Page-Oriented Programming: Subverting Control-Flow Integrity of Commodity Operating System Kernels with Non-Writable Code Pages.
Proceedings of the 33rd USENIX Security Symposium, 2024
A Bad Dream: Subverting Trusted Platform Module While You Are Sleeping.
Proceedings of the 27th USENIX Security Symposium, 2018
A Description of the KCipher-2 Encryption Algorithm.
RFC, August, 2013
AMY: Use your cell phone to create a protected personal network over devices.
IEEE Trans. Consumer Electron., 2011
A Performance/Energy Analysis and Optimization of Multi-Core Architectures with Voltage Scaling Techniques.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
A Small But Non-negligible Flaw in the Android Permission Scheme.
Proceedings of the POLICY 2010, 2010
A Frst Step Towards Automated Permission-enforcement Analysis of the Android Framework.
Proceedings of the 2010 International Conference on Security & Management, 2010
How to Bootstrap Security for Ad-Hoc Network: Revisited.
Proceedings of the Emerging Challenges for Security, 2009
An Asymptotic Performance/Energy Analysis and Optimization of Multi-core Architectures.
Proceedings of the Distributed Computing and Networking, 10th International Conference, 2009
PAS: A Wireless-Enabled, Cell-Phone-Incorporated Personal Assistant System for Independent and Assisted Living.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008
Enforcement of Integrated Security Policy in Trusted Operating Systems.
Proceedings of the Advances in Information and Computer Security, 2007
A Policy Language for the Extended Reference Monitor in Trusted Operating Systems.
Proceedings of the The Second International Conference on Availability, 2007
I-Living: An Open System Architecture for Assisted Living.
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the IEEE International Conference on Systems, 2006
Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems.
Proceedings of the Information Security Practice and Experience, 2006
Securing the drop-box architecture for assisted living.
Proceedings of the 2006 ACM workshop on Formal methods in security engineering, 2006
Extended Role Based Access Control with Procedural Constraints for Trusted Operating Systems.
IEICE Trans. Inf. Syst., 2005
Procedural Constraints in the Extended RBAC and the Coloured Petri Net Modeling.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Extended Role Based Access Control and Procedural Restrictions.
Proceedings of the Information Security and Cryptology, 2003
Extended BLP Security Model Based on Process Reliability for Secure Linux Kernel.
Proceedings of the 8th Pacific Rim International Symposium on Dependable Computing (PRDC 2001), 2001