Simon P. Chung

According to our database1, Simon P. Chung authored at least 28 papers between 2005 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
PUMM: Preventing Use-After-Free Using Execution Unit Partitioning.
Proceedings of the 32nd USENIX Security Symposium, 2023

2021
Modeling Large-Scale Manipulation in Open Stock Markets.
IEEE Secur. Priv., 2021

ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems.
Proceedings of the 30th USENIX Security Symposium, 2021

Fuzzy Labeled Private Set Intersection with Applications to Private Real-Time Biometric Search.
Proceedings of the 30th USENIX Security Symposium, 2021

Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Automated Bug Hunting With Data-Driven Symbolic Root Cause Analysis.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Cryptographic Key Derivation from Biometric Inferences for Remote Authentication.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
On the Feasibility of Automating Stock Market Manipulation.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
RAZOR: A Framework for Post-deployment Software Debloating.
Proceedings of the 28th USENIX Security Symposium, 2019

2018
rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Broken Fingers: On the Usage of the Fingerprint API in Android.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Enforcing Unique Code Target Property for Control-Flow Integrity.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Improving Accuracy of Android Malware Detection with Lightweight Contextual Awareness.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

2016
The Price of Free: Privacy Leakage in Personalized Mobile In-Apps Ads.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
On the Feasibility of Large-Scale Infections of iOS Devices.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Mimesis Aegis: A Mimicry Privacy Shield-A System's Approach to Data Privacy on Public Cloud.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Gyrus: A Framework for User-Intent Monitoring of Text-based Networked Applications.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

A11y Attacks: Exploiting Accessibility in Operating Systems.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Jekyll on iOS: When Benign Apps Become Evil.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

2008
Swarm Attacks against Network-Level Emulation/Analysis.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

2007
Collaborative Intrusion Prevention.
Proceedings of the 16th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE 2007), 2007

Advanced Allergy Attacks: Does a Corpus Really Help?
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007

2006
Allergy Attack Against Automatic Signature Generation.
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006

The LAIDS/LIDS Framework for Systematic IPS Design.
Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 2006

2005
On Random-Inspection-Based Intrusion Detection.
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005


  Loading...