-
Notifications
You must be signed in to change notification settings - Fork 0
/
index.xml
313 lines (298 loc) · 24.8 KB
/
index.xml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Antonio Bianchi</title>
<link>/</link>
<description>Recent content on Antonio Bianchi</description>
<generator>Source Themes Academic (https://sourcethemes.com/academic/)</generator>
<language>en-us</language>
<lastBuildDate>Sat, 01 Jun 2030 13:00:00 +0000</lastBuildDate>
<atom:link href="/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Recent & Upcoming Talks</title>
<link>/talk/</link>
<pubDate>Sat, 01 Jun 2030 13:00:00 +0000</pubDate>
<guid>/talk/</guid>
<description></description>
</item>
<item>
<title>Teaching</title>
<link>/teaching/</link>
<pubDate>Mon, 01 Jan 2024 00:00:00 +0000</pubDate>
<guid>/teaching/</guid>
<description></description>
</item>
<item>
<title>Posts</title>
<link>/posts/</link>
<pubDate>Tue, 28 May 2019 00:00:00 +0000</pubDate>
<guid>/posts/</guid>
<description></description>
</item>
<item>
<title>Courses</title>
<link>/courses/</link>
<pubDate>Sun, 05 May 2019 00:00:00 +0100</pubDate>
<guid>/courses/</guid>
<description></description>
</item>
<item>
<title>Publication List</title>
<link>/publications/</link>
<pubDate>Sun, 07 Apr 2019 00:00:00 +0000</pubDate>
<guid>/publications/</guid>
<description><hr>
<h2 id="-selected-publications"><strong>⏺ Selected Publications</strong></h2>
<p><em>My full list of publications and citations is available on <a href="https://scholar.google.com/citations?user=RMm4j1AAAAAJ">Google Scholar</a>.</em></p>
<p><strong>Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations</strong><br>
Jianliang Wu, Patrick Traynor, Dongyan Xu, Dave Jing Tian, <strong>Antonio Bianchi</strong>.<br>
<em>To appear in Proceedings of the USENIX Security Symposium (Usenix SEC), 2024</em><br>
<a href="https://www.usenix.org/system/files/sec23winter-prepub-159-wu-jianliang.pdf">[PDF]</a></p>
<hr>
<p><strong>SoK: The Long Journey of Exploiting and Defending the Legacy of King Harald Bluetooth</strong><br>
Jianliang Wu, Ruoyu Wu, Dongyan Xu, Dave Tian, <strong>Antonio Bianchi</strong>.<br>
<em>In Proceedings of the 45th IEEE Symposium on Security and Privacy (S&amp;P), 2024</em><br>
<a href="https://allenjlw.github.io/pdfpapers/btsok.pdf">[PDF]</a></p>
<hr>
<p><strong>Automated Detection of Cryptographic Inconsistencies in Android’s Keymaster Implementations</strong><br>
Abdullah Imran, <strong>Antonio Bianchi.</strong><br>
<em>In Proceedings of the Annual International Conference on Mobile Systems, Applications, and Services (MobiSys), 2024</em><br>
<a href="https://dl.acm.org/doi/pdf/10.1145/3643832.3661893">[PDF]</a></p>
<hr>
<p><strong>Wear’s my Data? Understanding the Cross-Device Runtime Permission Model in Wearables</strong><br>
Doguhan Yeke, Muhammad Ibrahim, Güliz Seray Tuncay, Habiba Farrukh, Abdullah Imran, <strong>Antonio Bianchi</strong>, Z Berkay Celik.<br>
<em>In Proceedings of the 45th IEEE Symposium on Security and Privacy (S&amp;P), 2024</em><br>
<a href="https://storage.googleapis.com/gweb-research2023-media/pubtools/7766.pdf">[PDF]</a></p>
<hr>
<p><strong>PatchVerif: Discovering Faulty Patches in Robotic Vehicles</strong><br>
Hyungsub Kim, Muslum Ozgur Ozmen, Z. Berkay Celik, <strong>Antonio Bianchi</strong>, Dongyan Xu.<br>
<em>In Proceeding of the USENIX Security Symposium (Usenix SEC), 2023</em><br>
<a href="https://kimhyungsub.github.io/USENIX23_hskim.pdf">[PDF]</a></p>
<hr>
<p><strong>DnD: A Cross-Architecture Deep Neural Network Decompiler</strong><br>
Ruoyu Wu, Taegyu Kim, Dave (Jing) Tian, <strong>Antonio Bianchi</strong>, Dongyan Xu.<br>
<em>In Proceeding of the USENIX Security Symposium (Usenix SEC), 2022</em><br>
<a href="https://www.usenix.org/system/files/sec22-wu-ruoyu.pdf">[PDF]</a></p>
<hr>
<p><strong>PGPATCH: Policy-Guided Logic Bug Patching for Robotic Vehicles</strong><br>
Hyungsub Kim, Muslum Ozgur Ozmen, Z. Berkay Celik, <strong>Antonio Bianchi</strong>, Dongyan Xu.<br>
<em>In Proceeding of the IEEE Symposium on Security and Privacy (S&amp;P), 2022.</em><br>
<a href="https://kimhyungsub.github.io/S&amp;P22_hskim.pdf">[PDF]</a></p>
<hr>
<p><strong>Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities</strong><br>
Jianliang Wu, Ruoyu Wu, Dongyan Xu, Dave (Jing) Tian, <strong>Antonio Bianchi</strong>.<br>
<em>In Proceeding of the IEEE Symposium on Security and Privacy (S&amp;P), 2022.</em><br>
<a href="https://www.cs.purdue.edu/homes/dxu/pubs/SP22.pdf">[PDF]</a></p>
<hr>
<p><strong>SafetyNot: on the usage of the SafetyNet attestation API in Android</strong><br>
Muhammad Ibrahim, Abdullah Imran, <strong>Antonio Bianchi</strong>.<br>
<em>In Proceedings of the 19th Annual International Conference on Mobile Systems, Applications, and Services, 2021.</em><br>
<a href="https://dl.acm.org/doi/pdf/10.1145/3458864.3466627">[PDF]</a></p>
<hr>
<p><strong>LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks</strong><br>
Jianliang Wu, Ruoyu Wu, Daniele Antonioli, Mathias Payer, Nils Ole Tippenhauer, Dongyan Xu, Dave (Jing) Tian, and <strong>Antonio Bianchi</strong>.<br>
<em>In Proceedings of the USENIX Security Symposium (Security), 2021.</em><br>
<a href="https://github.com/daveti/papers/raw/master/security21/lb.pdf">[PDF]</a></p>
<hr>
<p><strong>On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices</strong><br>
Zeyu Lei, Yuhong Nan, Yanick Fratantonio, <strong>Antonio Bianchi</strong>.<br>
<em>In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2021.</em><br>
<a href="https://www.ndss-symposium.org/wp-content/uploads/ndss2021_3B-4_24212_paper.pdf">[PDF]</a></p>
<hr>
<hr>
<h2 id="-publications"><strong>⏺ Publications</strong></h2>
<p><strong>ATTention Please! An Investigation of the App Tracking Transparency Permission</strong><br>
Reham Mohamed, Arjun Arunasalam, Habiba Farrukh, Jason Tong, <strong>Antonio Bianchi</strong>, Z Berkay Celik.<br>
<em>To appear in Proceedings of the USENIX Security Symposium (Usenix SEC), 2024</em><br>
<a href="https://www.usenix.org/system/files/sec24summer-prepub-1232-mohamed.pdf">[PDF]</a></p>
<hr>
<p><strong>Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations</strong><br>
Jianliang Wu, Patrick Traynor, Dongyan Xu, Dave Jing Tian, <strong>Antonio Bianchi</strong>.<br>
<em>To appear in Proceedings of the USENIX Security Symposium (Usenix SEC), 2024</em><br>
<a href="https://www.usenix.org/system/files/sec23winter-prepub-159-wu-jianliang.pdf">[PDF]</a></p>
<hr>
<p><strong>Automated Detection of Cryptographic Inconsistencies in Android’s Keymaster Implementations</strong><br>
Abdullah Imran, <strong>Antonio Bianchi.</strong><br>
<em>In Proceedings of the Annual International Conference on Mobile Systems, Applications, and Services (MobiSys), 2024</em><br>
<a href="https://dl.acm.org/doi/pdf/10.1145/3643832.3661893">[PDF]</a></p>
<hr>
<p><strong>A Systematic Study of Physical Sensor Attack Hardness</strong><br>
Hyungsub Kim, Rwitam Bandyopadhyay, Muslum Ozgur Ozmen, Z. Berkay Celik, <strong>Antonio Bianchi</strong>, Yongdae Kim, Dongyan Xu.<br>
<em>In Proceedings of the 45th IEEE Symposium on Security and Privacy (S&amp;P), 2024</em><br>
<a href="https://kimhyungsub.github.io/S&amp;P24_hskim.pdf">[PDF]</a></p>
<hr>
<p><strong>SoK: The Long Journey of Exploiting and Defending the Legacy of King Harald Bluetooth</strong><br>
Jianliang Wu, Ruoyu Wu, Dongyan Xu, Dave Tian, <strong>Antonio Bianchi</strong>.<br>
<em>In Proceedings of the 45th IEEE Symposium on Security and Privacy (S&amp;P), 2024</em><br>
<a href="https://allenjlw.github.io/pdfpapers/btsok.pdf">[PDF]</a></p>
<hr>
<p><strong>Wear’s my Data? Understanding the Cross-Device Runtime Permission Model in Wearables</strong><br>
Doguhan Yeke, Muhammad Ibrahim, Güliz Seray Tuncay, Habiba Farrukh, Abdullah Imran, <strong>Antonio Bianchi</strong>, Z Berkay Celik.<br>
<em>In Proceedings of the 45th IEEE Symposium on Security and Privacy (S&amp;P), 2024</em><br>
<a href="https://storage.googleapis.com/gweb-research2023-media/pubtools/7766.pdf">[PDF]</a></p>
<hr>
<p><strong>Crystallizer: A Hybrid Path Analysis Framework to Aid in Uncovering Deserialization Vulnerabilities</strong><br>
Prashast Srivastava, Flavio Toffalini, Kostyantyn Vorobyov, François Gauthier, <strong>Antonio Bianchi</strong>, Mathias Payer.<br>
<em>In Proceedings of the ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (FSE), 2023</em><br>
<a href="https://www.nebelwelt.net/files/23FSE.pdf">[PDF]</a></p>
<hr>
<p><strong>Making Sense of Constellations: Methodologies for Understanding Starlink&rsquo;s Scheduling Algorithms</strong><br>
Hammas Bin Tanveer, Mike Puchol, Rachee Singh, <strong>Antonio Bianchi</strong>, Rishab Nithyanand.<br>
<em>In Companion of the International Conference on emerging Networking EXperiments and Technologies (CoNEXT), 2023</em><br>
<a href="https://dl.acm.org/doi/pdf/10.1145/3624354.3630586">[PDF]</a></p>
<hr>
<p><strong>Demo: Discovering Faulty Patches in Robotic Vehicle Control Software</strong><br>
Hyungsub Kim, Muslum Ozgur Ozmen, Z. Berkay Celik, <strong>Antonio Bianchi</strong>, Dongyan Xu.<br>
<em>In Proceedings of the Inaugural ISOC Symposium on Vehicle Security and Privacy (VehicleSec), 2023</em><br>
<a href="https://kimhyungsub.github.io/VehicleSec23_Demo_PatchVerif.pdf">[PDF]</a></p>
<hr>
<p><strong>Short: Rethinking Secure Pairing in Drone Swarms</strong><br>
Muslum Ozgur Ozmen, Habiba Farrukh, Hyungsub Kim, <strong>Antonio Bianchi</strong>, Z. Berkay Celik.<br>
<em>In Proceedings of the Inaugural ISOC Symposium on Vehicle Security and Privacy (VehicleSec), 2023</em><br>
<a href="https://kimhyungsub.github.io/VehicleSec23_secure_pairing.pdf">[PDF]</a></p>
<hr>
<p><strong>AoT-Attack on Things: A security analysis of IoT firmware updates</strong><br>
Muhammad Ibrahim, Andrea Continella, <strong>Antonio Bianchi</strong>.<br>
<em>In Proceedings of The 8th IEEE European Symposium on Security and Privacy (EuroS&amp;P 2023)</em><br>
<a href="https://ris.utwente.nl/ws/files/303815289/main.pdf">[PDF]</a></p>
<hr>
<p><strong>Fuzzing SGX enclaves via host program mutations</strong><br>
Arslan Khan, Muqi Zou, Kyungtae Kim, Dongyan Xu, <strong>Antonio Bianchi</strong>, Dave Jing Tian.<br>
<em>In Proceedings of The 8th IEEE European Symposium on Security and Privacy (EuroS&amp;P 2023)</em><br>
<a href="https://arslan8.github.io/fuzzsgx.pdf">[PDF]</a></p>
<hr>
<p><strong>LocIn: Inferring Semantic Location from Spatial Maps in Mixed Reality</strong><br>
Habiba Farrukh, Reham Mohamed, Aniket Nare, <strong>Antonio Bianchi</strong>, Z. Berkay Celik.<br>
<em>In Proceedings of the USENIX Security Symposium (Usenix SEC), 2023</em><br>
<a href="https://www.usenix.org/system/files/usenixsecurity23-farrukh.pdf">[PDF]</a></p>
<hr>
<p><strong>Discovering Adversarial Driving Maneuvers against Autonomous Vehicles</strong><br>
Ruoyu Song, Muslum Ozgur Ozmen, Hyungsub Kim, Raymond Muller, Z. Berkay Celik, <strong>Antonio Bianchi</strong>.<br>
<em>In Proceeding of the USENIX Security Symposium (Usenix SEC), 2023</em><br>
<a href="https://www.usenix.org/system/files/usenixsecurity23-song.pdf">[PDF]</a></p>
<hr>
<p><strong>ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions</strong><br>
Siddharth Muralee, Igibek Koishybayev, Aleksandr Nahapetyan, Greg Tystahl, Brad Reaves, <strong>Antonio Bianchi</strong>, William Enck, Alexandros Kapravelos, Aravind Machiry.<br>
<em>In Proceedings of the USENIX Security Symposium (Usenix SEC), 2023</em><br>
<a href="https://www.usenix.org/system/files/usenixsecurity23-muralee.pdf">[PDF]</a></p>
<hr>
<p><strong>PatchVerif: Discovering Faulty Patches in Robotic Vehicles</strong><br>
Hyungsub Kim, Muslum Ozgur Ozmen, Z. Berkay Celik, <strong>Antonio Bianchi</strong>, Dongyan Xu.<br>
<em>In Proceeding of the USENIX Security Symposium (Usenix SEC), 2023</em><br>
<a href="https://kimhyungsub.github.io/USENIX23_hskim.pdf">[PDF]</a></p>
<hr>
<p><strong>Fuzz The Power: Dual-role State Guided Black-box Fuzzing for USB Power Delivery</strong><br>
Kyungtae Kim, Sungwoo Kim, Kevin RB Butler, <strong>Antonio Bianchi</strong>, Rick Kennell, Dave Jing Tian.<br>
<em>In Proceeding of the USENIX Security Symposium (Usenix SEC), 2023</em><br>
<a href="https://www.usenix.org/system/files/usenixsecurity23-kim-kyungtae.pdf">[PDF]</a></p>
<hr>
<p><strong>COLUMBUS: Android App Testing Through Systematic Callback Exploration</strong><br>
Priyanka Bose, Dipanjan Das, Saastha Vasan, Sebastiano Mariani, Ilya Grishchenko, Andrea Continella, <strong>Antonio Bianchi</strong>, Christopher Kruegel, Giovanni Vigna.
<em>In Proceedings of the International Conference on Software Engineering (ICSE), 2023</em><br>
<a href="https://arxiv.org/pdf/2302.09116.pdf">[PDF]</a></p>
<hr>
<p><strong>DnD: Decompiling Deep Neural Network Compiled Binary</strong><br>
Ruoyu Wu, Taegyu Kim, Dave (Jing) Tian, <strong>Antonio Bianchi</strong>, Dongyan Xu<br>
<em>Black Hat Europe 2022</em></p>
<hr>
<p><strong>Demo: Policy-based Discovery and Patching of Logic Bugs in Robotic Vehicles</strong><br>
Hyungsub Kim, Muslum Ozgur Ozmen, <strong>Antonio Bianchi</strong>, Z. Berkay Celik, Dongyan Xu.<br>
<em>In Proceedings of the Automotive and Autonomous Vehicle Security Workshop (AutoSec 2022)</em><br>
<a href="https://kimhyungsub.github.io/AutoSec21_hskim.pdf">[PDF]</a></p>
<hr>
<p><strong>ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs</strong><br>
Sungwoo Kim, Gisu Yeo, Taegyu Kim, Junghwan &ldquo;John&rdquo; Rhee, Yuseok Jeon, <strong>Antonio Bianchi</strong>, Dongyan Xu, and Dave (Jing) Tian.<br>
<em>In Proceedings of the ACM Asia Conference on Computer and Communications Security (ASIA CCS ’22), 2022</em><br>
<a href="https://dl.acm.org/doi/pdf/10.1145/3488932.3523263">[PDF]</a></p>
<hr>
<p><strong>TruEMU: An Extensible, Open-Source, Whole-System iOS Emulator</strong><br>
Trung Nguyen, Kyungtae Kim, <strong>Antonio Bianchi</strong>, Dave (Jing) Tian.<br>
<em>Black Hat 2022</em><br>
<a href="https://www.blackhat.com/us-22/briefings/schedule/#truemu-an-extensible-open-source-whole-system-ios-emulator-27223">[Slides]</a>, <a href="https://www.youtube.com/watch?v=PBeIW2PDFVk">[Video]</a></p>
<hr>
<p><strong>DnD: A Cross-Architecture Deep Neural Network Decompiler</strong><br>
Ruoyu Wu, Taegyu Kim, Dave (Jing) Tian, <strong>Antonio Bianchi</strong>, Dongyan Xu<br>
<em>In Proceeding of the USENIX Security Symposium (Usenix SEC), 2022</em><br>
<a href="https://www.usenix.org/system/files/sec22-wu-ruoyu.pdf">[PDF]</a></p>
<hr>
<p><strong>SARA: Secure Android Remote Authorization</strong><br>
Abdullah Imran, Habiba Farrukh, Muhammad Ibrahim, Z. Berkay Celik, <strong>Antonio Bianchi</strong>.<br>
<em>In Proceeding of the USENIX Security Symposium (Usenix SEC), 2022</em><br>
<a href="https://www.usenix.org/system/files/sec22-imran.pdf">[PDF]</a></p>
<hr>
<p><strong>One Fuzz Doesn’t Fit All: Optimizing Directed Fuzzing via Target-tailored Program State Restriction</strong><br>
Prashast Srivastava, Stefan Nagy, Matthew Hicks, <strong>Antonio Bianchi</strong>, Mathias Payer.<br>
<em>In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2022</em><br>
<a href="https://dl.acm.org/doi/pdf/10.1145/3564625.3564643">[PDF]</a></p>
<hr>
<p><strong>PGPATCH: Policy-Guided Logic Bug Patching for Robotic Vehicles</strong><br>
Hyungsub Kim, Muslum Ozgur Ozmen, Z. Berkay Celik, <strong>Antonio Bianchi</strong>, Dongyan Xu.<br>
<em>In Proceeding of the IEEE Symposium on Security and Privacy (S&amp;P), 2022.</em><br>
<a href="https://kimhyungsub.github.io/S&amp;P22_hskim.pdf">[PDF]</a></p>
<hr>
<p><strong>FUZZUSB: Hybrid Stateful Fuzzing of the Linux USB Gadget Stack</strong><br>
Kyungtae Kim, Ertza Warraich, Taegyu Kim, Byoungyoung Lee, Kevin Butler, <strong>Antonio Bianchi</strong>, Dave (Jing) Tian.<br>
<em>In Proceeding of the IEEE Symposium on Security and Privacy (S&amp;P), 2022.</em><br>
<a href="https://par.nsf.gov/servlets/purl/10344259">[PDF]</a></p>
<hr>
<p><strong>Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities</strong><br>
Jianliang Wu, Ruoyu Wu, Dongyan Xu, Dave (Jing) Tian, <strong>Antonio Bianchi</strong>.<br>
<em>In Proceeding of the IEEE Symposium on Security and Privacy (S&amp;P), 2022.</em><br>
<a href="https://www.cs.purdue.edu/homes/dxu/pubs/SP22.pdf">[PDF]</a></p>
<hr>
<p><strong>SafetyNot: on the usage of the SafetyNet attestation API in Android</strong><br>
Muhammad Ibrahim, Abdullah Imran, <strong>Antonio Bianchi</strong>.<br>
<em>In Proceedings of the 19th Annual International Conference on Mobile Systems, Applications, and Services, 2021.</em><br>
<a href="https://dl.acm.org/doi/pdf/10.1145/3458864.3466627">[PDF]</a></p>
<hr>
<p><strong>Towards Improving Container Security by Preventing Runtime Escapes</strong><br>
Michael Reeves, Dave (Jing) Tian, <strong><strong>Antonio Bianchi</strong></strong>, Z. Berkay Celik.<br>
<em>In Proceeding of the IEEE Secure Development Conference (SecDev), 2021.</em><br>
<a href="https://mastermjr.com/papers/Towards_Improving_Container_Security_by_Preventing_Runtime_Escapes.pdf">[PDF]</a></p>
<hr>
<p><strong>APPJITSU: Investigating the Resiliency of Android Applications</strong><br>
Onur Zungur, <strong>Antonio Bianchi</strong>, Gianluca Stringhini, Manuel Egele.<br>
<em>In Proceedings of the European IEEE Symposium on Security and Privacy (Euro S&amp;P), 2021.</em><br>
<a href="https://seclab.bu.edu/papers/appjitsu-eurosp2021.pdf">[PDF]</a></p>
<hr>
<p><strong>LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks</strong><br>
Jianliang Wu, Ruoyu Wu, Daniele Antonioli, Mathias Payer, Nils Ole Tippenhauer, Dongyan Xu, Dave (Jing) Tian, and <strong>Antonio Bianchi</strong>.<br>
<em>In Proceedings of the USENIX Security Symposium (Security), 2021.</em><br>
<a href="https://github.com/daveti/papers/raw/master/security21/lb.pdf">[PDF]</a></p>
<hr>
<p><strong>M2MON: Building an MMIO-based Security Reference Monitor for Unmanned Vehicles</strong><br>
Arslan Khan, Hyubgsub Kim, Byoungyoung Lee, Dongyan Xu, <strong>Antonio Bianchi</strong>, and Dave (Jing) Tian.<br>
<em>In Proceedings of the USENIX Security Symposium (Security), 2021.</em><br>
<a href="https://github.com/daveti/papers/raw/master/security21/m2mon.pdf">[PDF]</a></p>
<hr>
<p><strong>PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles</strong><br>
Hyungsub Kim, Muslum Ozgur Ozmen, <strong>Antonio Bianchi</strong>, Z. Berkay Celik, Dongyan Xu.<br>
<em>In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2021.</em><br>
<a href="https://www.ndss-symposium.org/wp-content/uploads/ndss2021_6A-1_24096_paper.pdf">[PDF]</a></p>
<hr>
<p><strong>On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices</strong><br>
Zeyu Lei, Yuhong Nan, Yanick Fratantonio, <strong>Antonio Bianchi</strong>.<br>
<em>In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2021.</em><br>
<a href="https://www.ndss-symposium.org/wp-content/uploads/ndss2021_3B-4_24212_paper.pdf">[PDF]</a></p>
<hr>
<p><strong>BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy</strong><br>
Jianliang Wu, Yuhong Nan, Vireshwar Kumar, Dave (Jing) Tian, <strong>Antonio Bianchi</strong>, Mathias Payer, Dongyan Xu.<br>
<em>In Proceedings of the USENIX Workshop on Offensive Technologies (WOOT), 2020.</em><br>
<!-- raw HTML omitted -->Best Paper Award &mdash; CSAW'20 Applied Research Competition Finalist<!-- raw HTML omitted --><br>
<a href="https://github.com/allenjlw/allenjlw.github.io/raw/master/pdfpapers/blesa.pdf">[PDF]</a></p>
<hr>
<p><strong>Exploring Syscall-Based Semantics Reconstruction of Android Applications</strong><br>
Dario Nisi, <strong>Antonio Bianchi</strong>, Yanick Fratantonio<br>
<em>In Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses (RAID)</em><br>
<a href="https://www.usenix.org/system/files/raid2019-nisi.pdf">[PDF]</a></p>
</description>
</item>
<item>
<title>Slides</title>
<link>/slides/</link>
<pubDate>Tue, 05 Feb 2019 00:00:00 +0000</pubDate>
<guid>/slides/</guid>
<description></description>
</item>
</channel>
</rss>