Beyond the Device: A Security Analysis of White-Label Children鈥檚 Smartwatches and Their Ecosystem
AsiaCCS 2026 路 Vulnerable Group Security, IoT Security, Supply Chain
White-label children鈥檚 smartwatches are built in supply chains by thin margins and weak oversight, creating systemic security gaps for vulnerable children. This paper presents the first comprehensive analysis exposing new critical vulnerabilities across firmware, apps, cloud backends, and the supply chain itself.
Huancheng Hu, Christian Doerr
LotBoNC: Novel Botnet Traffic Classification under Long-tailed Distributions
AsiaCCS 2026 路 Network Security, IoT Security, Machine Learning
In operational networks, botnet traffic is long-tailed, dominated by common classes, and constantly enriched by rare, unseen variants. To address this, we propose LotBoNC, a unified framework tailored for long-tailed, open-world encrypted traffic.
Huancheng Hu, Ziyun Li, Christian Doerr
BoNC: Discovering and Classifying Novel Encrypted Botnet Traffic
Open Journal of Communication Societies (OJCOMS) 路 Network Security, IoT Security, Machine Learning
This paper presents BoNC, a unified framework that accurately detects and classifies both known and previously unseen encrypted botnet traffic in open-world environments.
Huancheng Hu, Ziyun Li, Christian Doerr
Opening a Can of Worms: A Comprehensive View into the Android Debug Bridge Malware
TrustCom 2025 路 IoT Security
We present the first comprehensive study of ADB-targeting worms, analyzing over seven years of real-world data encompassing 1.7 million infected IPs and more than 6 billion compromise attempts.
Huancheng Hu, Christian Doerr
SIP Bruteforcing in the Wild: Adversaries, Techniques, and Tools
IFIP Networking 2023 路 Network Security
Provides the first Internet-scale study of SIP brute-force toolchains, covering attacker personas, automation
tactics, and countermeasures.
Harm Griffieon, Huancheng Hu, Christian Doerr