• 13 Citations
  • 2 h-Index
20152019
If you made any changes in Pure, your changes will be visible here soon.

Research Output 2015 2019

  • 13 Citations
  • 2 h-Index
  • 4 Conference contribution
  • 1 Chapter
  • 1 Article
2019
1 Citation (Scopus)

Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM

Guan, L., Cao, C., Liu, P., Xing, X., Ge, X., Zhang, S., Yu, M. & Jaeger, T., May 1 2019, In : IEEE Transactions on Dependable and Secure Computing. 16, 3, p. 438-453 16 p., 8423674.

Research output: Contribution to journalArticle

Dynamic random access storage
Random access storage
Dynamic mechanical analysis
Cryptography
Internet of things

Protecting mobile devices from physical memory attacks with targeted encryption

Guan, L., Cao, C., Zhu, S., Lin, J., Liu, P., Xia, Y. & Luo, B., May 15 2019, WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, Inc, p. 34-44 11 p. (WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Dynamic random access storage
Mobile devices
Cryptography
Data storage equipment
Random access storage
2018
3 Citations (Scopus)

Assessing attack impact on business processes by interconnecting attack graphs and entity dependency graphs

Cao, C., Yuan, L. P., Singhal, A., Liu, P., Sun, X. & Zhu, S., Jan 1 2018, Data and Applications Security and Privacy XXXII - 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Proceedings. Paraboschi, S. & Kerschbaum, F. (eds.). Springer Verlag, p. 330-348 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10980 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dependency Graph
Business Process
Attack
Vulnerability
Graph in graph theory
2 Citations (Scopus)

CryptMe: Data leakage prevention for unmodified programs on ARM devices

Cao, C., Guan, L., Zhang, N., Gao, N., Lin, J., Luo, B., Liu, P., Xiang, J. & Lou, W., Jan 1 2018, Research in Attacks, Intrusions, and Defenses - 21st International Symposium, RAID 2018, Proceedings. Bailey, M., Ioannidis, S., Stamatogiannakis, M. & Holz, T. (eds.). Springer Verlag, p. 380-400 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11050 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Leakage
Attack
Data storage equipment
Dynamic random access storage
Operating Systems
2017
5 Citations (Scopus)

System service call-oriented symbolic execution of Android Framework with applications to vulnerability discovery and exploit generation

Luo, L., Zeng, Q., Cao, C., Chen, K., Liu, J., Liu, L., Gao, N., Yang, M., Xing, X. & Liu, P., Jun 16 2017, MobiSys 2017 - Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, p. 225-238 14 p. (MobiSys 2017 - Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Middleware
2015

Function escalation attack

Cao, C., Zhang, Y., Liu, Q. & Wang, K., Jan 1 2015, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST. Springer Verlag, p. 481-497 17 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 152).

Research output: Chapter in Book/Report/Conference proceedingChapter

Audio recordings
Steganography
Smartphones
Static analysis
Application programs