Wei Zhou

Orcid: 0000-0001-7834-0839

Affiliations:
  • University of Chinese Academy of Sciences, National Computer Network Intrusion Protection Center, Beijing, China


According to our database1, Wei Zhou authored at least 15 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Unveiling IoT Security in Reality: A Firmware-Centric Journey.
Proceedings of the 33rd USENIX Security Symposium, 2024

2023
CEFI: Command Execution Flow Integrity for Embedded Devices.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2023

2022
Fingerprinting Mainstream IoT Platforms Using Traffic Analysis.
IEEE Internet Things J., 2022

What Your Firmware Tells You Is Not How You Should Emulate It: A Specification-Guided Approach for Firmware Emulation.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Reviewing IoT Security via Logic Bugs in IoT Platforms and Systems.
IEEE Internet Things J., 2021

Automatic Firmware Emulation through Invalidity-guided Knowledge Inference (Extended Version).
CoRR, 2021

Automatic Firmware Emulation through Invalidity-guided Knowledge Inference.
Proceedings of the 30th USENIX Security Symposium, 2021

2019
The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved.
IEEE Internet Things J., 2019

Logic Bugs in IoT Platforms and Systems: A Review.
CoRR, 2019

Good Motive but Bad Design: Why ARM MPU Has Become an Outcast in Embedded Systems.
CoRR, 2019

Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms.
Proceedings of the 28th USENIX Security Symposium, 2019

Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
Phantom Device Attack: Uncovering the Security Implications of the Interactions among Devices, IoT Cloud, and Mobile Apps.
CoRR, 2018

The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved.
CoRR, 2018

SCPN-based Game Model for Security Situational Awareness in the Intenet of Things.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018


  Loading...