Chen Cao

Affiliations:
  • Pennsylvania State University, Behrend College, Cyber Security Lab, College of Information Sciences and Technology, Erie, PA, USA
  • University of Chinese Academy of Sciences (UCAS), Beijing, China (PhD 2017)
  • Chinese Academy of Sciences (CAS), Institute of Information Engineering, China


According to our database1, Chen Cao authored at least 14 papers between 2014 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Commercial hypervisor-based task sandboxing mechanisms are unsecured? But we can fix it!
J. Syst. Archit., 2021

Reviewing IoT Security via Logic Bugs in IoT Platforms and Systems.
IEEE Internet Things J., 2021

2020
Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation.
IEEE Trans. Mob. Comput., 2020

Device-agnostic Firmware Execution is Possible: A Concolic Execution Approach for Peripheral Emulation.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM.
IEEE Trans. Dependable Secur. Comput., 2019

Logic Bugs in IoT Platforms and Systems: A Review.
CoRR, 2019

Protecting mobile devices from physical memory attacks with targeted encryption.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

2018
CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

2017
Hey, you, keep away from my device: remotely implanting a virus expeller to defeat Mirai on IoT devices.
CoRR, 2017

System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

2016
Context-aware System Service Call-oriented Symbolic Execution of Android Framework with Application to Exploit Generation.
CoRR, 2016

2015
Towards Analyzing the Input Validation Vulnerabilities associated with Android System Services.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Function Escalation Attack.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014


  Loading...