Jianliang Wu

Orcid: 0000-0002-4254-7261

Affiliations:
  • Simon Fraser University (SFU), Burnaby, BC, Canada
  • Purdue University, PurSec Lab, West Lafayette, IN, USA (former, PhD 2023)
  • Shandong University, Jinan, China (former)


According to our database1, Jianliang Wu authored at least 17 papers between 2014 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Securing Bluetooth Across Layers: A Systematic Review of Protection Strategies.
GetMobile Mob. Comput. Commun., March, 2025

Why Am I Seeing Double? An Investigation of Device Management Flaws in Voice Assistant Platforms.
Proc. Priv. Enhancing Technol., 2025

CSFuzzer: A grey-box fuzzer for network protocol using context-aware state feedback.
Comput. Secur., 2025

VeriBin: Adaptive Verification of Patches at the Binary Level.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025

2024
Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations.
Proceedings of the 33rd USENIX Security Symposium, 2024

SoK: The Long Journey of Exploiting and Defending the Legacy of King Harald Bluetooth.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

MiniBLE: Exploring Insecure BLE API Usages in Mini-Programs.
Proceedings of the ACM Workshop on Secure and Trustworthy Superapps, SaTS 2024, 2024

2023
Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
ProFactory: Improving IoT Security via Formalized Protocol Customization.
Proceedings of the 31st USENIX Security Symposium, 2022

Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2021
LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy.
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020

BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

2015
PaddyFrog: systematically detecting confused deputy vulnerability in Android applications.
Secur. Commun. Networks, 2015

All Your Sessions Are Belong to Us: Investigating Authenticator Leakage through Backup Channels on Android.
Proceedings of the 20th International Conference on Engineering of Complex Computer Systems, 2015

Automatically Detecting SSL Error-Handling Vulnerabilities in Hybrid Mobile Web Apps.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
TrustFound: Towards a Formal Foundation for Model Checking Trusted Computing Platforms.
Proceedings of the FM 2014: Formal Methods, 2014


  Loading...