Peng Liu
Orcid: 0000-0003-4175-504XAffiliations:
- Pennsylvania State University, College of Information Sciences and Technology, University Park, PA, USA
- University of Maryland, Department of Information Systems, Baltimore, MD, USA (former)
- George Mason University, Fairfax, VA, USA (PhD 1999)
According to our database1,
Peng Liu
authored at least 399 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on ist.psu.edu
On csauthors.net:
Bibliography
2024
Uncovering Access Token Security Flaws in Multiuser Scenario of Smart Home Platforms.
IEEE Internet Things J., November, 2024
Computer, May, 2024
Randomizing Set-Associative Caches Against Conflict-Based Cache Side-Channel Attacks.
IEEE Trans. Computers, April, 2024
A lightweight unsupervised adversarial detector based on autoencoder and isolation forest.
Pattern Recognit., March, 2024
Protecting the 'Stop Using My Data' Right through Blockchain-assisted Evidence Generation.
CoRR, 2024
Maginot Line: Assessing a New Cross-app Threat to PII-as-Factor Authentication in Chinese Mobile Apps.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the International Conference on Computing, Networking and Communications, 2024
Proceedings of the 10th ACM International Workshop on Security and Privacy Analytics, 2024
2023
Sensors, February, 2023
Semantics-Preserving Reinforcement Learning Attack Against Graph Neural Networks for Malware Detection.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Internet Things J., 2023
Game Theory in Distributed Systems Security: Foundations, Challenges, and Future Directions.
CoRR, 2023
Detecting Vulnerabilities in Linux-Based Embedded Firmware with SSE-Based On-Demand Alias Analysis.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
2022
IEEE Trans. Inf. Forensics Secur., 2022
MDEFTL: Incorporating Multi-Snapshot Plausible Deniability into Flash Translation Layer.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Cloud Comput., 2022
IEEE Trans. Cloud Comput., 2022
Understanding and Conquering the Difficulties in Identifying Third-Party Libraries From Millions of Android Apps.
IEEE Trans. Big Data, 2022
Deep learning for detecting logic-flaw-exploiting network attacks: An end-to-end approach.
J. Comput. Secur., 2022
GreedyFool: Multi-factor imperceptibility and its application to designing a black-box adversarial attack.
Inf. Sci., 2022
IEEE Internet Things J., 2022
Remapped Cache Layout: Thwarting Cache-Based Side-Channel Attacks with a Hardware Defense.
CoRR, 2022
CoRR, 2022
Towards Understanding and Harnessing the Effect of Image Transformation in Adversarial Detection.
CoRR, 2022
Comput. Electr. Eng., 2022
Appl. Soft Comput., 2022
ARGAN: Adversarially Robust Generative Adversarial Networks for Deep Neural Networks Against Adversarial Examples.
IEEE Access, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022
Hierarchical Attention Network for Interpretable and Fine-Grained Vulnerability Detection.
Proceedings of the IEEE INFOCOM 2022, 2022
Proceedings of the Information Systems Security - 18th International Conference, 2022
Proceedings of the Sat-CPS@CODASPY 2022: Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2022
What Your Firmware Tells You Is Not How You Should Emulate It: A Specification-Guided Approach for Firmware Emulation.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Collect Responsibly But Deliver Arbitrarily?: A Study on Cross-User Privacy Leakage in Mobile Apps.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
RSSD: defend against ransomware with hardware-isolated network-storage codesign and post-attack analysis.
Proceedings of the ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Lausanne, Switzerland, 28 February 2022, 2022
2021
IEEE Trans. Software Eng., 2021
IEEE Trans. Netw. Sci. Eng., 2021
A Co-Design Adaptive Defense Scheme With Bounded Security Damages Against Heartbleed-Like Attacks.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Computers, 2021
A Large-Scale Study of Android Malware Development Phenomenon on Public Malware Submission and Scanning Platform.
IEEE Trans. Big Data, 2021
Commercial hypervisor-based task sandboxing mechanisms are unsecured? But we can fix it!
J. Syst. Archit., 2021
IEEE Internet Things J., 2021
Position paper: GPT conjecture: understanding the trade-offs between granularity, performance and timeliness in control-flow integrity.
Cybersecur., 2021
A Comprehensive and Cross-Platform Test Suite for Memory Safety - Towards an Open Framework for Testing Processor Hardware Supported Security Extensions.
CoRR, 2021
Finding Taint-Style Vulnerabilities in Linux-based Embedded Firmware with SSE-based Alias Analysis.
CoRR, 2021
Feature-Filter: Detecting Adversarial Examples through Filtering off Recessive Features.
CoRR, 2021
Automatic Firmware Emulation through Invalidity-guided Knowledge Inference (Extended Version).
CoRR, 2021
Tackling Imbalanced Data in Cybersecurity with Transfer Learning: A Case with ROP Payload Detection.
CoRR, 2021
CoRR, 2021
CoRR, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the Data and Applications Security and Privacy XXXV, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
Recompose Event Sequences vs. Predict Next Events: A Novel Anomaly Detection Approach for Discrete Event Logs.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
ICS3Fuzzer: A Framework for Discovering Protocol Implementation Bugs in ICS Supervisory Software by Fuzzing.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation.
IEEE Trans. Mob. Comput., 2020
ACM Trans. Priv. Secur., 2020
Secur. Commun. Networks, 2020
DeepReturn: A deep neural network can learn how to detect previously-unseen ROP payloads without using any heuristics.
J. Comput. Secur., 2020
Cybersecur., 2020
Recomposition vs. Prediction: A Novel Anomaly Detection for Discrete Events Based On Autoencoder.
CoRR, 2020
Generating Comprehensive Data with Protocol Fuzzing for Applying Deep Learning to Detect Network Attacks.
CoRR, 2020
GreedyFool: An Imperceptible Black-box Adversarial Example Attack against Neural Networks.
CoRR, 2020
Semantic-preserving Reinforcement Learning Attack Against Graph Neural Networks for Malware Detection.
CoRR, 2020
CoRR, 2020
Simultaneous input and state estimation for stochastic nonlinear systems with additive unknown inputs.
Autom., 2020
IEEE Access, 2020
Prihook: Differentiated context-aware hook placement for different owners' smartphones.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
Face Anti-Spoofing Based on Dynamic Color Texture Analysis Using Local Directional Number Pattern.
Proceedings of the 25th International Conference on Pattern Recognition, 2020
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
Proceedings of the IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, 2020
Proceedings of the 2020 American Control Conference, 2020
Device-agnostic Firmware Execution is Possible: A Concolic Execution Approach for Peripheral Emulation.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
Can Cyber Operations Be Made Autonomous? An Answer from the Situational Awareness Viewpoint.
Proceedings of the Adaptive Autonomous Secure Cyber Systems., 2020
2019
Proceedings of the Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019
Proceedings of the Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019
Proceedings of the Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019
Proceedings of the Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM.
IEEE Trans. Dependable Secur. Comput., 2019
IEEE Syst. J., 2019
The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved.
IEEE Internet Things J., 2019
Unsupervised multi-stage attack detection framework without details on single-stage attacks.
Future Gener. Comput. Syst., 2019
CoRR, 2019
Autom., 2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Dynamically Finding Minimal Eviction Sets Can Be Quicker Than You Think for Side-Channel Attacks against the LLC.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019
Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution.
Proceedings of the Computer Security - ESORICS 2019, 2019
MimosaFTL: Adding Secure and Practical Ransomware Defense Strategy to Flash Translation Layer.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
Robustness Analysis of CNN-based Malware Family Classification Methods Against Various Adversarial Attacks.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Leveraging Information Asymmetry to Transform Android Apps into Self-Defending Code Against Repackaging Attacks.
IEEE Trans. Mob. Comput., 2018
IEEE Trans. Inf. Forensics Secur., 2018
Softw. Pract. Exp., 2018
Probabilistic Inference of the Stealthy Bridges between Enterprise Networks in Cloud.
EAI Endorsed Trans. Security Safety, 2018
EAI Endorsed Trans. Security Safety, 2018
IEEE Secur. Priv., 2018
Cybersecur., 2018
Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing.
Cybersecur., 2018
Feedback control can make data structure layout randomization more cost-effective under zero-day attacks.
Cybersecur., 2018
Phantom Device Attack: Uncovering the Security Implications of the Interactions among Devices, IoT Cloud, and Mobile Apps.
CoRR, 2018
The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved.
CoRR, 2018
Android STAR: An Efficient Interaction-Preserving Record-Replay System For Messenger App Usage Surveillance.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
RoboADS: Anomaly Detection Against Sensor and Actuator Misbehaviors in Mobile Robots.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018
Retrieval of Relevant Historical Data Triage Operations in Security Operation Centers.
Proceedings of the From Database to Cyber Security, 2018
Running OS Kernel in Separate Domains: A New Architecture for Applications and OS Services Quarantine.
Proceedings of the 25th Asia-Pacific Software Engineering Conference, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
Proceedings of the Theory and Models for Cyber Situation Awareness, 2017
Proceedings of the Theory and Models for Cyber Situation Awareness, 2017
Proceedings of the Theory and Models for Cyber Situation Awareness, 2017
Impeding behavior-based malware analysis via replacement attacks to malware specifications.
J. Comput. Virol. Hacking Tech., 2017
Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection.
IEEE Trans. Software Eng., 2017
CoRR, 2017
Hey, you, keep away from my device: remotely implanting a virus expeller to defeat Mirai on IoT devices.
CoRR, 2017
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
VCIDS: Collaborative Intrusion Detection of Sensor and Actuator Attacks on Connected Vehicles.
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017
IM-Visor: A Pre-IME Guard to Prevent IME Apps from Stealing Sensitive Keystrokes Using TrustZone.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 Workshop on Moving Target Defense, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 American Control Conference, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
Application-Specific Digital Forensics Investigative Model in Internet of Things (IoT).
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Deviation-Based Obfuscation-Resilient Program Equivalence Checking With Application to Software Plagiarism Detection.
IEEE Trans. Reliab., 2016
IEEE Trans. Reliab., 2016
Towards service continuity for transactional applications via diverse device drivers.
Int. J. Inf. Comput. Secur., 2016
Using Non-invertible Data Transformations to Build Adversary-Resistant Deep Neural Networks.
CoRR, 2016
Context-aware System Service Call-oriented Symbolic Execution of Android Framework with Application to Exploit Generation.
CoRR, 2016
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems, SenSys 2016, 2016
PhiRSA: Exploiting the Computing Power of Vector Instructions on Intel Xeon Phi for RSA.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016
Proceedings of the Information and Communications Security - 18th International Conference, 2016
Feature-Based Software Customization: Preliminary Analysis, Formalization, and Methods.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
Program-object Level Data Flow Analysis with Applications to Data Leakage and Contamination Forensics.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016
Call Me Back!: Attacks on System Server and System Apps in Android through Synchronous Callback.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016
Android malware development on public malware scanning platforms: A large-scale data-driven study.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016
Sanitizing data is not enough!: towards sanitizing structural artifacts in flash media.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Proceedings of the Intelligent Methods for Cyber Warfare, 2015
Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection.
IEEE Trans. Software Eng., 2015
Enforcement of Autonomous Authorizations in Collaborative Distributed Query Evaluation.
IEEE Trans. Knowl. Data Eng., 2015
IEEE Trans. Knowl. Data Eng., 2015
Reviewing the book "Principles of Cyber-physical Systems" from a security perspective.
EAI Endorsed Trans. Security Safety, 2015
An automaton-based index scheme supporting twig queries for on-demand XML data broadcast.
J. Parallel Distributed Comput., 2015
Int. Trans. Oper. Res., 2015
Instantly Obsoleting the Address-code Associations: A New Principle for Defending Advanced Code Reuse Attack.
CoRR, 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale.
Proceedings of the 24th USENIX Security Symposium, 2015
Between Mutual Trust and Mutual Distrust: Practical Fine-grained Privilege Separation in Multithreaded Applications.
Proceedings of the 2015 USENIX Annual Technical Conference, 2015
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, 2015
A Preliminary Analysis and Case Study of Feature-Based Software Customization (Extended Abstract).
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015
An integrated computer-aided cognitive task analysis method for tracing cyber-attack analysis processes.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015
Proceedings of the Data and Applications Security and Privacy XXIX, 2015
Proceedings of the IEEE International Inter-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, 2015
How Your Phone Camera Can Be Used to Stealthily Spy on You: Transplantation Attacks against Android Camera Service.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an App.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android.
Proceedings of the 10th ACM Symposium on Information, 2015
Towards Analyzing the Input Validation Vulnerabilities associated with Android System Services.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
Proceedings of the Applied Cryptography and Network Security, 2015
2014
IEEE Trans. Parallel Distributed Syst., 2014
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection.
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16, 2014
Inferring the Stealthy Bridges Between Enterprise Network Islands in Cloud Using Cross-Layer Bayesian Networks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the 2014 IFIP Networking Conference, Trondheim, 2014
Droidmarking: resilient software watermarking for impeding android application repackaging.
Proceedings of the ACM/IEEE International Conference on Automated Software Engineering, 2014
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering, 2014
Achieving accuracy and scalability simultaneously in detecting application clones on Android markets.
Proceedings of the 36th International Conference on Software Engineering, 2014
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation.
Proceedings of the Information Systems Security - 10th International Conference, 2014
RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment.
Proceedings of the Computer Security - ESORICS 2014, 2014
Detangling Resource Management Functions from the TCB in Privacy-Preserving Virtualization.
Proceedings of the Computer Security - ESORICS 2014, 2014
System Call Redirection: A Practical Approach to Meeting Real-World Virtual Machine Introspection Needs.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
Proceedings of the IEEE International Inter-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, 2014
Proceedings of the 12th Annual IEEE/ACM International Symposium on Code Generation and Optimization, 2014
Proceedings of the First ACM Workshop on Moving Target Defense, 2014
Proceedings of the First ACM Workshop on Moving Target Defense, 2014
Proceedings of the Secure Cloud Computing, 2014
2013
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing.
IEEE Trans. Inf. Forensics Secur., 2013
Impossibility of finding any third family of server protocols integrating Byzantine quorum systems with threshold signature schemes.
Secur. Commun. Networks, 2013
Secur. Commun. Networks, 2013
Secur. Commun. Networks, 2013
Special issue on "security and privacy in pervasive and ubiquitous computing and communication systems".
Secur. Commun. Networks, 2013
A new decision support model in multi-criteria decision making with intuitionistic fuzzy sets based on risk preferences and criteria reduction.
J. Oper. Res. Soc., 2013
Quantitative survivability evaluation of three virtual machine-based server architectures.
J. Netw. Comput. Appl., 2013
IACR Cryptol. ePrint Arch., 2013
Future Gener. Comput. Syst., 2013
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013
Behavior Decomposition: Aspect-Level Browser Extension Clustering and Its Security Implications.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013
SILVER: Fine-Grained and Transparent Protection Domain Primitives in Commodity OS Kernel.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013
XLRF: A Cross-Layer Intrusion Recovery Framework for Damage Assessment and Recovery Plan Generation.
Proceedings of the Information and Communications Security - 15th International Conference, 2013
Proceedings of the Information and Communications Security - 15th International Conference, 2013
Patrol: Revealing Zero-Day Attack Paths through Network-Wide System Object Dependencies.
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, 2013
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
Qual. Reliab. Eng. Int., 2012
J. Syst. Softw., 2012
Int. J. Inf. Sec., 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012
Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the International Symposium on Software Testing and Analysis, 2012
Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012
Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach.
Proceedings of the Computer Security - ESORICS 2012, 2012
Proceedings of the Database Systems for Advanced Applications, 2012
Gaining Big Picture Awareness through an Interconnected Cross-Layer Situation Knowledge Reference Model.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012
Proceedings of the IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
QFilter: rewriting insecure XML queries to secure ones using non-deterministic finite automata.
VLDB J., 2011
IEEE Trans. Inf. Forensics Secur., 2011
SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption.
Secur. Commun. Networks, 2011
Int. J. Secur. Networks, 2011
Int. J. Soc. Comput. Cyber Phys. Syst., 2011
Int. J. Inf. Sec., 2011
Comput. Stand. Interfaces, 2011
Energy-Conserving Fragment Methods for Skewed XML Data Access in Push-Based Broadcast.
Proceedings of the Web-Age Information Management - 12th International Conference, 2011
CLOUD SHREDDER: Removing the Laptop On-road Data Disclosure Threat in the Cloud Computing Era.
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the Scientific and Statistical Database Management, 2011
Proceedings of the Security and Privacy in Communication Networks, 2011
A Tiny RSA Coprocessor based on Optimized Systolic Montgomery Architecture.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation, 2011
Proceedings of the Network and Distributed System Security Symposium, 2011
Proceedings of the Information Security, 14th International Conference, 2011
Proceedings of the Information Security Practice and Experience, 2011
Proceedings of the Critical Infrastructure Protection V, 2011
Value-based program characterization and its application to software plagiarism detection.
Proceedings of the 33rd International Conference on Software Engineering, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Proceedings of IEEE International Conference on Communications, 2011
Proceedings of IEEE International Conference on Communications, 2011
Personal genome privacy protection with feature-based hierarchical dual-stage encryption.
Proceedings of the 2011 IEEE International Workshop on Genomic Signal Processing and Statistics, 2011
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
Proceedings of the 7th International Conference on Network and Service Management, 2011
2010
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010
IEEE Trans. Dependable Secur. Comput., 2010
Secur. Commun. Networks, 2010
Comput. Secur., 2010
Comput. Commun., 2010
A simulation framework for performance analysis of multi-interface and multi-channel wireless networks in INET/OMNET++.
Proceedings of the 2010 Spring Simulation Multiconference, 2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010
Evaluating Survivability and Costs of Three Virtual Machine based Server Architectures.
Proceedings of the SECRYPT 2010, 2010
Integrating Offline Analysis and Online Protection to Defeat Buffer Overflow Attacks.
Proceedings of the Information Security - 13th International Conference, 2010
Proceedings of the Information Security, 2010
Proceedings of the Information Security, 2010
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2010
A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proactive Identification and Prevention of Unexpected Future Rule Conflicts in Attribute Based Access Control.
Proceedings of the Computational Science and Its Applications, 2010
Proceedings of the Global Communications Conference, 2010
Proceedings of the 18th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2010
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010
Cross-layer comprehensive intrusion harm analysis for production workload server systems.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
A Semi-Markov Survivability Evaluation Model for Intrusion Tolerant Database Systems.
Proceedings of the ARES 2010, 2010
2009
IEEE Trans. Knowl. Data Eng., 2009
KTR: An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services.
IEEE Trans. Dependable Secur. Comput., 2009
J. Netw. Comput. Appl., 2009
Proceedings of the NBiS 2009, 2009
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009
A data damage tracking quarantine and recovery (DTQR) scheme for mission-critical database systems.
Proceedings of the EDBT 2009, 2009
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
SHELF: Preserving Business Continuity and Availability in an Intrusion Recovery System.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
Proceedings of the Handbook of Database Security - Applications and Trends, 2008
Proceedings of the 17th International Conference on World Wide Web, 2008
EndSec: An end-to-end message security protocol for mobile telecommunication networks.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008
Proceedings of the Advances in Digital Forensics IV, 2008
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead.
Proceedings of the Computer Security, 2008
Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering.
Proceedings of the Collaborative Computing: Networking, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
A light weighted damage tracking quarantine and recovery scheme for mission-critical database systems.
Proceedings of the 17th ACM Conference on Information and Knowledge Management, 2008
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2008
A Multi-level Fidelity-Preserving Bandwidth-Limited Worm Simulation Model and Its Application.
Proceedings of the Proceedings 41st Annual Simulation Symposium (ANSS-41 2008), 2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
2007
Proceedings of the Secure Data Management in Decentralized Systems, 2007
Dependency relation based vulnerability analysis of 3G networks: Can it identify unforeseen cascading attacks?
Telecommun. Syst., 2007
Evaluating the survivability of Intrusion Tolerant Database systems and the impact of intrusion detection deficiencies.
Int. J. Inf. Comput. Secur., 2007
Ad Hoc Networks, 2007
Proceedings of the 65th IEEE Vehicular Technology Conference, 2007
Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test 2007, 2007
Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), 2007
Proceedings of the Computer Security, 2007
Automaton segmentation: a new approach to preserve privacy in xml information brokering.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
Proceedings of the Regarding the Intelligence in Distributed Intelligent Systems, 2007
2006
Wirel. Commun. Mob. Comput., 2006
J. Netw. Comput. Appl., 2006
Proceedings of the 3rd International Workshop on Visualization for Computer Security, 2006
In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerage Systems.
Proceedings of the IEEE International Conference on Sensor Networks, 2006
CAT - A Practical Graph & SDL Based Toolkit for Vulnerability Assessment of 3G Networks.
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006
Proceedings of the Computer Security, 2006
Privacy-preserving semantic interoperation and access control of heterogeneous databases.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
2005
Incentive-based modeling and inference of attacker intent, objectives, and strategies.
ACM Trans. Inf. Syst. Secur., 2005
J. Comput. Secur., 2005
Proceedings of the Second International Workshop on XQuery Implementation, 2005
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005
Proceedings of the Intelligence and Security Informatics, 2005
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005
Proceedings of the Data and Applications Security XIX, 2005
An architecture and key management approach for maintaining privacy in location based group services.
Proceedings of the 1st International Conference on Collaborative Computing: Networking, 2005
Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen, Germany, October 31, 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2004
J. Intell. Inf. Syst., 2004
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004
Proceedings of the Secure Data Management, VLDB 2004 Workshop, 2004
Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery.
Proceedings of the Information Security, 7th International Conference, 2004
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
Proceedings of the 2004 ACM CIKM International Conference on Information and Knowledge Management, 2004
2003
Proceedings of the Database and XML Technologies, 2003
Intrusion Masking for Distributed Atomic Operations.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003
Incentive-based modeling and inference of attacker intent, objectives, and strategies.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems, 2003
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003
2002
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002
2001
Decis. Support Syst., 2001
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001
2000
Distributed Parallel Databases, 2000
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000
1999
Incorporating Transaction Semantics to Reduce Reprocessing Overhead in Replicated Mobile Data Applications.
Proceedings of the 19th International Conference on Distributed Computing Systems, Austin, TX, USA, May 31, 1999
1998
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998