Follow
Fenghao Xu
Fenghao Xu
Verified email at ie.cuhk.edu.hk
Title
Cited by
Cited by
Year
Understanding android obfuscation techniques: A large-scale investigation in the wild
S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu, K Chen, X Wang, K Zhang
Security and privacy in communication networks: 14th international …, 2018
1692018
Badbluetooth: Breaking android security mechanisms via malicious bluetooth peripherals.
F Xu, W Diao, Z Li, J Chen, K Zhang
NDSS, 2019
612019
Kindness is a risky business: On the usage of the accessibility {APIs} in android
W Diao, Y Zhang, L Zhang, Z Li, F Xu, X Pan, X Liu, J Weng, K Zhang, ...
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
272019
Android on pc: On the security of end-user android emulators
F Xu, S Shen, W Diao, Z Li, Y Chen, R Li, K Zhang
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
82021
Identifying the ble misconfigurations of iot devices through companion mobile apps
J Du, F Xu, C Zhang, Z Zhang, X Liu, P Ren, W Diao, S Guo, K Zhang
2022 19th Annual IEEE International Conference on Sensing, Communication …, 2022
22022
Authorisation inconsistency in IoT third‐party integration
J Chen, F Xu, S Dong, W Sun, K Zhang
IET Information Security 16 (2), 133-143, 2022
12022
Living in the Past: Analyzing BLE IoT Devices Based on Mobile Companion Apps in Old Versions
J Du, Z Zhang, F Xu, W Diao
2023 19th International Conference on Mobility, Sensing and Networking (MSN …, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–7