Peng Liu

Orcid: 0000-0003-4175-504X

Affiliations:
  • Pennsylvania State University, College of Information Sciences and Technology, University Park, PA, USA
  • University of Maryland, Department of Information Systems, Baltimore, MD, USA (former)
  • George Mason University, Fairfax, VA, USA (PhD 1999)


According to our database1, Peng Liu authored at least 399 papers between 1998 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Uncovering Access Token Security Flaws in Multiuser Scenario of Smart Home Platforms.
IEEE Internet Things J., November, 2024

Using Explainable AI for Neural Network-Based Network Attack Detection.
Computer, May, 2024

Randomizing Set-Associative Caches Against Conflict-Based Cache Side-Channel Attacks.
IEEE Trans. Computers, April, 2024

A lightweight unsupervised adversarial detector based on autoencoder and isolation forest.
Pattern Recognit., March, 2024

Analysis of neural network detectors for network attacks.
J. Comput. Secur., 2024

Protecting the 'Stop Using My Data' Right through Blockchain-assisted Evidence Generation.
CoRR, 2024

Maginot Line: Assessing a New Cross-app Threat to PII-as-Factor Authentication in Chinese Mobile Apps.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Prompt Fix: Vulnerability Automatic Repair Technology Based on Prompt Engineering.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

Evaluating Large Language Models for Real-World Vulnerability Repair in C/C++ Code.
Proceedings of the 10th ACM International Workshop on Security and Privacy Analytics, 2024

2023
Suitability Study of Using UAVs to Estimate Landfilled Fly Ash Stockpile.
Sensors, February, 2023

Semantics-Preserving Reinforcement Learning Attack Against Graph Neural Networks for Malware Detection.
IEEE Trans. Dependable Secur. Comput., 2023

Physical Devices-Agnostic Hybrid Fuzzing of IoT Firmware.
IEEE Internet Things J., 2023

Game Theory in Distributed Systems Security: Foundations, Challenges, and Future Directions.
CoRR, 2023

Detecting Vulnerabilities in Linux-Based Embedded Firmware with SSE-Based On-Demand Alias Analysis.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

2022
DeepSyslog: Deep Anomaly Detection on Syslog Using Sentence Embedding and Metadata.
IEEE Trans. Inf. Forensics Secur., 2022

MDEFTL: Incorporating Multi-Snapshot Plausible Deniability into Flash Translation Layer.
IEEE Trans. Dependable Secur. Comput., 2022

S-Blocks: Lightweight and Trusted Virtual Security Function With SGX.
IEEE Trans. Cloud Comput., 2022

Semi-Synchronized Non-Blocking Concurrent Kernel Cruising.
IEEE Trans. Cloud Comput., 2022

Understanding and Conquering the Difficulties in Identifying Third-Party Libraries From Millions of Android Apps.
IEEE Trans. Big Data, 2022

Deep learning for detecting logic-flaw-exploiting network attacks: An end-to-end approach.
J. Comput. Secur., 2022

GreedyFool: Multi-factor imperceptibility and its application to designing a black-box adversarial attack.
Inf. Sci., 2022

Fingerprinting Mainstream IoT Platforms Using Traffic Analysis.
IEEE Internet Things J., 2022

Remapped Cache Layout: Thwarting Cache-Based Side-Channel Attacks with a Hardware Defense.
CoRR, 2022

Nowhere to Hide: A Lightweight Unsupervised Detector against Adversarial Examples.
CoRR, 2022

Towards Understanding and Harnessing the Effect of Image Transformation in Adversarial Detection.
CoRR, 2022

Using honeypots to model botnet attacks on the internet of medical things.
Comput. Electr. Eng., 2022

Feature-filter: Detecting adversarial examples by filtering out recessive features.
Appl. Soft Comput., 2022

ARGAN: Adversarially Robust Generative Adversarial Networks for Deep Neural Networks Against Adversarial Examples.
IEEE Access, 2022

Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths.
Proceedings of the 31st USENIX Security Symposium, 2022

Exploit the Last Straw That Breaks Android Systems.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Identifying Channel Related Vulnerabilities in Zephyr Firmware.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

Hierarchical Attention Network for Interpretable and Fine-Grained Vulnerability Detection.
Proceedings of the IEEE INFOCOM 2022, 2022

Attacks on ML Systems: From Security Analysis to Attack Mitigation.
Proceedings of the Information Systems Security - 18th International Conference, 2022

Securing Smart Home IoT Systems with Attribute-Based Access Control.
Proceedings of the Sat-CPS@CODASPY 2022: Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2022

What Your Firmware Tells You Is Not How You Should Emulate It: A Specification-Guided Approach for Firmware Emulation.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Collect Responsibly But Deliver Arbitrarily?: A Study on Cross-User Privacy Leakage in Mobile Apps.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

RSSD: defend against ransomware with hardware-isolated network-storage codesign and post-attack analysis.
Proceedings of the ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Lausanne, Switzerland, 28 February 2022, 2022

2021
POMP++: Facilitating Postmortem Program Diagnosis with Value-Set Analysis.
IEEE Trans. Software Eng., 2021

EEJE: Two-Step Input Transformation for Robust DNN Against Adversarial Examples.
IEEE Trans. Netw. Sci. Eng., 2021

A Co-Design Adaptive Defense Scheme With Bounded Security Damages Against Heartbleed-Like Attacks.
IEEE Trans. Inf. Forensics Secur., 2021

Exploiting Security Dependence for Conditional Speculation Against Spectre Attacks.
IEEE Trans. Computers, 2021

A Large-Scale Study of Android Malware Development Phenomenon on Public Malware Submission and Scanning Platform.
IEEE Trans. Big Data, 2021

Commercial hypervisor-based task sandboxing mechanisms are unsecured? But we can fix it!
J. Syst. Archit., 2021

Vulnerable Region-Aware Greybox Fuzzing.
J. Comput. Sci. Technol., 2021

Reviewing IoT Security via Logic Bugs in IoT Platforms and Systems.
IEEE Internet Things J., 2021

An Evolutionary Study of IoT Malware.
IEEE Internet Things J., 2021

Position paper: GPT conjecture: understanding the trade-offs between granularity, performance and timeliness in control-flow integrity.
Cybersecur., 2021

A Comprehensive and Cross-Platform Test Suite for Memory Safety - Towards an Open Framework for Testing Processor Hardware Supported Security Extensions.
CoRR, 2021

Finding Taint-Style Vulnerabilities in Linux-based Embedded Firmware with SSE-based Alias Analysis.
CoRR, 2021

Feature-Filter: Detecting Adversarial Examples through Filtering off Recessive Features.
CoRR, 2021

Automatic Firmware Emulation through Invalidity-guided Knowledge Inference (Extended Version).
CoRR, 2021

Tackling Imbalanced Data in Cybersecurity with Transfer Learning: A Case with ROP Payload Detection.
CoRR, 2021

Security and Privacy for Artificial Intelligence: Opportunities and Challenges.
CoRR, 2021

Analyzing the Overhead of Filesystem Protection Using Linux Security Modules.
CoRR, 2021

Automatic Firmware Emulation through Invalidity-guided Knowledge Inference.
Proceedings of the 30th USENIX Security Symposium, 2021

Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Deep Learning for Detecting Network Attacks: An End-to-End Approach.
Proceedings of the Data and Applications Security and Privacy XXXV, 2021

Analyzing the Overhead of File Protection by Linux Security Modules.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Recompose Event Sequences vs. Predict Next Events: A Novel Anomaly Detection Approach for Discrete Event Logs.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

ICS3Fuzzer: A Framework for Discovering Protocol Implementation Bugs in ICS Supervisory Software by Fuzzing.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
DAMBA: Detecting Android Malware by ORGB Analysis.
IEEE Trans. Reliab., 2020

Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation.
IEEE Trans. Mob. Comput., 2020

Adaptive Cyber Defense Against Multi-Stage Attacks Using Learning-Based POMDP.
ACM Trans. Priv. Secur., 2020

Improving Topic-Based Data Exchanges among IoT Devices.
Secur. Commun. Networks, 2020

DeepReturn: A deep neural network can learn how to detect previously-unseen ROP payloads without using any heuristics.
J. Comput. Secur., 2020

Using deep learning to solve computer security challenges: a survey.
Cybersecur., 2020

Recomposition vs. Prediction: A Novel Anomaly Detection for Discrete Events Based On Autoencoder.
CoRR, 2020

Generating Comprehensive Data with Protocol Fuzzing for Applying Deep Learning to Detect Network Attacks.
CoRR, 2020

GreedyFool: An Imperceptible Black-box Adversarial Example Attack against Neural Networks.
CoRR, 2020

Semantic-preserving Reinforcement Learning Attack Against Graph Neural Networks for Malware Detection.
CoRR, 2020

Practical Verification of MapReduce Computation Integrity via Partial Re-execution.
CoRR, 2020

An Approach for Detection of Advanced Persistent Threat Attacks.
Computer, 2020

Simultaneous input and state estimation for stochastic nonlinear systems with additive unknown inputs.
Autom., 2020

Structural Image De-Identification for Privacy-Preserving Deep Learning.
IEEE Access, 2020

Prihook: Differentiated context-aware hook placement for different owners' smartphones.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Unexpected Data Dependency Creation and Chaining: A New Attack to SDN.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

EnclavePDP: A General Framework to Verify Data Integrity in Cloud Using Intel SGX.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

Face Anti-Spoofing Based on Dynamic Color Texture Analysis Using Local Directional Number Pattern.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

A Machine Learning-Assisted Compartmentalization Scheme for Bare-Metal Systems.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

Automatic Recognition of Advanced Persistent Threat Tactics for Enterprise Security.
Proceedings of the IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, 2020

On Data-driven Attack-resilient Gaussian Process Regression for Dynamic Systems.
Proceedings of the 2020 American Control Conference, 2020

Device-agnostic Firmware Execution is Possible: A Concolic Execution Approach for Peripheral Emulation.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

Can Cyber Operations Be Made Autonomous? An Answer from the Situational Awareness Viewpoint.
Proceedings of the Adaptive Autonomous Secure Cyber Systems., 2020

2019
Online and Scalable Adaptive Cyber Defense.
Proceedings of the Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019

Reinforcement Learning for Adaptive Cyber Defense Against Zero-Day Attacks.
Proceedings of the Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019

Overview of Control and Game Theory in Adaptive Cyber Defenses.
Proceedings of the Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019

MTD Techniques for Memory Protection Against Zero-Day Attacks.
Proceedings of the Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019

Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM.
IEEE Trans. Dependable Secur. Comput., 2019

Learning From Experts' Experience: Toward Automated Cyber Security Data Triage.
IEEE Syst. J., 2019

The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved.
IEEE Internet Things J., 2019

Unsupervised multi-stage attack detection framework without details on single-stage attacks.
Future Gener. Comput. Syst., 2019

Logic Bugs in IoT Platforms and Systems: A Review.
CoRR, 2019

Good Motive but Bad Design: Why ARM MPU Has Become an Outcast in Embedded Systems.
CoRR, 2019

SvTPM: A Secure and Efficient vTPM in the Cloud.
CoRR, 2019

On convergence rates of game theoretic reinforcement learning algorithms.
Autom., 2019

Protecting mobile devices from physical memory attacks with targeted encryption.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms.
Proceedings of the 28th USENIX Security Symposium, 2019

Towards Large-Scale Hunting for Android Negative-Day Malware.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Dynamically Finding Minimal Eviction Sets Can Be Quicker Than You Think for Side-Channel Attacks against the LLC.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Energy distribution matters in greybox fuzzing.
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019

Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution.
Proceedings of the Computer Security - ESORICS 2019, 2019

MimosaFTL: Adding Secure and Practical Ransomware Defense Strategy to Flash Translation Layer.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Robustness Analysis of CNN-based Malware Family Classification Methods Against Various Adversarial Attacks.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

IoT S&P 2019: 2nd Workshop on the Internet of Things Security and Privacy.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Leveraging Information Asymmetry to Transform Android Apps into Self-Defending Code Against Repackaging Attacks.
IEEE Trans. Mob. Comput., 2018

Using Bayesian Networks for Probabilistic Identification of Zero-Day Attack Paths.
IEEE Trans. Inf. Forensics Secur., 2018

A policy-centric approach to protecting OS kernel from vulnerable LKMs.
Softw. Pract. Exp., 2018

Probabilistic Inference of the Stealthy Bridges between Enterprise Networks in Cloud.
EAI Endorsed Trans. Security Safety, 2018

VaultIME: Regaining User Control for Password Managers through Auto-correction.
EAI Endorsed Trans. Security Safety, 2018

Toward Cyberresiliency in the Context of Cloud Computing [Resilient Security].
IEEE Secur. Priv., 2018

Using IM-Visor to stop untrusted IME apps from stealing sensitive keystrokes.
Cybersecur., 2018

Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing.
Cybersecur., 2018

Feedback control can make data structure layout randomization more cost-effective under zero-day attacks.
Cybersecur., 2018

Phantom Device Attack: Uncovering the Security Implications of the Interactions among Devices, IoT Cloud, and Mobile Apps.
CoRR, 2018

ROPNN: Detection of ROP Payloads Using Deep Neural Networks.
CoRR, 2018

Nonlinear Unknown Input and State Estimation Algorithm in Mobile Robots.
CoRR, 2018

The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved.
CoRR, 2018

A cyber security data triage operation retrieval system.
Comput. Secur., 2018

Android STAR: An Efficient Interaction-Preserving Record-Replay System For Messenger App Usage Surveillance.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

My Friend Leaks My Privacy: Modeling and Analyzing Privacy in Social Networks.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

RoboADS: Anomaly Detection Against Sensor and Actuator Misbehaviors in Mobile Robots.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

Retrieval of Relevant Historical Data Triage Operations in Security Operation Centers.
Proceedings of the From Database to Cyber Security, 2018

Running OS Kernel in Separate Domains: A New Architecture for Applications and OS Services Quarantine.
Proceedings of the 25th Asia-Pacific Software Engineering Conference, 2018

Take It or Leave It: A Survey Study on Operating System Upgrade Practices.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Studying Analysts' Data Triage Operations in Cyber Defense Situational Analysis.
Proceedings of the Theory and Models for Cyber Situation Awareness, 2017

Enterprise-Level Cyber Situation Awareness.
Proceedings of the Theory and Models for Cyber Situation Awareness, 2017

Computer-Aided Human Centric Cyber Situation Awareness.
Proceedings of the Theory and Models for Cyber Situation Awareness, 2017

Impeding behavior-based malware analysis via replacement attacks to malware specifications.
J. Comput. Virol. Hacking Tech., 2017

Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection.
IEEE Trans. Software Eng., 2017

Towards Practical Obfuscation of General Circuits.
IACR Cryptol. ePrint Arch., 2017

Exploiting Physical Dynamics to Detect Actuator and Sensor Attacks in Mobile Robots.
CoRR, 2017

Hey, you, keep away from my device: remotely implanting a virus expeller to defeat Mirai on IoT devices.
CoRR, 2017

Dancing with Wolves: Towards Practical Event-driven VMM Monitoring.
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2017

Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.
Proceedings of the 26th USENIX Security Symposium, 2017

VCIDS: Collaborative Intrusion Detection of Sensor and Actuator Attacks on Connected Vehicles.
Proceedings of the Security and Privacy in Communication Networks, 2017

WindowGuard: Systematic Protection of GUI Security in Android.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

PMViewer: A Crowdsourcing Approach to Fine-Grained Urban PM2.5 Monitoring in China.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

IM-Visor: A Pre-IME Guard to Prevent IME Apps from Stealing Sensitive Keystrokes Using TrustZone.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

What You See is Not What You Get! Thwarting Just-in-Time ROP with Chameleon.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Towards Actionable Mission Impact Assessment in the Context of Cloud Computing.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation Layer.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Online Algorithms for Adaptive Cyber Defense on Bayesian Attack Graphs.
Proceedings of the 2017 Workshop on Moving Target Defense, 2017

IoT S&P 2017: First Workshop on Internet of Things Security and Privacy.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Attack-resilient estimation of switched nonlinear cyber-physical systems.
Proceedings of the 2017 American Control Conference, 2017

Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

Application-Specific Digital Forensics Investigative Model in Internet of Things (IoT).
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Deviation-Based Obfuscation-Resilient Program Equivalence Checking With Application to Software Plagiarism Detection.
IEEE Trans. Reliab., 2016

Dynamically Discovering Likely Memory Layout to Perform Accurate Fuzzing.
IEEE Trans. Reliab., 2016

Towards service continuity for transactional applications via diverse device drivers.
Int. J. Inf. Comput. Secur., 2016

Obfuscation without Multilinear Maps.
IACR Cryptol. ePrint Arch., 2016

Using Non-invertible Data Transformations to Build Adversary-Resistant Deep Neural Networks.
CoRR, 2016

Context-aware System Service Call-oriented Symbolic Execution of Android Framework with Application to Exploit Generation.
CoRR, 2016

Exploiting Insurance Telematics for Fun and Profit.
CoRR, 2016

From Physical to Cyber: Escalating Protection for Personalized Auto Insurance.
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems, SenSys 2016, 2016

PhiRSA: Exploiting the Computing Power of Vector Instructions on Intel Xeon Phi for RSA.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

iCruiser: Protecting Kernel Link-Based Data Structures with Secure Canary.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

StraightTaint: decoupled offline symbolic taint analysis.
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016

A Comprehensive Study of Co-residence Threat in Multi-tenant Public PaaS Clouds.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

Feature-Based Software Customization: Preliminary Analysis, Formalization, and Methods.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

Empirical Analysis and Modeling of Black-Box Mutational Fuzzing.
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016

A Machine Learning Approach for Detecting Third-Party Trackers on the Web.
Proceedings of the Computer Security - ESORICS 2016, 2016

Stay in Your Cage! A Sound Sandbox for Third-Party Libraries on Android.
Proceedings of the Computer Security - ESORICS 2016, 2016

Repackage-Proofing Android Apps.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

JRed: Program Customization and Bloatware Mitigation Based on Static Analysis.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Towards a Science for Adaptive Defense: Revisit Server Protection.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

Program-object Level Data Flow Analysis with Applications to Data Leakage and Contamination Forensics.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

Towards probabilistic identification of zero-day attack paths.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Demo: A Symbolic N-Variant System.
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016

Call Me Back!: Attacks on System Server and System Apps in Android through Synchronous Callback.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

NFPS: Adding Undetectable Secure Deletion to Flash Translation Layer.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

MTD 2016: Third ACM Workshop on Moving Target Defense.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Automate Cybersecurity Data Triage by Leveraging Human Analysts' Cognitive Process.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

Android malware development on public malware scanning platforms: A large-scale data-driven study.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

Sanitizing data is not enough!: towards sanitizing structural artifacts in flash media.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Cyber Insider Mission Detection for Situation Awareness.
Proceedings of the Intelligent Methods for Cyber Warfare, 2015

Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection.
IEEE Trans. Software Eng., 2015

Enforcement of Autonomous Authorizations in Collaborative Distributed Query Evaluation.
IEEE Trans. Knowl. Data Eng., 2015

An Air Index for Spatial Query Processing in Road Networks.
IEEE Trans. Knowl. Data Eng., 2015

Reviewing the book "Principles of Cyber-physical Systems" from a security perspective.
EAI Endorsed Trans. Security Safety, 2015

An automaton-based index scheme supporting twig queries for on-demand XML data broadcast.
J. Parallel Distributed Comput., 2015

A study of decision process in MCDM problems with large number of criteria.
Int. Trans. Oper. Res., 2015

Instantly Obsoleting the Address-code Associations: A New Principle for Defending Advanced Code Reuse Attack.
CoRR, 2015

Towards Discovering and Understanding Task Hijacking in Android.
Proceedings of the 24th USENIX Security Symposium, 2015

TaintPipe: Pipelined Symbolic Taint Analysis.
Proceedings of the 24th USENIX Security Symposium, 2015

Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale.
Proceedings of the 24th USENIX Security Symposium, 2015

Between Mutual Trust and Mutual Distrust: Practical Fine-grained Privilege Separation in Multithreaded Applications.
Proceedings of the 2015 USENIX Annual Technical Conference, 2015

Who Touched My Mission: Towards Probabilistic Mission Impact Assessment.
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, 2015

A Preliminary Analysis and Case Study of Feature-Based Software Customization (Extended Abstract).
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

An integrated computer-aided cognitive task analysis method for tracing cyber-attack analysis processes.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

A Practical Approach for Adaptive Data Structure Layout Randomization.
Proceedings of the Computer Security - ESORICS 2015, 2015

HeapTherapy: An Efficient End-to-End Solution against Heap Buffer Overflows.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

Risk Assessment of Buffer "Heartbleed" Over-Read Vulnerabilities.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

Towards Collaborative Query Planning in Multi-party Database Networks.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

ARSCA: a computer tool for tracing the cognitive processes of cyber-attack analysis.
Proceedings of the IEEE International Inter-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, 2015

How Your Phone Camera Can Be Used to Stealthily Spy on You: Transplantation Attacks against Android Camera Service.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

An Empirical Study of Web Vulnerability Discovery Ecosystems.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Discover and Tame Long-running Idling Processes in Enterprise Systems.
Proceedings of the 10th ACM Symposium on Information, 2015

From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an App.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android.
Proceedings of the 10th ACM Symposium on Information, 2015

Towards Analyzing the Input Validation Vulnerabilities associated with Android System Services.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

Replacement Attacks: Automatically Impeding Behavior-Based Malware Specifications.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Cognitive Process.
Proceedings of the Cyber Defense and Situational Awareness, 2014

Air Indexing for On-Demand XML Data Broadcast.
IEEE Trans. Parallel Distributed Syst., 2014

Defeating buffer overflow attacks via virtualization.
Comput. Electr. Eng., 2014

ViewDroid: towards obfuscation-resilient mobile application repackaging detection.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Duet: library integrity verification for android applications.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection.
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16, 2014

Inferring the Stealthy Bridges Between Enterprise Network Islands in Cloud Using Cross-Layer Bayesian Networks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Robust confidentiality preserving data delivery in federated coalition networks.
Proceedings of the 2014 IFIP Networking Conference, Trondheim, 2014

Droidmarking: resilient software watermarking for impeding android application repackaging.
Proceedings of the ACM/IEEE International Conference on Automated Software Engineering, 2014

Program Logic Based Software Plagiarism Detection.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering, 2014

Achieving accuracy and scalability simultaneously in detecting application clones on Android markets.
Proceedings of the 36th International Conference on Software Engineering, 2014

Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation.
Proceedings of the Information Systems Security - 10th International Conference, 2014

RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment.
Proceedings of the Computer Security - ESORICS 2014, 2014

Detangling Resource Management Functions from the TCB in Privacy-Preserving Virtualization.
Proceedings of the Computer Security - ESORICS 2014, 2014

System Call Redirection: A Practical Approach to Meeting Real-World Virtual Machine Introspection Needs.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

RankAOH: Context-driven similarity-based retrieval of experiences in cyber analysis.
Proceedings of the IEEE International Inter-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, 2014

DeltaPath: Precise and Scalable Calling Context Encoding.
Proceedings of the 12th Annual IEEE/ACM International Symposium on Code Generation and Optimization, 2014

Reinforcement Learning Algorithms for Adaptive Cyber Defense against Heartbleed.
Proceedings of the First ACM Workshop on Moving Target Defense, 2014

Comparing Different Moving Target Defense Techniques.
Proceedings of the First ACM Workshop on Moving Target Defense, 2014

Software Cruising: A New Technology for Building Concurrent Software Monitor.
Proceedings of the Secure Cloud Computing, 2014

2013
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing.
IEEE Trans. Inf. Forensics Secur., 2013

Impossibility of finding any third family of server protocols integrating Byzantine quorum systems with threshold signature schemes.
Secur. Commun. Networks, 2013

Semantic aware attribution analysis of remote exploits.
Secur. Commun. Networks, 2013

Defending return-oriented programming based on virtualization techniques.
Secur. Commun. Networks, 2013

Special issue on "security and privacy in pervasive and ubiquitous computing and communication systems".
Secur. Commun. Networks, 2013

Handover optimization in business processes via prediction.
Kybernetes, 2013

A new decision support model in multi-criteria decision making with intuitionistic fuzzy sets based on risk preferences and criteria reduction.
J. Oper. Res. Soc., 2013

Quantitative survivability evaluation of three virtual machine-based server architectures.
J. Netw. Comput. Appl., 2013

HPAZ: a High-throughput Pipeline Architecture of ZUC in Hardware.
IACR Cryptol. ePrint Arch., 2013

Towards transparent and distributed workload management for large scale web servers.
Future Gener. Comput. Syst., 2013

Practical Fine-grained Privilege Separation in Multithreaded Applications
CoRR, 2013

A Framework for Evaluating Mobile App Repackaging Detection Algorithms.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

MJBlocker: A Lightweight and Run-Time Malicious JavaScript Extensions Blocker.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

Behavior Decomposition: Aspect-Level Browser Extension Clustering and Its Security Implications.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

SILVER: Fine-Grained and Transparent Protection Domain Primitives in Commodity OS Kernel.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

How to use experience in cyber analysis: An analytical reasoning support system.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

XLRF: A Cross-Layer Intrusion Recovery Framework for Damage Assessment and Recovery Plan Generation.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

Fingerprint Embedding: A Proactive Strategy of Detecting Timing Channels.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

Patrol: Revealing Zero-Day Attack Paths through Network-Wide System Object Dependencies.
Proceedings of the Computer Security - ESORICS 2013, 2013

SKRM: Where security techniques talk to each other.
Proceedings of the IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, 2013

MyCloud: supporting user-configured privacy protection in cloud computing.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Anonymous proxy re-encryption.
Secur. Commun. Networks, 2012

Evaluating Intrusion-Tolerant Certification Authority Systems.
Qual. Reliab. Eng. Int., 2012

Achieving key privacy without losing CCA security in proxy re-encryption.
J. Syst. Softw., 2012

Replacement attacks: automatically evading behavior-based software birthmark.
Int. J. Inf. Sec., 2012

Collaborative Traffic-Aware Intrusion Monitoring in Multi-channel Mesh Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Modeling and Checking the Security of DIFC System Configurations.
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012

Assessing the Trustworthiness of Drivers.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

A first step towards algorithm plagiarism detection.
Proceedings of the International Symposium on Software Testing and Analysis, 2012

Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach.
Proceedings of the Computer Security - ESORICS 2012, 2012

An Automaton-Based Index Scheme for On-Demand XML Data Broadcast.
Proceedings of the Database Systems for Advanced Applications, 2012

Gaining Big Picture Awareness through an Interconnected Cross-Layer Situation Knowledge Reference Model.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

Experience-based cyber situation recognition using relaxable logic patterns.
Proceedings of the IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, 2012

Stalking online: on user privacy in social networks.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

Letting applications operate through attacks launched from compromised drivers.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
QFilter: rewriting insecure XML queries to secure ones using non-deterministic finite automata.
VLDB J., 2011

PEDA: Comprehensive Damage Assessment for Production Environment Server Systems.
IEEE Trans. Inf. Forensics Secur., 2011

SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption.
Secur. Commun. Networks, 2011

Secure and privacy-preserving information aggregation for smart grids.
Int. J. Secur. Networks, 2011

Event-driven modelling of evolving social networks.
Int. J. Soc. Comput. Cyber Phys. Syst., 2011

SAS: semantics aware signature generation for polymorphic worm detection.
Int. J. Inf. Sec., 2011

Damage assessment and repair in attack resilient distributed database systems.
Comput. Stand. Interfaces, 2011

New threats to health data privacy.
BMC Bioinform., 2011

Energy-Conserving Fragment Methods for Skewed XML Data Access in Push-Based Broadcast.
Proceedings of the Web-Age Information Management - 12th International Conference, 2011

CLOUD SHREDDER: Removing the Laptop On-road Data Disclosure Threat in the Cloud Computing Era.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Privacy Preserving Group Linkage.
Proceedings of the Scientific and Statistical Database Management, 2011

SA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits.
Proceedings of the Security and Privacy in Communication Networks, 2011

A Tiny RSA Coprocessor based on Optimized Systolic Montgomery Architecture.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Cruiser: concurrent heap buffer overflow monitoring using lock-free data structures.
Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation, 2011

Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions.
Proceedings of the Network and Distributed System Security Symposium, 2011

Replacement Attacks on Behavior Based Software Birthmark.
Proceedings of the Information Security, 14th International Conference, 2011

Policy-Centric Protection of OS Kernel from Vulnerable Loadable Kernel Modules.
Proceedings of the Information Security Practice and Experience, 2011

Analyzing Intelligence on WMD Attacks Using Threaded Event-Based Simulation.
Proceedings of the Critical Infrastructure Protection V, 2011

Value-based program characterization and its application to software plagiarism detection.
Proceedings of the 33rd International Conference on Software Engineering, 2011

HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Multi-Use Unidirectional Proxy Re-Encryption.
Proceedings of IEEE International Conference on Communications, 2011

Lightweight Attacks against Channel Assignment Protocols in MIMC Wireless Networks.
Proceedings of IEEE International Conference on Communications, 2011

Personal genome privacy protection with feature-based hierarchical dual-stage encryption.
Proceedings of the 2011 IEEE International Workshop on Genomic Signal Processing and Statistics, 2011

Identity management for cloud computing: developments and directions.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

LeakProber: a framework for profiling sensitive data leakage paths.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Distributed workload and response time management for web applications.
Proceedings of the 7th International Conference on Network and Service Management, 2011

2010
RPD-based Hypothesis Reasoning for Cyber Situation Awareness.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Cross-Layer Damage Assessment for Cyber Situational Awareness.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Cyber SA: Situational Awareness for Cyber Defense.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

SigFree: A Signature-Free Buffer Overflow Attack Blocker.
IEEE Trans. Dependable Secur. Comput., 2010

PWC: a proactive worm containment solution for enterprise networks.
Secur. Commun. Networks, 2010

Recovery of data integrity under multi-tier architectures.
IET Inf. Secur., 2010

CCA-Secure PRE Scheme without Random Oracles.
IACR Cryptol. ePrint Arch., 2010

Worm virulence estimation for the containment of local worm outbreak.
Comput. Secur., 2010

Creation of the importance scanning worm using information collected by Botnets.
Comput. Commun., 2010

A simulation framework for performance analysis of multi-interface and multi-channel wireless networks in INET/OMNET++.
Proceedings of the 2010 Spring Simulation Multiconference, 2010

Behavior Evolution and Event-Driven Growth Dynamics in Social Networks.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Protecting Kernel Data through Virtualization Technology.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

Evaluating Survivability and Costs of Three Virtual Machine based Server Architectures.
Proceedings of the SECRYPT 2010, 2010

Integrating Offline Analysis and Online Protection to Defeat Buffer Overflow Attacks.
Proceedings of the Information Security - 13th International Conference, 2010

Rate-Based Watermark Traceback: A New Approach.
Proceedings of the Information Security, 2010

Using Purpose Capturing Signatures to Defeat Computer Virus Mutating.
Proceedings of the Information Security, 2010

Study of effect of node seniority in social networks.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2010

A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Proactive Identification and Prevention of Unexpected Future Rule Conflicts in Attribute Based Access Control.
Proceedings of the Computational Science and Its Applications, 2010

Coping with Traitor Attacks in Reputation Models for Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2010

Voronoi-based aggregate nearest neighbor query processing in road networks.
Proceedings of the 18th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2010

Using Bayesian networks for cyber security analysis.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

Cross-layer comprehensive intrusion harm analysis for production workload server systems.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

CCA-Secure Type-based Proxy Re-encryption with Invisible Proxy.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

A Semi-Markov Survivability Evaluation Model for Intrusion Tolerant Database Systems.
Proceedings of the ARES 2010, 2010

2009
Evaluating MAPSec by marking attack graphs.
Wirel. Networks, 2009

Tuning On-Air Signatures for Balancing Performance and Confidentiality.
IEEE Trans. Knowl. Data Eng., 2009

KTR: An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services.
IEEE Trans. Dependable Secur. Comput., 2009

The implementation and evaluation of a recovery system for workflows.
J. Netw. Comput. Appl., 2009

An Attack-Resilient Channel Assignment MAC Protocol.
Proceedings of the NBiS 2009, 2009

A Novel Hybrid Trust Management Framework for MANETs.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009

A data damage tracking quarantine and recovery (DTQR) scheme for mission-critical database systems.
Proceedings of the EDBT 2009, 2009

Availability-sensitive intrusion recovery.
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2009

Behavior based software theft detection.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

SHELF: Preserving Business Continuity and Availability in an Intrusion Recovery System.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

Detecting Software Theft via System Call Based Birthmarks.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Damage Quarantine and Recovery in Data Processing Systems.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Protecting web services from remote exploit code: a static analysis approach.
Proceedings of the 17th International Conference on World Wide Web, 2008

EndSec: An end-to-end message security protocol for mobile telecommunication networks.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

Detecting Remote Exploits Using Data Mining.
Proceedings of the Advances in Digital Forensics IV, 2008

A Fine-Grained Damage Management Scheme in a Self-Healing PostgreSQL System.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

Threshold Smart Walk for the Containment of Local Worm Outbreak.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead.
Proceedings of the Computer Security, 2008

Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering.
Proceedings of the Collaborative Computing: Networking, 2008

Secure and Privacy-Preserving Information Brokering.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

A light weighted damage tracking quarantine and recovery scheme for mission-critical database systems.
Proceedings of the 17th ACM Conference on Information and Knowledge Management, 2008

Using virtual machines to do cross-layer damage assessment.
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2008

A Multi-level Fidelity-Preserving Bandwidth-Limited Worm Simulation Model and Its Application.
Proceedings of the Proceedings 41st Annual Simulation Symposium (ANSS-41 2008), 2008

STILL: Exploit Code Detection via Static Taint and Initialization Analyses.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Trusted Recovery.
Proceedings of the Secure Data Management in Decentralized Systems, 2007

Dependency relation based vulnerability analysis of 3G networks: Can it identify unforeseen cascading attacks?
Telecommun. Syst., 2007

Can-Follow Concurrency Control.
IEEE Trans. Computers, 2007

Defence against packet injection in ad hoc networks.
Int. J. Secur. Networks, 2007

Evaluating the survivability of Intrusion Tolerant Database systems and the impact of intrusion detection deficiencies.
Int. J. Inf. Comput. Secur., 2007

Analysis of area-congestion-based DDoS attacks in ad hoc networks.
Ad Hoc Networks, 2007

An Objective Trust Management Framework for Mobile Ad Hoc Networks.
Proceedings of the 65th IEEE Vehicular Technology Conference, 2007

Evaluation of Collaborative Worm Containments on DETER Testbed.
Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test 2007, 2007

Framework for Intrusion Tolerant Certification Authority System Evaluation.
Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), 2007

Pragmatic XML Access Control Using Off-the-Shelf RDBMS.
Proceedings of the Computer Security, 2007

Automaton segmentation: a new approach to preserve privacy in xml information brokering.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

Incremental adaptation of XPath access control views.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

Database Isolation and Filtering against Data Corruption Attacks.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

Intelligent Cyber Security Analysis in Enterprise Networks.
Proceedings of the Regarding the Intelligence in Distributed Intelligent Systems, 2007

2006
On-demand public-key management for mobile ad hoc networks.
Wirel. Commun. Mob. Comput., 2006

Real-time data attack isolation for commercial database applications.
J. Netw. Comput. Appl., 2006

Visual toolkit for network security experiment specification and data analysis.
Proceedings of the 3rd International Workshop on Visualization for Computer Security, 2006

In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerage Systems.
Proceedings of the IEEE International Conference on Sensor Networks, 2006

CAT - A Practical Graph & SDL Based Toolkit for Vulnerability Assessment of 3G Networks.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

Semantic access control for information interoperation.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System.
Proceedings of the Computer Security, 2006

Privacy-preserving semantic interoperation and access control of heterogeneous databases.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

Modeling of pollution in p2p file sharing systems.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

Towards Database Firewall: Mining the Damage Spreading Patterns.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Incentive-based modeling and inference of attacker intent, objectives, and strategies.
ACM Trans. Inf. Syst. Secur., 2005

Specifying and using intrusion masking models to process distributed operations.
J. Comput. Secur., 2005

Deep Set Operators for XQuery.
Proceedings of the Second International Workshop on XQuery Implementation, 2005

KTR: an Efficient Key Management Scheme For Air Access Control.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005

A Taxonomy of Cyber Attacks on 3G Networks.
Proceedings of the Intelligence and Security Informatics, 2005

Defending against packet injection attacks unreliable ad hoc networks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Towards Database Firewalls.
Proceedings of the Data and Applications Security XIX, 2005

An architecture and key management approach for maintaining privacy in location based group services.
Proceedings of the 1st International Conference on Collaborative Computing: Networking, 2005

Balancing performance and confidentiality in air index.
Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen, Germany, October 31, 2005

Defensive Execution of Transactional Processes against Attacks.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
The Design and Implementation of a Self-Healing Database System.
J. Intell. Inf. Syst., 2004

Cyber defense technology networking and evaluation.
Commun. ACM, 2004

Attack Aware Integrity Control in Databases (Invited Abstract).
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004

A Flexible Framework for Architecting XML Access Control Enforcement Mechanisms.
Proceedings of the Secure Data Management, VLDB 2004 Workshop, 2004

Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery.
Proceedings of the Information Security, 7th International Conference, 2004

Self-Healing Workflow Systems under Attacks.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

Localized public-key management for mobile ad hoc networks.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

QFilter: fine-grained run-time XML access control via NFA-based query rewriting.
Proceedings of the 2004 ACM CIKM International Conference on Information and Knowledge Management, 2004

2003
Supporting XML Security Models Using Relational Databases: A Vision.
Proceedings of the Database and XML Technologies, 2003

Intrusion Masking for Distributed Atomic Operations.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Delivering Services with Integrity Guarantees in Survivable Database Systems.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

Incentive-based modeling and inference of attacker intent, objectives, and strategies.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

ARECA: a highly attack resilient certification authority.
Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems, 2003

Multi-Version Attack Recovery for Workflow System.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

2002
Recovery from Malicious Transactions.
IEEE Trans. Knowl. Data Eng., 2002

Architectures for Intrusion Tolerant Database Systems.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2001
Avoiding loss of fairness owing to failures in fair data exchange systems.
Decis. Support Syst., 2001

Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance.
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001

DAIS: A Real-Time Data Attack Isolation System for Commercial Database Applications.
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001

2000
Intrusion Confinement by Isolation in Information Systems.
J. Comput. Secur., 2000

Rewriting Histories: Recovering from Malicious Transactions.
Distributed Parallel Databases, 2000

Avoiding Loss of Fairness Owing to Process Crashes in Fair Data Exchange Protocols.
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000

1999
Incorporating Transaction Semantics to Reduce Reprocessing Overhead in Replicated Mobile Data Applications.
Proceedings of the 19th International Conference on Distributed Computing Systems, Austin, TX, USA, May 31, 1999

1998
Application-Level Isolation to Cope with Malicious Database Users.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998


  Loading...