Kun Sun

Affiliations:
  • George Mason University, Department of Information Sciences and Technology, Fairfax, VA, USA
  • College of William and Mary, Department of Computer Science, Williamsburg, VA, USA (former)
  • Intelligent Automation Inc., Rockville, MD, USA (former)
  • North Carolina State University, Department of Computer Science, Raleigh, NC, USA (PhD)


According to our database1, Kun Sun authored at least 99 papers between 2003 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption.
IEEE Trans. Inf. Forensics Secur., 2021

Vulnerable Service Invocation and Countermeasures.
IEEE Trans. Dependable Secur. Comput., 2021

A Hard Label Black-box Adversarial Attack Against Graph Neural Networks.
CoRR, 2021

PatchRNN: A Deep Learning-Based System for Security Patch Identification.
CoRR, 2021

User input enrichment via sensing devices.
Comput. Networks, 2021

Remotely controlling TrustZone applications?: a study on securely and resiliently receiving remote commands.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Detecting Localized Adversarial Examples: A Generic Approach using Critical Region Analysis.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

PatchDB: A Large-Scale Security Patch Dataset.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

UTrack: Enterprise User Tracking Based on OS-Level Audit Logs.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

See through Walls: Detecting Malware in SGX Enclaves with SGX-Bouncer.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
TrustICT: an efficient trusted interaction interface between isolated execution domains on ARM multi-core processors.
Proceedings of the SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, 2020

SGX-Cube: An SGX-Enhanced Single Sign-On System Against Server-Side Credential Leakage.
Proceedings of the Security and Privacy in Communication Networks, 2020

SIEVE: Secure In-Vehicle Automatic Speech Recognition Systems.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Evaluation on the Security of Commercial Cloud Container Services.
Proceedings of the Information Security - 23rd International Conference, 2020

A Machine Learning Approach to Classify Security Patches into Vulnerability Types.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

Towards a Believable Decoy System: Replaying Network Activities from Real System.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Cache-in-the-Middle (CITM) Attacks: Manipulating Sensitive Data in Isolated Execution Environments.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Off-Path TCP Exploits of the Mixed IPID Assignment.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

RusTEE: Developing Memory-Safe ARM TrustZone Applications.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

An Empirical Study of Secret Security Patch in Open Source Software.
Proceedings of the Adaptive Autonomous Secure Cyber Systems., 2020

2019
BluePass: A Mobile Device Assisted Password Manager.
EAI Endorsed Trans. Security Safety, 2019

PathMarker: protecting web contents against inside crawlers.
Cybersecur., 2019

DangerNeighbor attack: Information leakage via postMessage mechanism in HTML5.
Comput. Secur., 2019

The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links.
Proceedings of the 28th USENIX Security Symposium, 2019

Automated IoT Device Fingerprinting Through Encrypted Stream Classification.
Proceedings of the Security and Privacy in Communication Networks, 2019

Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts.
Proceedings of the Security and Privacy in Communication Networks, 2019

Fingerprinting SDN Applications via Encrypted Control Traffic.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

UBER: Combating Sandbox Evasion via User Behavior Emulators.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

OCRAM-Assisted Sensitive Data Protection on ARM-Based Platform.
Proceedings of the Computer Security - ESORICS 2019, 2019

Detecting "0-Day" Vulnerability: An Empirical Study of Secret Security Patch in OSS.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM Processors.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

Federated-Cloud Based Deep Neural Networks with Privacy Preserving Image Filtering Techniques.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

A Scalable High Fidelity Decoy Framework against Sophisticated Cyber Attacks.
Proceedings of the 6th ACM Workshop on Moving Target Defense, 2019

2018
Memory Forensic Challenges Under Misused Architectural Features.
IEEE Trans. Inf. Forensics Secur., 2018

TruSense: Information Leakage from TrustZone.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Email as a Master Key: Analyzing Account Recovery in the Wild.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

A Measurement Study on Linux Container Security: Attacks and Countermeasures.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Personal Information in Passwords and Its Security Implications.
IEEE Trans. Inf. Forensics Secur., 2017

FEC-Seluge: Efficient, reliable, and secure large data dissemination using erasure codes.
Comput. Commun., 2017

LinkFlow: Efficient Large-Scale Inter-app Privacy Leakage Detection.
Proceedings of the Security and Privacy in Communication Networks, 2017

Disrupting SDN via the Data Plane: A Low-Rate Flow Table Overflow Attack.
Proceedings of the Security and Privacy in Communication Networks, 2017

BluePass: A Secure Hand-Free Password Manager.
Proceedings of the Security and Privacy in Communication Networks, 2017

Your Neighbors are Listening: Evaluating PostMessage Use in OAuth.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Cookie-based amplification repression protocol.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

Protecting web contents against persistent distributed crawlers.
Proceedings of the IEEE International Conference on Communications, 2017

A measurement study on Amazon wishlist and its privacy exposure.
Proceedings of the IEEE International Conference on Communications, 2017

JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

SPEAKER: Split-Phase Execution of Application Containers.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

CyberMoat: Camouflaging critical server infrastructures with large scale decoy farms.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Vulnerable Implicit Service: A Revisit.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices.
IACR Cryptol. ePrint Arch., 2016

CaSE: Cache-Assisted Secure Execution on ARM Processors.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

DESIR: Decoy-enhanced seamless IP randomization.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

A study of personal information in human-chosen passwords and its security implications.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Amnesia: A Bilateral Generative Password Manager.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

CacheKit: Evading Memory Introspection Using Cache Incoherence.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Privacy Breach by Exploiting postMessage in HTML5: Identification, Evaluation, and Countermeasure.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Reliable and Trustworthy Memory Acquisition on Smartphones.
IEEE Trans. Inf. Forensics Secur., 2015

PmDroid: Permission Supervision for Android Advertising.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems, 2015

Using Hardware Features for Increased Debugging Transparency.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

TrustICE: Hardware-Assisted Isolated Computing Environments on Mobile Devices.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

Now You See Me: Hide and Seek in Physical Address Space.
Proceedings of the 10th ACM Symposium on Information, 2015

TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
HyperCheck: A Hardware-AssistedIntegrity Monitor.
IEEE Trans. Dependable Secur. Comput., 2014

Protecting Enterprise Networks through Attack Surface Expansion.
Proceedings of the 2014 Workshop on Cyber Security Analytics, 2014

TrustDump: Reliable Memory Acquisition on Smartphones.
Proceedings of the Computer Security - ESORICS 2014, 2014

Remotely wiping sensitive data on stolen smartphones.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

MTD 2014: First ACM Workshop on Moving Target Defense.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Proof of Isolation for Cloud Storage.
Proceedings of the Secure Cloud Computing, 2014

2013
Capability-Based Defenses Against DoS Attacks in Multi-path MANET Communications.
Wirel. Pers. Commun., 2013

Reducing Attack Surface with VM-Based Phantom Server.
Proceedings of the 32th IEEE Military Communications Conference, 2013

On Feasibility of Fingerprinting Wireless Sensor Nodes Using Physical Properties.
Proceedings of the 27th IEEE International Symposium on Parallel and Distributed Processing, 2013

MOTAG: Moving Target Defense against Internet Denial of Service Attacks.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

SPECTRE: A dependable introspection framework via System Management Mode.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

TerraCheck: Verification of Dedicated Cloud Storage.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

A moving target defense mechanism for MANETs based on identity virtualization.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Verification of data redundancy in cloud storage.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013

2012
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Hardware-Assisted Application Integrity Monitor.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

Disk storage isolation and verification in cloud.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

A dependability analysis of hardware-assisted polling integrity checking systems.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

NetGator: Malware Detection Using Program Interactive Challenges.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012

2011
Secure Time Synchronization.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Firmware-assisted Memory Acquisition and Analysis tools for Digital Forensics.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

A Self-shielding Dynamic Network Architecture.
Proceedings of the MILCOM 2011, 2011

Automatic security analysis using security metrics.
Proceedings of the MILCOM 2011, 2011

CapMan: Capability-Based Defense against Multi-Path Denial of Service (DoS) Attacks in MANET.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

2009
Securing network access in wireless sensor networks.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

2007
Secure and Resilient Time Synchronization in Wireless Sensor Networks.
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007

2006
Secure and resilient clock synchronization in wireless sensor networks.
IEEE J. Sel. Areas Commun., 2006

TinySeRSync: secure and resilient time synchronization in wireless sensor networks.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

Secure Distributed Cluster Formation in Wireless Sensor Networks.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2005

How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols.
Ad Hoc Networks, 2005

2003
How to Misuse AODV: A Case Study of Insiider Attacks against Mobile Ad-hoc Routing Protocols.
Proceedings of the IEEE Systems, 2003

Efficient self-healing group key distribution with revocation capability.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003


  Loading...