Fenghao Xu
Fenghao Xu
Verified email at
Cited by
Cited by
Understanding android obfuscation techniques: A large-scale investigation in the wild
S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu, K Chen, X Wang, K Zhang
Security and Privacy in Communication Networks: 14th International …, 2018
Badbluetooth: Breaking android security mechanisms via malicious bluetooth peripherals.
F Xu, W Diao, Z Li, J Chen, K Zhang
NDSS, 2019
Kindness is a Risky Business: On the Usage of the Accessibility {APIs} in Android
W Diao, Y Zhang, L Zhang, Z Li, F Xu, X Pan, X Liu, J Weng, K Zhang, ...
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
Android on pc: On the security of end-user android emulators
F Xu, S Shen, W Diao, Z Li, Y Chen, R Li, K Zhang
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
Identifying the BLE Misconfigurations of IoT Devices through Companion Mobile Apps
J Du, F Xu, C Zhang, Z Zhang, X Liu, P Ren, W Diao, S Guo, K Zhang
2022 19th Annual IEEE International Conference on Sensing, Communication …, 2022
Authorisation inconsistency in IoT third‐party integration
J Chen, F Xu, S Dong, W Sun, K Zhang
IET Information Security 16 (2), 133-143, 2022
The system can't perform the operation now. Try again later.
Articles 1–6