Lingyu Wang

Orcid: 0000-0002-7441-7541

Affiliations:
  • Concordia University, Montreal, Canada


According to our database1, Lingyu Wang authored at least 167 papers between 2002 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing.
IEEE Trans. Knowl. Data Eng., 2023

A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and Features.
ACM Comput. Surv., 2023

Warping the Defence Timeline: Non-Disruptive Proactive Attack Mitigation for Kubernetes Clusters.
Proceedings of the IEEE International Conference on Communications, 2023

Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring.
Proceedings of the Computer Security - ESORICS 2023, 2023

A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual Network Function Chains Hosted on Third-Party Clouds.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

2022
ProSAS: Proactive Security Auditing System for Clouds.
IEEE Trans. Dependable Secur. Comput., 2022

Factor of Security (FoS): Quantifying the Security Effectiveness of Redundant Smart Grid Subsystems.
IEEE Trans. Dependable Secur. Comput., 2022

Automatic Vulnerability Detection in Embedded Devices and Firmware: Survey and Layered Taxonomies.
ACM Comput. Surv., 2022

DPOAD: Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning.
CoRR, 2022

VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack.
Proceedings of the Secure IT Systems, 2022

ProvTalk: Towards Interpretable Multi-level Provenance Analysis in Networking Functions Virtualization (NFV).
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Hardening Substations against Supply Chain Attacks Under Operational Constraints.
Proceedings of the 2022 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2022

A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing (Extended Abstract).
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022

MLFM: Machine Learning Meets Formal Method for Faster Identification of Security Breaches in Network Functions Virtualization (NFV).
Proceedings of the Computer Security - ESORICS 2022, 2022

ProSPEC: Proactive Security Policy Enforcement for Containers.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

5GFIVer: Functional Integrity Verification for 5G Cloud-Native Network Functions.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2022

WPES '22: 21st Workshop on Privacy in the Electronic Society.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization.
ACM Trans. Priv. Secur., 2021

Network Attack Surface: Lifting the Concept of Attack Surface to the Network Level for Evaluating Networks' Resilience Against Zero-Day Attacks.
IEEE Trans. Dependable Secur. Comput., 2021

SegGuard: Segmentation-Based Anonymization of Network Data in Clouds for Privacy-Preserving Security Auditing.
IEEE Trans. Dependable Secur. Comput., 2021

VMGuard: State-Based Proactive Verification of Virtual Network Isolation With Application to NFV.
IEEE Trans. Dependable Secur. Comput., 2021

Artificial Packet-Pair Dispersion (APPD): A Blackbox Approach to Verifying the Integrity of NFV Service Chains.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

2020
Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting
Advances in Information Security 78, Springer, ISBN: 978-3-030-34237-1, 2020

CPA: Accurate Cross-Platform Binary Authorship Characterization Using LDA.
IEEE Trans. Inf. Forensics Secur., 2020

R<sup>2</sup>DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions.
CoRR, 2020

Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV).
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020

Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

NFVGuard: Verifying the Security of Multilevel Network Functions Virtualization (NFV) Stack.
Proceedings of the 12th IEEE International Conference on Cloud Computing Technology and Science, 2020

R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Cloud Security Auditing
Advances in Information Security 76, Springer, ISBN: 978-3-030-23127-9, 2019

ISOTOP: Auditing Virtual Networks Isolation Across Cloud Layers in OpenStack.
ACM Trans. Priv. Secur., 2019

Large-Scale Empirical Study of Important Features Indicative of Discovered Vulnerabilities to Assess Application Security.
IEEE Trans. Inf. Forensics Secur., 2019

Monitoring and Improving Managed Security Services inside a Security Operation Center.
EAI Endorsed Trans. Security Safety, 2019

Threat Modeling for Cloud Infrastructures.
EAI Endorsed Trans. Security Safety, 2019

Learning probabilistic dependencies among events for proactive security auditing in clouds.
J. Comput. Secur., 2019

Decoupling coding habits from functionality for effective binary authorship attribution.
J. Comput. Secur., 2019

Mitigating the insider threat of remote administrators in clouds through maintenance task assignments.
J. Comput. Secur., 2019

On the feasibility of binary authorship characterization.
Digit. Investig., 2019

Optimizing the network diversity to improve the resilience of networks against unknown attacks.
Comput. Commun., 2019

Modeling Supply Chain Attacks in IEC 61850 Substations.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

iCAT: An Interactive Customizable Anonymization Tool.
Proceedings of the Computer Security - ESORICS 2019, 2019

Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement.
Proceedings of the Computer Security - ESORICS 2019, 2019

BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning.
Proceedings of the Computer Security - ESORICS 2019, 2019

Multi-Level Proactive Security Auditing for Clouds.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

CASFinder: Detecting Common Attack Surface.
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019

Modeling NFV Deployment to Identify the Cross-Level Inconsistency Vulnerabilities.
Proceedings of the 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2019

2018
<i>FOSSIL</i>: A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries.
ACM Trans. Priv. Secur., 2018

User-Level Runtime Security Auditing for the Cloud.
IEEE Trans. Inf. Forensics Secur., 2018

Opportunistic Diversity-Based Detection of Injection Attacks in Web Applications.
EAI Endorsed Trans. Security Safety, 2018

Surviving unpatchable vulnerabilities through heterogeneous network hardening options.
J. Comput. Secur., 2018

Realtime intrusion risk assessment model based on attack and service dependency graphs.
Comput. Commun., 2018

Cloud Security Auditing: Major Approaches and Existing Challenges.
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018

On Leveraging Coding Habits for Effective Binary Authorship Attribution.
Proceedings of the Computer Security, 2018

Stealthy Probing-Based Verification (SPV): An Active Approach to Defending Software Defined Networks Against Topology Poisoning Attacks.
Proceedings of the Computer Security, 2018

BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

PERMON: An OpenStack Middleware for Runtime Security Policy Enforcement in Clouds.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

QuantiC: Distance Metrics for Evaluating Multi-Tenancy Threats in Public Cloud.
Proceedings of the 2018 IEEE International Conference on Cloud Computing Technology and Science, 2018

Preserving Both Privacy and Utility in Network Trace Anonymization.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks.
Proceedings of the From Database to Cyber Security, 2018

2017
Privacy Preserving Smart Meter Streaming Against Information Leakage of Appliance Status.
IEEE Trans. Inf. Forensics Secur., 2017

Corrigendum to 'OBA2: An Onion approach to Binary code Authorship Attribution' [Digit Investig 11 (2014) S94-S103].
Digit. Investig., 2017

Measuring the security posture of IEC 61850 substations with redundancy against zero day attacks.
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017

TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

LeaPS: Learning-Based Proactive Security Auditing for Clouds.
Proceedings of the Computer Security - ESORICS 2017, 2017

BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

Securing Networks Against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening Options.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Network Security Metrics
Springer, ISBN: 978-3-319-66504-7, 2017

2016
Preserving Privacy Against Side-Channel Leaks - From Data Publishing to Web Applications
Advances in Information Security 68, Springer, ISBN: 978-3-319-42644-0, 2016

Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks.
IEEE Trans. Inf. Forensics Secur., 2016

Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage.
IEEE Trans. Computers, 2016

A taint based approach for automatic reverse engineering of gray-box file formats.
Soft Comput., 2016

Aspect-oriented modeling framework for security hardening.
Innov. Syst. Softw. Eng., 2016

<i>BinGold</i>: Towards robust binary analysis by extracting the semantics of binary code as semantic flow graphs (SFGs).
Digit. Investig., 2016

Towards Metric-Driven, Application-Specific Visualization of Attack Graphs.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

On the Feasibility of Malware Authorship Attribution.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

Threat Modeling for Cloud Data Center Infrastructures.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack.
Proceedings of the Computer Security - ESORICS 2016, 2016

Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
<i>k</i>-jump: A strategy to design publicly-known algorithms for privacy preserving micro-data disclosure.
J. Comput. Secur., 2015

BinComp: A stratified approach to compiler provenance Attribution.
Digit. Investig., 2015

SIGMA: A Semantic Integrated Graph Matching Approach for identifying reused functions in binary code.
Digit. Investig., 2015

Security Compliance Auditing of Identity and Access Management in the Cloud: Application to OpenStack.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

Aspect-Oriented Security Hardening of UML Design Models
Springer, ISBN: 978-3-319-16106-8, 2015

2014
Network Hardening - An Automated Approach to Improving Network Security
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-04612-9, 2014

Proof-Carrying Cloud Computation: The Case of Convex Optimization.
IEEE Trans. Inf. Forensics Secur., 2014

k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities.
IEEE Trans. Dependable Secur. Comput., 2014

PPTP: Privacy-Preserving Traffic Padding in Web-Based Applications.
IEEE Trans. Dependable Secur. Comput., 2014

OBA2: An Onion approach to Binary code Authorship Attribution.
Digit. Investig., 2014

Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks.
Proceedings of the Computer Security - ESORICS 2014, 2014

Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

2013
A Unified Framework for Measuring a Network's Mean Time-to-Compromise.
Proceedings of the IEEE 32nd Symposium on Reliable Distributed Systems, 2013

An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities.
Proceedings of the SECRYPT 2013, 2013

Proof-carrying cloud computation: The case of convex optimization.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

An Efficient Framework for Evaluating the Risk of Zero-Day Vulnerabilities.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2013

Background Knowledge-Resistant Traffic Padding for Preserving User Privacy in Web-Based Applications.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

2012
Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection.
J. Intell. Manuf., 2012

Secure collaboration in global design and supply chain environment: Problem analysis and literature review.
Comput. Ind., 2012

Secure collaboration in design and supply chain management.
Comput. Ind., 2012

Aggregating CVSS Base Scores for Semantics-Rich Network Security Metrics.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

k-Indistinguishable Traffic Padding in Web Applications.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

Privacy streamliner: a two-stage approach to improving algorithm efficiency.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET.
IEEE Trans. Dependable Secur. Comput., 2011

Modeling and evaluating information leakage caused by inferences in supply chains.
Comput. Ind., 2011

Privacy-preserving traffic padding in web-based applications.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

2010
Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks.
IEEE Trans. Mob. Comput., 2010

Providing witness anonymity under peer-to-peer settings.
IEEE Trans. Inf. Forensics Secur., 2010

PCM: a privacy-preserving detection mechanism in mobile <i>ad hoc</i> networks.
Secur. Commun. Networks, 2010

Measuring Security Risk of Networks Using Attack Graphs.
Int. J. Next Gener. Comput., 2010

Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML.
Proceedings of the Software Engineering Research, 2010

Defaming Botnet Toolkits: A Bottom-Up Approach to Mitigating the Threat.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

On the analysis of the Zeus botnet crimeware toolkit.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

k-jump strategy for preserving privacy in micro-data disclosure.
Proceedings of the Database Theory, 2010

Aspect Weaving in UML Activity Diagrams: A Semantic and Algorithmic Framework.
Proceedings of the Formal Aspects of Component Software - 7th International Workshop, 2010

<i>k</i>-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks.
Proceedings of the Computer Security, 2010

Aspect weaver: a model transformation approach for UML models.
Proceedings of the 2010 conference of the Centre for Advanced Studies on Collaborative Research, 2010

Compressing Attack Graphs Through Reference Encoding.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Usability of Security Specification Approaches for UML Design: A Survey.
J. Object Technol., 2009

Evaluating privacy threats in released database views by symmetric indistinguishability.
J. Comput. Secur., 2009

Formal Verification and Validation of UML 2.0 Sequence Diagrams using Source and Destination of Messages.
Proceedings of the 4th International Workshop on Systems Software Verification, 2009

Privacy-preserving data publishing for cluster analysis.
Data Knowl. Eng., 2009

An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2009

L-Cover: Preserving Diversity by Anonymity.
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009

Simple Dynamic Key Management in SQL Randomization.
Proceedings of the NTMS 2009, 2009

Preserving Privacy for Location-Based Services with Continuous Queries.
Proceedings of IEEE International Conference on Communications, 2009

Weaving security aspects into UML 2.0 design models.
Proceedings of the 13th workshop on Aspect-oriented modeling, 2009

2008
Security in Data Warehouses and OLAP Systems.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Implementing interactive analysis of attack graphs using relational databases.
J. Comput. Secur., 2008

A game-theoretic intrusion detection model for mobile ad hoc networks.
Comput. Commun., 2008

A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Towards Efficient Over-Encryption in Outsourced Databases Using Secret Sharing.
Proceedings of the NTMS 2008, 2008

A Heuristic Approach to Minimum-Cost Network Hardening Using Attack Graph.
Proceedings of the NTMS 2008, 2008

A framework for privacy-preserving cluster analysis.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

Anonymous Misbehavior Detection in Mobile Ad Hoc Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure.
Proceedings of the Data and Applications Security XXII, 2008

An Attack Graph-Based Probabilistic Security Metric.
Proceedings of the Data and Applications Security XXII, 2008

Preserving Privacy in E-health Systems Using Hippocratic Databases.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

Measuring Network Security Using Bayesian Network-Based Attack Graphs.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

The Authentication Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement.
Proceedings of the Novel Algorithms and Techniques in Telecommunications and Networking, 2008

The Integrity Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement.
Proceedings of the Novel Algorithms and Techniques in Telecommunications and Networking, 2008

Measuring network security using dynamic bayesian network.
Proceedings of the 4th ACM Workshop on Quality of Protection, 2008

An Efficient Approach to Minimum-Cost Network Hardening Using Attack Graphs.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

Securing Telehealth Applications in a Web-Based e-Health Portal.
Proceedings of the The Third International Conference on Availability, 2008

2007
Preserving Privacy in On-line Analytical Processing Data Cubes.
Proceedings of the Secure Data Management in Decentralized Systems, 2007

Parity-based inference control for multi-dimensional range sum queries.
J. Comput. Secur., 2007

An Efficient and Truthful Leader IDS Election Mechanism for MANET.
Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, 2007

Measuring the Overall Security of Network Configurations Using Attack Graphs.
Proceedings of the Data and Applications Security XXI, 2007

Toward measuring network security using attack graphs.
Proceedings of the 3th ACM Workshop on Quality of Protection, 2007

Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

Preserving Privacy in On-Line Analytical Processing (OLAP)
Advances in Information Security 29, Springer, ISBN: 978-0-387-46273-8, 2007

2006
Minimum-cost network hardening using attack graphs.
Comput. Commun., 2006

Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts.
Comput. Commun., 2006

Indistinguishability: The Other Aspect of Privacy.
Proceedings of the Secure Data Management, Third VLDB Workshop, SDM 2006, Seoul, Korea, 2006

Interactive Analysis of Attack Graphs Using Relational Queries.
Proceedings of the Data and Applications Security XX, 2006

2005
An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts.
Proceedings of the Computer Security, 2005

2004
Cardinality-based inference control in data cubes.
J. Comput. Secur., 2004

Securing OLAP Data Cubes Against Privacy Breaches.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004

A logic-based framework for attribute based access control.
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, 2004

2003
Precisely Answering Multi-dimensional Range Queries without Privacy Breaches.
Proceedings of the Computer Security, 2003

2002
Preventing Interval-Based Inference by Random Data Perturbation.
Proceedings of the Privacy Enhancing Technologies, Second International Workshop, 2002

A Privacy-Enhanced Microaggregation Method.
Proceedings of the Foundations of Information and Knowledge Systems, 2002

Cardinality-Based Inference Control in Sum-Only Data Cubes.
Proceedings of the Computer Security, 2002

Towards Secure XML Federations.
Proceedings of the Research Directions in Data and Applications Security, 2002

Auditing Interval-Based Inference.
Proceedings of the Advanced Information Systems Engineering, 14th International Conference, 2002


  Loading...