Cited By
View all- Yuan BYang MXu ZChen QSong ZLi ZZou DJin H(2024)Leakage of Authorization-Data in IoT Device Sharing: New Attacks and CountermeasureIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.332371321:4(3196-3210)Online publication date: 1-Jul-2024
- Yuan BJia YXing LZhao DWang XZou DJin HZhang YCapkun SRoesner F(2020)Shattered chain of trustProceedings of the 29th USENIX Conference on Security Symposium10.5555/3489212.3489279(1183-1200)Online publication date: 12-Aug-2020