Mingshen Sun
Orcid: 0000-0003-4775-0362
According to our database1,
Mingshen Sun
authored at least 23 papers
between 2013 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
2022
ACM Trans. Softw. Eng. Methodol., 2022
Topology-theoretic approach to address attribute linkage attacks in differential privacy.
Comput. Secur., 2022
Proceedings of the 25th International Symposium on Research in Attacks, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
CoRR, 2020
Exploiting non-uniform program execution time to evade record/replay forensic analysis.
Comput. Secur., 2020
Building and maintaining a third-party library supply chain for productive and secure SGX enclave development.
Proceedings of the ICSE-SEIP 2020: 42nd International Conference on Software Engineering, Software Engineering in Practice, Seoul, South Korea, 27 June, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2017
IEEE Trans. Inf. Forensics Secur., 2017
2016
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
2014
DroidTrace: A ptrace based Android dynamic analysis system with forward execution capability.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
DroidAnalytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware
CoRR, 2013
Droid Analytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware.
Proceedings of the 12th IEEE International Conference on Trust, 2013