Kun Sun

According to our database1, Kun Sun authored at least 66 papers between 2003 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
BluePass: A Mobile Device Assisted Password Manager.
ICST Trans. Security Safety, 2019

PathMarker: protecting web contents against inside crawlers.
Cybersecurity, 2019

OCRAM-Assisted Sensitive Data Protection on ARM-Based Platform.
Proceedings of the Computer Security - ESORICS 2019, 2019

Detecting "0-Day" Vulnerability: An Empirical Study of Secret Security Patch in OSS.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM Processors.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

2018
Memory Forensic Challenges Under Misused Architectural Features.
IEEE Trans. Information Forensics and Security, 2018

TruSense: Information Leakage from TrustZone.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Email as a Master Key: Analyzing Account Recovery in the Wild.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

A Measurement Study on Linux Container Security: Attacks and Countermeasures.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Personal Information in Passwords and Its Security Implications.
IEEE Trans. Information Forensics and Security, 2017

FEC-Seluge: Efficient, reliable, and secure large data dissemination using erasure codes.
Computer Communications, 2017

BluePass: A Secure Hand-Free Password Manager.
Proceedings of the Security and Privacy in Communication Networks, 2017

Your Neighbors are Listening: Evaluating PostMessage Use in OAuth.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Cookie-based amplification repression protocol.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

Protecting web contents against persistent distributed crawlers.
Proceedings of the IEEE International Conference on Communications, 2017

A measurement study on Amazon wishlist and its privacy exposure.
Proceedings of the IEEE International Conference on Communications, 2017

SPEAKER: Split-Phase Execution of Application Containers.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

CyberMoat: Camouflaging critical server infrastructures with large scale decoy farms.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Vulnerable Implicit Service: A Revisit.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016
TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices.
IACR Cryptology ePrint Archive, 2016

CaSE: Cache-Assisted Secure Execution on ARM Processors.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

DESIR: Decoy-enhanced seamless IP randomization.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

A study of personal information in human-chosen passwords and its security implications.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Amnesia: A Bilateral Generative Password Manager.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

CacheKit: Evading Memory Introspection Using Cache Incoherence.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Privacy Breach by Exploiting postMessage in HTML5: Identification, Evaluation, and Countermeasure.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Reliable and Trustworthy Memory Acquisition on Smartphones.
IEEE Trans. Information Forensics and Security, 2015

PmDroid: Permission Supervision for Android Advertising.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems, 2015

Using Hardware Features for Increased Debugging Transparency.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

TrustICE: Hardware-Assisted Isolated Computing Environments on Mobile Devices.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

Now You See Me: Hide and Seek in Physical Address Space.
Proceedings of the 10th ACM Symposium on Information, 2015

TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
HyperCheck: A Hardware-AssistedIntegrity Monitor.
IEEE Trans. Dependable Sec. Comput., 2014

Protecting Enterprise Networks through Attack Surface Expansion.
Proceedings of the 2014 Workshop on Cyber Security Analytics, 2014

TrustDump: Reliable Memory Acquisition on Smartphones.
Proceedings of the Computer Security - ESORICS 2014, 2014

Remotely wiping sensitive data on stolen smartphones.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

MTD 2014: First ACM Workshop on Moving Target Defense.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Proof of Isolation for Cloud Storage.
Proceedings of the Secure Cloud Computing, 2014

2013
Capability-Based Defenses Against DoS Attacks in Multi-path MANET Communications.
Wireless Personal Communications, 2013

Reducing Attack Surface with VM-Based Phantom Server.
Proceedings of the 32th IEEE Military Communications Conference, 2013

On Feasibility of Fingerprinting Wireless Sensor Nodes Using Physical Properties.
Proceedings of the 27th IEEE International Symposium on Parallel and Distributed Processing, 2013

MOTAG: Moving Target Defense against Internet Denial of Service Attacks.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

SPECTRE: A dependable introspection framework via System Management Mode.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

TerraCheck: Verification of Dedicated Cloud Storage.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

A moving target defense mechanism for MANETs based on identity virtualization.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Verification of data redundancy in cloud storage.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013

2012
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Hardware-Assisted Application Integrity Monitor.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

Disk storage isolation and verification in cloud.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

A dependability analysis of hardware-assisted polling integrity checking systems.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

NetGator: Malware Detection Using Program Interactive Challenges.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012

2011
Secure Time Synchronization.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Firmware-assisted Memory Acquisition and Analysis tools for Digital Forensics.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

A Self-shielding Dynamic Network Architecture.
Proceedings of the MILCOM 2011, 2011

Automatic security analysis using security metrics.
Proceedings of the MILCOM 2011, 2011

CapMan: Capability-Based Defense against Multi-Path Denial of Service (DoS) Attacks in MANET.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

2009
Securing network access in wireless sensor networks.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

2007
Secure and Resilient Time Synchronization in Wireless Sensor Networks.
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007

2006
Secure and resilient clock synchronization in wireless sensor networks.
IEEE Journal on Selected Areas in Communications, 2006

TinySeRSync: secure and resilient time synchronization in wireless sensor networks.
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30, 2006

Secure Distributed Cluster Formation in Wireless Sensor Networks.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks.
IEEE Trans. Dependable Sec. Comput., 2005

How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols.
Ad Hoc Networks, 2005

2003
How to Misuse AODV: A Case Study of Insiider Attacks against Mobile Ad-hoc Routing Protocols.
Proceedings of the IEEE Systems, 2003

Efficient self-healing group key distribution with revocation capability.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003


  Loading...