Haohuang Wen

According to our database1, Haohuang Wen authored at least 13 papers between 2018 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Egg Hunt in Tesla Infotainment: A First Look at Reverse Engineering of Qt Binaries.
Proceedings of the 32nd USENIX Security Symposium, 2023

Thwarting Smartphone SMS Attacks at the Radio Interface Layer.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

2022
Replay (Far) Away: Exploiting and Fixing Google/Apple Exposure Notification Contact Tracing.
Proc. Priv. Enhancing Technol., 2022

What You See is Not What You Get: Revealing Hidden Memory Mapping for Peripheral Modeling.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

A fine-grained telemetry stream for security services in 5G open radio access networks.
Proceedings of the 1st International Workshop on Emerging Topics in Wireless, 2022

2020
Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air Attack Surface in Automotive IoT.
Proceedings of the 29th USENIX Security Symposium, 2020

On the Accuracy of Measured Proximity of Bluetooth-Based Contact Tracing Apps.
Proceedings of the Security and Privacy in Communication Networks, 2020

A Study of the Privacy of COVID-19 Contact Tracing Apps.
Proceedings of the Security and Privacy in Communication Networks, 2020

Automated Cross-Platform Reverse Engineering of CAN Bus Commands From Mobile Apps.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

FirmXRay: Detecting Bluetooth Link Layer Vulnerabilities From Bare-Metal Firmware.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
ParGen: A Parallel Method for Partitioning Data Stream Applications in Mobile Edge Computing.
IEEE Access, 2018

An Empirical Study of SDK Credential Misuse in iOS Apps.
Proceedings of the 25th Asia-Pacific Software Engineering Conference, 2018


  Loading...