Home
People
Publications
Join US
Contact
1
Cross Miniapp Request Forgery: Root Causes, Attacks, and Vulnerability Detection
Click the Cite button above to demo the feature to enable visitors to import publication metadata into their reference management software. Supplementary notes can be added here, including [code and math](https://wowchemy.
Yuqing Yang
,
Yue Zhang
,
Zhiqiang Lin
PDF
Cite
When Good Becomes Evil: Tracking Bluetooth Low Energy Devices via Allowlist-based Side Channel and Its Countermeasure
Click the Cite button above to demo the feature to enable visitors to import publication metadata into their reference management software. Supplementary notes can be added here, including [code and math](https://wowchemy.
Yue Zhang
,
Zhiqiang Lin
PDF
Cite
I’m Spartacus, No, I’m Spartacus: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior
Click the Cite button above to demo the feature to enable visitors to import publication metadata into their reference management software. Supplementary notes can be added here, including [code and math](https://wowchemy.
Penghui Zhang
,
Zhibo (Eric) Sun
,
Sukwha Kyung
,
Hans Walter Behrens
,
Zion Leonahenahe Basque
,
Haehyun Cho
,
Adam Oest
,
Ruoyu Wang
,
Tiffany Bao
,
Yan Shoshitaishvili
,
Adam Doupe
,
Gail-Joon Ahn
PDF
Cite
Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service
Click the Cite button above to demo the feature to enable visitors to import publication metadata into their reference management software. Supplementary notes can be added here, including [code and math](https://wowchemy.
Zhibo (Eric) Sun
,
Adam Oest
,
Penghui Zhang
,
Carlos Rubio-Medrano
,
Tiffany Bao
,
Ruoyu Wang
,
Ziming Zhao
,
Yan Shoshitaishvili
,
Adam Doupe
,
Gail-Joon Ahn
PDF
Cite
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing
Click the Cite button above to demo the feature to enable visitors to import publication metadata into their reference management software. Supplementary notes can be added here, including [code and math](https://wowchemy.
Penghui Zhang
,
Adam Oest
,
Haehyun Cho
,
Zhibo (Eric) Sun
,
RC Johnson
,
Brad Wardman
,
Shaown Sarker
,
Alexandros Kapravelos
,
Tiffany Bao
,
Ruoyu Wang
,
Yan Shoshitaishvili
,
Adam Doupe
,
Gail-Joon Ahn
PDF
Cite
Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks
Click the Cite button above to demo the feature to enable visitors to import publication metadata into their reference management software. Supplementary notes can be added here, including [code and math](https://wowchemy.
Yue Zhang
,
Jian Weng
,
Rajib Dey
,
Yier Jin
,
Zhiqiang Lin
,
Xinwen Fu
PDF
Cite
«
Cite
×