Cong Sun

Orcid: 0000-0001-9116-2694

Affiliations:
  • Xidian University, School of Cyber Engineering, Xi'an, China
  • Peking University, School of Electronics Engineering and Computer Science, Institute of Software, China (PhD 2011)


According to our database1, Cong Sun authored at least 67 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Survey on Security of Unmanned Aerial Vehicle Systems: Attacks and Countermeasures.
IEEE Internet Things J., November, 2024

LICAPA: Lightweight collective attestation for physical attacks detection in highly dynamic networks.
Pervasive Mob. Comput., 2024

GNSS spoofing detection for UAVs using Doppler frequency and Carrier-to-Noise Density Ratio.
J. Syst. Archit., 2024

2023
CryptoEval: Evaluating the risk of cryptographic misuses in Android apps with data-flow analysis.
IET Inf. Secur., July, 2023

DeepCatra: Learning flow- and graph-based behaviours for Android malware detection.
IET Inf. Secur., January, 2023

μDep: Mutation-Based Dependency Generation for Precise Taint Analysis on Android Native Code.
IEEE Trans. Dependable Secur. Comput., 2023

LibScan: Towards More Precise Third-Party Library Identification for Android Applications.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
PerDet: Machine-Learning-Based UAV GPS Spoofing Detection Using Perception Data.
Remote. Sens., 2022

ConstDet: Control Semantics-Based Detection for GPS Spoofing Attacks on UAVs.
Remote. Sens., 2022

DeepCatra: Learning Flow- and Graph-based Behaviors for Android Malware Detection.
CoRR, 2022

Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

BinPointer: towards precise, sound, and scalable binary-level pointer analysis.
Proceedings of the CC '22: 31st ACM SIGPLAN International Conference on Compiler Construction, Seoul, South Korea, April 2, 2022

2021
CryptoEval: Evaluating the Risk of Cryptographic Misuses in Android Apps with Data-Flow Analysis.
CoRR, 2021

Information flow based defensive chain for data leakage detection and prevention: a survey.
CoRR, 2021

Sdft: A PDG-based Summarization for Efficient Dynamic Data Flow Tracking.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

Refining Indirect Call Targets at the Binary Level.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

Delica: Decentralized Lightweight Collective Attestation for Disruptive IoT Networks.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

ReCFA: Resilient Control-Flow Attestation.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2019
SRDPV: secure route discovery and privacy-preserving verification in MANETs.
Wirel. Networks, 2019

一种面向二进制的细粒度控制流完整性方法 (Fine-grained Control Flow Integrity Method on Binaries).
计算机科学, 2019

Secure Service Composition with Quantitative Information Flow Evaluation in Mobile Computing Environments.
Entropy, 2019

DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and Verification.
IEEE Access, 2019

Distributed Quantitative Information Flow Evaluation for Service Composition in Clouds.
Proceedings of the 18th IEEE International Conference On Trust, 2019

CatraDroid: A Call Trace Driven Detection of Malicious Behaiviors in Android Applications.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

Privacy-Preserving Verification and Root-Cause Tracing Towards UAV Social Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Dlog: diagnosing router events with syslogs for anomaly detection.
J. Supercomput., 2018

PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks.
J. Inf. Sci. Eng., 2018

Information flow control on encrypted data for service composition among multiple clouds.
Distributed Parallel Databases, 2018

Ridra: A Rigorous Decentralized Randomized Authentication in VANETs.
IEEE Access, 2018

A Novel Dynamic Android Malware Detection System With Ensemble Learning.
IEEE Access, 2018

Anomalies Detection of Routers Based on Multiple Information Learning.
Proceedings of the International Conference on Networking and Network Applications, 2018

Log-based Anomalies Detection of MANETs Routing with Reasoning and Verification.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
Distributed Secure Service Composition with Declassification in Mobile Clouds.
Mob. Inf. Syst., 2017

Selecting Critical Data Flows in Android Applications for Abnormal Behavior Detection.
Mob. Inf. Syst., 2017

Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing.
Sci. China Inf. Sci., 2017

NetPro: detecting attacks in MANET routing with provenance and verification.
Sci. China Inf. Sci., 2017

A Privacy-Preserving Mutual Authentication Resisting DoS Attacks in VANETs.
IEEE Access, 2017

Building a Secure Scheme for a Trusted Hardware Sharing Environment.
IEEE Access, 2017

Certia: Certifying Interface Automata for Cyber-Physical Systems.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017

Distributed Information Flow Verification on Encrypted Data for Service Composition in Multiple Clouds.
Proceedings of the International Conference on Networking and Network Applications, 2017

PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks.
Proceedings of the International Conference on Networking and Network Applications, 2017

VuRLE: Automatic Vulnerability Detection and Repair by Learning from Examples.
Proceedings of the Computer Security - ESORICS 2017, 2017

Enforcing Generalized Refinement-Based Noninterference for Secure Interface Composition.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Data-Oriented Instrumentation against Information Leakages of Android Applications.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Measuring the risk value of sensitive dataflow path in Android applications.
Secur. Commun. Networks, 2016

On the architecture and development life cycle of secure cyber-physical systems.
J. Commun. Inf. Networks, 2016

Distributed Secure Service Composition with Declassification in Mobile Network.
Proceedings of the International Conference on Networking and Network Applications, 2016

Attack gives me power: DoS-defending constant-time privacy-preserving authentication of low-cost devices such as backscattering RFID tags.
Proceedings of the 3rd ACM Workshop on Mobile Sensing, Computing and Communication, 2016

2015
Secure service composition with information flow control in service clouds.
Future Gener. Comput. Syst., 2015

CRVad: Confidential Reasoning and Verification Towards Secure Routing in Ad Hoc Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Active Semi-supervised Approach for Checking App Behavior against Its Description.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

2014
Balancing trajectory privacy and data utility using a personalized anonymization model.
J. Netw. Comput. Appl., 2014

Trust-based service composition in multi-domain environments under time constraint.
Sci. China Inf. Sci., 2014

Automated enforcement for relaxed information release with reference points.
Sci. China Inf. Sci., 2014

Verifying Secure Interface Composition for Component-Based System Designs.
Proceedings of the 21st Asia-Pacific Software Engineering Conference, 2014

2013
TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing.
IEEE Trans. Inf. Forensics Secur., 2013

Distributed Information Flow Verification Framework for the Composition of Service Chain in Wireless Sensor Network.
Int. J. Distributed Sens. Networks, 2013

Service Composition in Multi-domain Environment under Time Constraint.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

Decentralized Information Flow Verification Framework for the Service Chain Composition in Mobile Computing Environments.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

2012
Verifying Location-Based Services with Declassification Enforcement.
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012

2011
A New Enforcement on Declassification with Reachability Analysis
CoRR, 2011

Enforcing Reactive Noninterference with Reachability Analysis.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

A Multi-compositional Enforcement on Information Flow Security.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Enforcing Relaxed Declassifications with Reference Points.
Proceedings of the 10th IEEE/ACIS International Conference on Computer and Information Science, 2011

2010
Secure Information Flow by Model Checking Pushdown System
CoRR, 2010

Secure Information Flow in Java via Reachability Analysis of Pushdown System.
Proceedings of the 10th International Conference on Quality Software, 2010


  Loading...