Guangdong Bai
Guangdong Bai
Senior Lecturer of the University of Queensland
Verified email at - Homepage
TitleCited byYear
AUTHSCAN: Automatic Extraction of Web Authentication Protocols from Implementations.
G Bai, J Lei, G Meng, SS Venkatraman, P Saxena, J Sun, Y Liu, JS Dong
NDSS, 2013
Context-aware usage control for android
G Bai, L Gu, T Feng, Y Guo, X Chen
International Conference on Security and Privacy in Communication Systems …, 2010
DroidVault: A trusted data vault for Android devices
X Li, H Hu, G Bai, Y Jia, Z Liang, P Saxena
2014 19th International Conference on Engineering of Complex Computer …, 2014
Context‐aware usage control for web of things
G Bai, L Yan, L Gu, Y Guo, X Chen
Security and Communication Networks 7 (12), 2696-2712, 2014
Trustfound: Towards a formal foundation for model checking trusted computing platforms
G Bai, J Hao, J Wu, Y Liu, Z Liang, A Martin
International Symposium on Formal Methods, 110-126, 2014
All your sessions are belong to us: Investigating authenticator leakage through backup channels on android
G Bai, J Sun, J Wu, Q Ye, L Li, JS Dong, S Guo
2015 20th International Conference on Engineering of Complex Computer …, 2015
Formal analysis of a single sign-on protocol implementation for Android
Q Ye, G Bai, K Wang, JS Dong
2015 20th International Conference on Engineering of Complex Computer …, 2015
Reevaluating android permission gaps with static and dynamic analysis
H Wang, Y Guo, Z Tang, G Bai, X Chen
2015 IEEE Global Communications Conference (GLOBECOM), 1-6, 2015
Towards model checking android applications
G Bai, Q Ye, Y Wu, H Botha, J Sun, Y Liu, JS Dong, W Visser
IEEE Transactions on Software Engineering 44 (6), 595-612, 2017
Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues
P Kumar, Y Lin, G Bai, A Paverd, JS Dong, A Martin
IEEE Communications Surveys & Tutorials, 2019
Secure and efficient software-based attestation for industrial control devices with arm processors
B Chen, X Dong, G Bai, S Jauhar, Y Cheng
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
vTRUST: a formal modeling and verification framework for virtualization systems
J Hao, Y Liu, W Cai, G Bai, J Sun
International Conference on Formal Engineering Methods, 329-346, 2013
Detecting malicious behaviors in javascript applications
J Mao, J Bian, G Bai, R Wang, Y Chen, Y Xiao, Z Liang
IEEE Access 6, 12284-12294, 2018
Anonymity in peer-assisted CDNs: Inference attacks and mitigation
Y Jia, G Bai, P Saxena, Z Liang
Proceedings on Privacy Enhancing Technologies 2016 (4), 294-314, 2016
Break the dead end of dynamic slicing: Localizing data and control omission bug
Y Lin, J Sun, L Tran, G Bai, H Wang, J Dong
Proceedings of the 33rd ACM/IEEE International Conference on Automated …, 2018
Security model oriented attestation on dynamically reconfigurable component-based systems
L Gu, G Bai, Y Guo, X Chen, H Mei
Journal of Network and Computer Applications 35 (3), 974-981, 2012
Formal analysis of a proof-of-stake blockchain
WYMM Thin, N Dong, G Bai, JS Dong
2018 23rd International Conference on Engineering of Complex Computer …, 2018
A light-weight software environment for confining Android malware
X Li, G Bai, B Thian, Z Liang, H Yin
2014 IEEE Eighth International Conference on Software Security and …, 2014
DroidPF: a framework for automatic verification of Android applications
G Bai, Y Wu, J Sun, J Wu, Y Liu, Q Zhang, JS Dong
July, 2014
A software environment for confining malicious android applications via resource virtualization
X Li, G Bai, Z Liang, H Yin
2013 18th International Conference on Engineering of Complex Computer …, 2013
The system can't perform the operation now. Try again later.
Articles 1–20