Kun Sun

Orcid: 0000-0003-4152-2107

Affiliations:
  • George Mason University, Department of Information Sciences and Technology, Fairfax, VA, USA
  • College of William and Mary, Department of Computer Science, Williamsburg, VA, USA (former)
  • Intelligent Automation Inc., Rockville, MD, USA (former)
  • North Carolina State University, Department of Computer Science, Raleigh, NC, USA (PhD)


According to our database1, Kun Sun authored at least 141 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Interface-Based Side Channel in TEE-Assisted Networked Services.
IEEE/ACM Trans. Netw., February, 2024

CacheIEE: Cache-Assisted Isolated Execution Environment on ARM Multi-Core Platforms.
IEEE Trans. Dependable Secur. Comput., 2024

2023
The LOFT Attack: Overflowing SDN Flow Tables at a Low Rate.
IEEE/ACM Trans. Netw., June, 2023

A Systematic Study of Android Non-SDK (Hidden) Service API Security.
IEEE Trans. Dependable Secur. Comput., 2023

BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning.
CoRR, 2023

Having Difficulty Understanding Manuals? Automatically Converting User Manuals into Instructional Videos.
CoRR, 2023

Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic.
CoRR, 2023

Compensating Removed Frequency Components: Thwarting Voice Spectrum Reduction Attacks.
CoRR, 2023

Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation.
Proceedings of the 32nd USENIX Security Symposium, 2023

Cross Container Attacks: The Bewildered eBPF on Clouds.
Proceedings of the 32nd USENIX Security Symposium, 2023

GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Exploring Security Commits in Python.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2023

Enhancing Honeypot Fidelity with Real-Time User Behavior Emulation.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023

BlueShift: Probing Adaptive Frequency Hopping in Bluetooth.
Proceedings of the 10th ACM Workshop on Moving Target Defense, 2023

Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation.
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023

Traffic Hijacking in Wi-Fi Networks via ICMP Redirects.
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023

2022
Disrupting the SDN Control Channel via Shared Links: Attacks and Countermeasures.
IEEE/ACM Trans. Netw., 2022

Off-Path TCP Hijacking Attacks via the Side Channel of Downgraded IPID.
IEEE/ACM Trans. Netw., 2022

Good Learning, Bad Performance: A Novel Attack Against RL-Based Congestion Control Systems.
IEEE Trans. Inf. Forensics Secur., 2022

Understanding Account Recovery in the Wild and its Security Implications.
IEEE Trans. Dependable Secur. Comput., 2022

JNI Global References Are Still Vulnerable: Attacks and Defenses.
IEEE Trans. Dependable Secur. Comput., 2022

The devil is in the detail: Generating system call whitelist for Linux seccomp.
Future Gener. Comput. Syst., 2022

Enhancing malware analysis sandboxes with emulated user behavior.
Comput. Secur., 2022

Understanding the Practice of Security Patch Management across Multiple Branches in OSS Projects.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Exploring the Unchartered Space of Container Registry Typosquatting.
Proceedings of the 31st USENIX Security Symposium, 2022

RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices.
Proceedings of the 31st USENIX Security Symposium, 2022

Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks.
Proceedings of the 31st USENIX Security Symposium, 2022

An Investigation on Data Center Cooling Systems Using FPGA-based Temperature Side Channels.
Proceedings of the 41st International Symposium on Reliable Distributed Systems, 2022

BinProv: Binary Code Provenance Identification without Disassembly.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

EZPath: Expediting Container Network Traffic via Programmable Switches.
Proceedings of the IFIP Networking Conference, 2022

PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Auter: Automatically Tuning Multi-layer Network Buffers in Long-Distance Shadowsocks Networks.
Proceedings of the IEEE INFOCOM 2022, 2022

Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2022

SysCap: Profiling and Crosschecking Syscall and Capability Configurations for Docker Images.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

Ready Raider One: Exploring the Misuse of Cloud Gaming Services.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption.
IEEE Trans. Inf. Forensics Secur., 2021

Vulnerable Service Invocation and Countermeasures.
IEEE Trans. Dependable Secur. Comput., 2021

User input enrichment via sensing devices.
Comput. Networks, 2021

Remotely controlling TrustZone applications?: a study on securely and resiliently receiving remote commands.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

PatchRNN: A Deep Learning-Based System for Security Patch Identification.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

Detecting Localized Adversarial Examples: A Generic Approach using Critical Region Analysis.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

PatchDB: A Large-Scale Security Patch Dataset.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

UTrack: Enterprise User Tracking Based on OS-Level Audit Logs.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

HoneyBog: A Hybrid Webshell Honeypot Framework against Command Injection.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

Locating the Security Patches for Disclosed OSS Vulnerabilities with Vulnerability-Commit Correlation Ranking.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

A Hard Label Black-box Adversarial Attack Against Graph Neural Networks.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

See through Walls: Detecting Malware in SGX Enclaves with SGX-Bouncer.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Try before You Buy: Privacy-preserving Data Evaluation on Cloud-based Machine Learning Data Marketplace.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
TrustICT: an efficient trusted interaction interface between isolated execution domains on ARM multi-core processors.
Proceedings of the SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, 2020

SGX-Cube: An SGX-Enhanced Single Sign-On System Against Server-Side Credential Leakage.
Proceedings of the Security and Privacy in Communication Networks, 2020

SIEVE: Secure In-Vehicle Automatic Speech Recognition Systems.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Evaluation on the Security of Commercial Cloud Container Services.
Proceedings of the Information Security - 23rd International Conference, 2020

A Machine Learning Approach to Classify Security Patches into Vulnerability Types.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

Towards a Believable Decoy System: Replaying Network Activities from Real System.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Cache-in-the-Middle (CITM) Attacks: Manipulating Sensitive Data in Isolated Execution Environments.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Off-Path TCP Exploits of the Mixed IPID Assignment.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

RusTEE: Developing Memory-Safe ARM TrustZone Applications.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

An Empirical Study of Secret Security Patch in Open Source Software.
Proceedings of the Adaptive Autonomous Secure Cyber Systems., 2020

2019
BluePass: A Mobile Device Assisted Password Manager.
EAI Endorsed Trans. Security Safety, 2019

PathMarker: protecting web contents against inside crawlers.
Cybersecur., 2019

DangerNeighbor attack: Information leakage via postMessage mechanism in HTML5.
Comput. Secur., 2019

The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links.
Proceedings of the 28th USENIX Security Symposium, 2019

Automated IoT Device Fingerprinting Through Encrypted Stream Classification.
Proceedings of the Security and Privacy in Communication Networks, 2019

Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts.
Proceedings of the Security and Privacy in Communication Networks, 2019

Fingerprinting SDN Applications via Encrypted Control Traffic.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

UBER: Combating Sandbox Evasion via User Behavior Emulators.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

OCRAM-Assisted Sensitive Data Protection on ARM-Based Platform.
Proceedings of the Computer Security - ESORICS 2019, 2019

Detecting "0-Day" Vulnerability: An Empirical Study of Secret Security Patch in OSS.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM Processors.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

Federated-Cloud Based Deep Neural Networks with Privacy Preserving Image Filtering Techniques.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

A Scalable High Fidelity Decoy Framework against Sophisticated Cyber Attacks.
Proceedings of the 6th ACM Workshop on Moving Target Defense, 2019

2018
Memory Forensic Challenges Under Misused Architectural Features.
IEEE Trans. Inf. Forensics Secur., 2018

TruSense: Information Leakage from TrustZone.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Email as a Master Key: Analyzing Account Recovery in the Wild.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

A Measurement Study on Linux Container Security: Attacks and Countermeasures.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Personal Information in Passwords and Its Security Implications.
IEEE Trans. Inf. Forensics Secur., 2017

FEC-Seluge: Efficient, reliable, and secure large data dissemination using erasure codes.
Comput. Commun., 2017

LinkFlow: Efficient Large-Scale Inter-app Privacy Leakage Detection.
Proceedings of the Security and Privacy in Communication Networks, 2017

Disrupting SDN via the Data Plane: A Low-Rate Flow Table Overflow Attack.
Proceedings of the Security and Privacy in Communication Networks, 2017

BluePass: A Secure Hand-Free Password Manager.
Proceedings of the Security and Privacy in Communication Networks, 2017

Your Neighbors are Listening: Evaluating PostMessage Use in OAuth.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Cookie-based amplification repression protocol.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

Protecting web contents against persistent distributed crawlers.
Proceedings of the IEEE International Conference on Communications, 2017

A measurement study on Amazon wishlist and its privacy exposure.
Proceedings of the IEEE International Conference on Communications, 2017

JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

SPEAKER: Split-Phase Execution of Application Containers.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

CyberMoat: Camouflaging critical server infrastructures with large scale decoy farms.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Vulnerable Implicit Service: A Revisit.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices.
IACR Cryptol. ePrint Arch., 2016

CaSE: Cache-Assisted Secure Execution on ARM Processors.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

DESIR: Decoy-enhanced seamless IP randomization.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

A study of personal information in human-chosen passwords and its security implications.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Amnesia: A Bilateral Generative Password Manager.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

CacheKit: Evading Memory Introspection Using Cache Incoherence.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Privacy Breach by Exploiting postMessage in HTML5: Identification, Evaluation, and Countermeasure.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Reliable and Trustworthy Memory Acquisition on Smartphones.
IEEE Trans. Inf. Forensics Secur., 2015

PmDroid: Permission Supervision for Android Advertising.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems, 2015

Using Hardware Features for Increased Debugging Transparency.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

TrustICE: Hardware-Assisted Isolated Computing Environments on Mobile Devices.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

Now You See Me: Hide and Seek in Physical Address Space.
Proceedings of the 10th ACM Symposium on Information, 2015

TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
HyperCheck: A Hardware-AssistedIntegrity Monitor.
IEEE Trans. Dependable Secur. Comput., 2014

Protecting Enterprise Networks through Attack Surface Expansion.
Proceedings of the 2014 Workshop on Cyber Security Analytics, 2014

TrustDump: Reliable Memory Acquisition on Smartphones.
Proceedings of the Computer Security - ESORICS 2014, 2014

Remotely wiping sensitive data on stolen smartphones.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

MTD 2014: First ACM Workshop on Moving Target Defense.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Cloud-based user authentication with geo-temporal queries on smartphones.
Proceedings of the Second International Workshop on Security in Cloud Computing, 2014

Proof of Isolation for Cloud Storage.
Proceedings of the Secure Cloud Computing, 2014

2013
Capability-Based Defenses Against DoS Attacks in Multi-path MANET Communications.
Wirel. Pers. Commun., 2013

Reducing Attack Surface with VM-Based Phantom Server.
Proceedings of the 32th IEEE Military Communications Conference, 2013

On Feasibility of Fingerprinting Wireless Sensor Nodes Using Physical Properties.
Proceedings of the 27th IEEE International Symposium on Parallel and Distributed Processing, 2013

MOTAG: Moving Target Defense against Internet Denial of Service Attacks.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

SPECTRE: A dependable introspection framework via System Management Mode.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

TerraCheck: Verification of Dedicated Cloud Storage.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

A moving target defense mechanism for MANETs based on identity virtualization.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Effectiveness of IP address randomization in decoy-based moving target defense.
Proceedings of the 52nd IEEE Conference on Decision and Control, 2013

Verification of data redundancy in cloud storage.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013

2012
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Hardware-Assisted Application Integrity Monitor.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

Disk storage isolation and verification in cloud.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

A dependability analysis of hardware-assisted polling integrity checking systems.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

NetGator: Malware Detection Using Program Interactive Challenges.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012

2011
Secure Time Synchronization.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Firmware-assisted Memory Acquisition and Analysis tools for Digital Forensics.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

A Self-shielding Dynamic Network Architecture.
Proceedings of the MILCOM 2011, 2011

Automatic security analysis using security metrics.
Proceedings of the MILCOM 2011, 2011

CapMan: Capability-Based Defense against Multi-Path Denial of Service (DoS) Attacks in MANET.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

2009
Securing network access in wireless sensor networks.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

2007
Secure and Resilient Time Synchronization in Wireless Sensor Networks.
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007

2006
Secure and resilient clock synchronization in wireless sensor networks.
IEEE J. Sel. Areas Commun., 2006

TinySeRSync: secure and resilient time synchronization in wireless sensor networks.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

Secure Distributed Cluster Formation in Wireless Sensor Networks.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2005

How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols.
Ad Hoc Networks, 2005

2003
How to Misuse AODV: A Case Study of Insiider Attacks against Mobile Ad-hoc Routing Protocols.
Proceedings of the IEEE Systems, 2003

Efficient self-healing group key distribution with revocation capability.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003


  Loading...