Bo Chen

Orcid: 0000-0001-9372-9607

Affiliations:
  • Michigan Technological University, Department of Computer Science, Houghton, USA
  • New Jersey Institute of Technology, Newark, NJ, USA (PhD 2014)


According to our database1, Bo Chen authored at least 25 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An application-layer plausibly deniable encryption system for wearable devices.
Discov. Internet Things, December, 2024

Enabling per-file data recovery from ransomware attacks via file system forensics and flash translation layer data extraction.
Cybersecur., December, 2024

HiPDS: A Storage Hardware-Independent Plausibly Deniable Storage System.
IEEE Trans. Inf. Forensics Secur., 2024

A Simple Mobile Plausibly Deniable System Using Image Steganography and Secure Hardware.
Proceedings of the 2024 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2024

FSPDE: A Full Stack Plausibly Deniable Encryption System for Mobile Devices.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024

Poster: A Full-stack Secure Deletion Framework for Modern Computing Devices.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Enabling Real-Time Restoration of Compromised ECU Firmware in Connected and Autonomous Vehicles.
Proceedings of the Security and Privacy in Cyber-Physical Systems and Smart Vehicles, 2023

2022
Defending against OS-Level Malware in Mobile Devices via Real-Time Malware Detection and Storage Restoration.
J. Cybersecur. Priv., May, 2022

The Block-based Mobile PDE Systems Are Not Secure - Experimental Attacks.
CoRR, 2022

Enabling Accurate Data Recovery for Mobile Devices Against Malware Attacks.
Proceedings of the Security and Privacy in Communication Networks, 2022

A Cross-layer Plausibly Deniable Encryption System for Mobile Devices.
Proceedings of the Security and Privacy in Communication Networks, 2022

Poster: Data Recovery from Ransomware Attacks via File System Forensics and Flash Translation Layer Data Extraction.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Duplicates also Matter! Towards Secure Deletion on Flash-based Storage Media by Removing Duplicates.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
What If Keys Are Leaked? towards Practical and Secure Re-Encryption in Deduplication-Based Cloud Storage.
Inf., 2021

Towards Stealing Deep Neural Networks on Mobile Devices.
Proceedings of the Security and Privacy in Communication Networks, 2021

TrustZone Enhanced Plausibly Deniable Encryption System for Mobile Devices.
Proceedings of the 6th IEEE/ACM Symposium on Edge Computing, 2021

Combating the OS-Level Malware in Mobile Devices by Leveraging Isolation and Steganography.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021

2020
Toward Mitigating Spreading of Coronavirus via Mobile Devices.
IEEE Internet Things Mag., 2020

2017
Remote data integrity checking with server-side repair.
J. Comput. Secur., 2017

2015
Towards Server-side Repair for Erasure Coding-based Distributed Storage Systems.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

2014
Auditable Version Control Systems.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

2013
Towards self-repairing replication-based storage systems using untrusted clouds.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
Robust Dynamic Provable Data Possession.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

Robust dynamic remote data checking for public clouds.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2010
Remote data checking for network coding-based distributed storage systems.
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010


  Loading...