• 18 Citations
  • 3 h-Index
20152019

Research output per year

If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Chen Cao is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 14 Similar Profiles

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output

  • 18 Citations
  • 3 h-Index
  • 4 Conference contribution
  • 1 Chapter
  • 1 Article

Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM

Guan, L., Cao, C., Liu, P., Xing, X., Ge, X., Zhang, S., Yu, M. & Jaeger, T., May 1 2019, In : IEEE Transactions on Dependable and Secure Computing. 16, 3, p. 438-453 16 p., 8423674.

Research output: Contribution to journalArticle

  • 2 Scopus citations

    Protecting mobile devices from physical memory attacks with targeted encryption

    Guan, L., Cao, C., Zhu, S., Lin, J., Liu, P., Xia, Y. & Luo, B., May 15 2019, WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, Inc, p. 34-44 11 p. (WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Assessing attack impact on business processes by interconnecting attack graphs and entity dependency graphs

    Cao, C., Yuan, L. P., Singhal, A., Liu, P., Sun, X. & Zhu, S., Jan 1 2018, Data and Applications Security and Privacy XXXII - 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Proceedings. Paraboschi, S. & Kerschbaum, F. (eds.). Springer Verlag, p. 330-348 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10980 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 4 Scopus citations

    CryptMe: Data leakage prevention for unmodified programs on ARM devices

    Cao, C., Guan, L., Zhang, N., Gao, N., Lin, J., Luo, B., Liu, P., Xiang, J. & Lou, W., Jan 1 2018, Research in Attacks, Intrusions, and Defenses - 21st International Symposium, RAID 2018, Proceedings. Bailey, M., Ioannidis, S., Stamatogiannakis, M. & Holz, T. (eds.). Springer Verlag, p. 380-400 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11050 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 3 Scopus citations

    System service call-oriented symbolic execution of Android Framework with applications to vulnerability discovery and exploit generation

    Luo, L., Zeng, Q., Cao, C., Chen, K., Liu, J., Liu, L., Gao, N., Yang, M., Xing, X. & Liu, P., Jun 16 2017, MobiSys 2017 - Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, p. 225-238 14 p. (MobiSys 2017 - Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 9 Scopus citations