• 8 Citations
  • 2 h-Index
20152019
If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Dive into the research topics where Chen Cao is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 5 Similar Profiles
Dynamic random access storage Engineering & Materials Science
Cryptography Engineering & Materials Science
Attack Mathematics
Dependency Graph Mathematics
Data storage equipment Engineering & Materials Science
Business Process Mathematics
Leakage Mathematics
Mobile devices Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2015 2019

  • 8 Citations
  • 2 h-Index
  • 4 Conference contribution
  • 1 Chapter
  • 1 Article

Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM

Guan, L., Cao, C., Liu, P., Xing, X., Ge, X., Zhang, S., Yu, M. & Jaeger, T. R., May 1 2019, In : IEEE Transactions on Dependable and Secure Computing. 16, 3, p. 438-453 16 p., 8423674.

Research output: Contribution to journalArticle

Dynamic random access storage
Random access storage
Dynamic mechanical analysis
Cryptography
Internet of things

Protecting mobile devices from physical memory attacks with targeted encryption

Guan, L., Cao, C., Zhu, S., Lin, J., Liu, P., Xia, Y. & Luo, B., May 15 2019, WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, Inc, p. 34-44 11 p. (WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Dynamic random access storage
Mobile devices
Cryptography
Data storage equipment
Random access storage
3 Citations (Scopus)

Assessing attack impact on business processes by interconnecting attack graphs and entity dependency graphs

Cao, C., Yuan, L. P., Singhal, A., Liu, P., Sun, X. & Zhu, S., Jan 1 2018, Data and Applications Security and Privacy XXXII - 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Proceedings. Paraboschi, S. & Kerschbaum, F. (eds.). Springer Verlag, p. 330-348 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10980 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dependency Graph
Business Process
Attack
Vulnerability
Graph in graph theory
1 Citation (Scopus)

CryptMe: Data leakage prevention for unmodified programs on ARM devices

Cao, C., Guan, L., Zhang, N., Gao, N., Lin, J., Luo, B., Liu, P., Xiang, J. & Lou, W., Jan 1 2018, Research in Attacks, Intrusions, and Defenses - 21st International Symposium, RAID 2018, Proceedings. Bailey, M., Ioannidis, S., Stamatogiannakis, M. & Holz, T. (eds.). Springer Verlag, p. 380-400 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11050 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Leakage
Attack
Data storage equipment
Dynamic random access storage
Operating Systems
4 Citations (Scopus)

System service call-oriented symbolic execution of Android Framework with applications to vulnerability discovery and exploit generation

Luo, L., Zeng, Q., Cao, C., Chen, K., Liu, J., Liu, L., Gao, N., Yang, M., Xing, X. & Liu, P., Jun 16 2017, MobiSys 2017 - Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, p. 225-238 14 p. (MobiSys 2017 - Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Middleware