Kai Chen

According to our database1, Kai Chen
  • authored at least 36 papers between 2007 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection.
IEEE Trans. Information Forensics and Security, 2018

CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition.
CoRR, 2018

Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild.
CoRR, 2018

2017
Multi-key privacy-preserving deep learning in cloud computing.
Future Generation Comp. Syst., 2017

Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be.
CoRR, 2017

Filtering for Malice Through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

Characterizing Smartwatch Usage in the Wild.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Mass Discovery of Android Traffic Imprints through Instantiated Partial Execution.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Dynamically Discovering Likely Memory Layout to Perform Accurate Fuzzing.
IEEE Trans. Reliability, 2016

Context-aware System Service Call-oriented Symbolic Execution of Android Framework with Application to Exploit Generation.
CoRR, 2016

Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

A Lattice-Based Access Control Model for Social Networks.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2016

2015
Unauthorized Cross-App Resource Access on MAC OS X and iOS.
CoRR, 2015

Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale.
Proceedings of the 24th USENIX Security Symposium, 2015

Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an App.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android.
Proceedings of the 10th ACM Symposium on Information, 2015

Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging Integrations.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
AppMark: A Picture-Based Watermark for Android Apps.
Proceedings of the Eighth International Conference on Software Security and Reliability, 2014

Timing-Based Clone Detection on Android Markets.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Droidmarking: resilient software watermarking for impeding android application repackaging.
Proceedings of the ACM/IEEE International Conference on Automated Software Engineering, 2014

Achieving accuracy and scalability simultaneously in detecting application clones on Android markets.
Proceedings of the 36th International Conference on Software Engineering, 2014

2013
Vulnerability-Based Backdoors: Threats from Two-step Trojans.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

VulLocator: Automatically Locating Vulnerable Code in Binary Programs.
Proceedings of the Information Security Practice and Experience, 2013

Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model.
Proceedings of the Information Security Practice and Experience, 2013

2012
Black-box testing based on colorful taint analysis.
SCIENCE CHINA Information Sciences, 2012

2011
A Map-Layer-Based Access Control Model.
Proceedings of the Information Security Applications - 12th International Workshop, 2011

AutoDunt: Dynamic Latent Dependence Analysis for Detection of Zero Day Vulnerability.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

2010
A novel vector edge sampling scheme for IP traceback against DDoS attacks.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

Automatically Generating Patch in Binary Programs Using Attribute-Based Taint Analysis.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

2007
SEPCOM: customizable zero copy model.
Proceedings of the 2nd International Conference on Performance Evaluation Methodolgies and Tools, 2007


  Loading...