations of wireless interfaces via network scanning.
Proceedings of the 2017 International Conference on Computing, 2017


  Loading...