Publications

By year  By area

2017

  • Lingguang Lei, Yi He, Kun Sun, Jiwu Jing, Yuewu Wang, Qi Li, and Jian Weng. “Vulnerable Implicit Service: A Revisit”. To appear in the 24nd ACM Conference on Computer and Communications Security (CCS), Dallas, Texas, October 30-November 3, 2017. (Acceptance ratio: 18%=151/836)
  • Yue Li, Haining Wang, and Kun Sun. “BluePass: A Secure Hand-free Password Manager”. To appear in the International Conference on Security and Privacy in Communication Networks (SECURECOMM), Niagara Falls, CANADA. (Acceptance ratio (full paper): 29.5%=31/105)
  • Yi He, Qi Li, and Kun Sun. “LinkFlow: Efficient Large-Scale Inter-App Privacy Leakage Detection”. To appear in the International Conference on Security and Privacy in Communication Networks (SECURECOMM), Niagara Falls, CANADA. (Acceptance ratio (full paper): 29.5%=31/105)
  • Jiahao Cao, Mingwei Xu, Qi Li, Kun Sun, Yuan Yang and Jing Zheng. “Disrupting SDN via the Data Plane: A Low-Rate Flow Table Overflow Attack”. To appear in the International Conference on Security and Privacy in Communication Networks (SECURECOMM), Niagara Falls, CANADA. (Acceptance ratio (full paper): 29.5%=31/105)
  • Jianhua Sun, Kun Sun, and Qi Li. “CyberMoat: Camouflaging Critical Server Infrastructures with Large Scale Decoy Farms”. To appear in IEEE Conference on Communications and Network Security (CNS), Las Vegas, NV, October 9-11, 2017.(Acceptance ratio: 29.99%=41/137)
  • Yue Li, Haining Wang, and Kun Sun. “Personal Information in Passwords and Its Security Implications”. To appear in IEEE Transactions on Information Forensics and Security (TIFS), page 2320-2333, Vol 12, Issue 10, October, 2017.
  • Lingguang Lei, Jianhua Sun, Kun Sun, Chris Shenefiel, Rui Ma, Yuewu Wang, and Qi Li,. “SPEAKER: Split-Phase Execution of Application Containers.” To appear in the 14th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Bonn, Germany, July 6-7. 2017. (Acceptance ratio: 26.86%=18/67)
  • Yacong Gu, Kun Sun, Purui Su, Qi Li, Yemian Lu, Lingyun Ying, and Denguo Feng. “JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android .” To appear in the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Denver, CO, June 26-29, 2017. (Acceptance ratio: 22.27%=49/220)
  • Shengye Wan, Yue Li, and Kun Sun. “Protecting Web Contents against Persistent Distributed Crawlers.” To appear in the IEEE ICC 2017, Communication and Information Systems Security Symposium, Paris, France, 2017.
  • Yue Li, Nan Zheng, Haining Wang, Kun Sun, and Hui Fang. “A Measurement Study on Amazon Wishlist and Its Privacy Exposure.” To appear in the IEEE ICC 2017, Communication and Information Systems Security Symposium, Paris, France, 2017.
  • Gangwon Hyun, Kun Sun, and Peng Ning. “FEC-Seluge: Efficient, Reliable, and Secure Large Data Dissemination using Erasure Codes”, To appear in Computer Communications (Elsevier), 2017.

2016

  • Kyle Wallace, Kevin Moran, Ed Novak, Gang Zhou, Kun Sun. “Toward Sensor-Based Random Number Generation for Mobile and IoT Devices.” To appear in the IEEE Internet of Things Journal, 2016.
  • Luren Wang, Yue Li, and Kun Sun. “Amnesia: A Bilateral Generative Password Manager.” To appear in the 36th IEEE International Conference on Distributed Computing Systems (ICDCS), Nara, Japan, June 27-30, 2016. (Acceptance ratio: 17.62%=68/386) [pdf]
  • Ning Zhang, Kun Sun, Wenjing Lou, and Tom Hou. “CaSE: Cache-Assisted Secure Execution on ARM Processors.” To appear in the 37th IEEE Symposium on Security and Privacy (S&P), SAN JOSE, CA, MAY 23-25, 2016. (Acceptance ratio: 13.75%=55/400) [pdf]
  • Chong Guan, Kun Sun, Zhan Wang and Wen Tao Zhu. “Privacy Breach by Exploiting postMessage in HTML5: Identification, Evaluation, and Countermeasure.” To appear in the 11th ACM Symposium on Information, Compute rand Communications Security (ASIACCS), Xi’an, China, May 30 – June 3, 2016. (Acceptance ratio: 20.9%=73/350 (full paper)) [pdf]
  • Yue Li, Haining Wang, and Kun Sun. “A Study of Personal Information in Human-chosen Passwords and Its Security Implications.” To appear in IEEE International Conference on Computer Communications (INFOCOM), San Francisco, CA, April 10-15, 2016. (Acceptance ratio: 18.25%=300/1,644) [pdf]
  • Jianhua Sun and Kun Sun. “DESIR: Decoy-Enhanced Seamless IP Randomization.” To appear in IEEE International Conference on Computer Communications (INFOCOM), San Francisco, CA, April 10-15, 2016. (Acceptance ratio: 18.25%=300/1,644) [pdf]
  • Ning Zhang, He Sun, Kun Sun, Wenjing Lou, and Thomas Hou. “CacheKit: Evading Memory Introspection Using Cache Incoherence”. To appear in the 1st IEEE European Symposium on Security and Privacy (EuroS&P), Saarbrücken, GERMANY, on March 21-24, 2016. (Acceptance ratio: 17.26%=29/168) [pdf]

2015

  • Andrew Clark, Kun Sun, Linda Bushnell, and Radha Poovendran. “A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense”. In the Sixth Conference on Decision and Game Theory for Security (GameSec), London, UK, on November 4-5, 2015. (Acceptance ratio: 43.24%=16/37 (full papers)) [pdf]
  • He Sun, Kun Sun, Yuewu Wang, and Jiwu Jing. “Reliable and Trustworthy Memory Acquisition on Smartphones”. In Information Forensics and Security, IEEE Transactions on (TIFS), vol.10, no.12, pp.2547-2561, Dec. 2015.
  • He Sun, Kun Sun, Yuewu Wang, and Jiwu Jing. “TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens”. In the 22nd ACM Conference on Computer and Communications Security (CCS), Denver, Colorado, October 12-16, 2015. (Acceptance ratio: 19.81%=128/646) [pdf]
  • Xing Gao, Dachuan Liu, Haining Wang, and Kun Sun. “PmDroid: Permission Supervision for Android Advertising”. In the 34th Symposium on Reliable Distributed Systems (SRDS), Montreal, Canada, September 28 – October 01, 2015. (Acceptance ratio: 29.63%=24/81 (regular papers)) [pdf]
  • He Sun, Kun Sun, Yuewu Wang, Jiwu Jing, and Haining Wang, “TrustICE: Hardware-assisted Isolated Computing Environments on Mobile Devices”. In the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Rio de Janeiro, Brazil, June 22-25, 2015. (Acceptance ratio: 21.83%=50/229) [pdf]
  • Fengwei Zhang, Kevin Leach, Angelos Stavrou, HainingWang, and Kun Sun, “Using Hardware Features for Increased Debugging Transparency”. In the 36th IEEE Symposium on Security and Privacy (S&P), Fairmont, San Jose, CA, May 18-20, 2015. (Acceptance ratio:13.51%=55/407) [pdf]
  • Ning Zhang, Kun Sun,Wenjing Lou, Y. Thomas Hou and Sushil Jajodia. “Now You SeeMe: Hide and Seek in Physical Address Space”. In the 10th ACM Symposium on Information, Compute rand Communications Security (ASIACCS), Singapore, April 14-17, 2015. (Acceptance ratio: 17.84%=48/269 (full paper)) [pdf]
  • Xueqiang Wang, Kun Sun, Yuewu Wang, and Jiwu Jing, “DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices”. In the 22nd Annual Network & Distributed System Security Symposium (NDSS), San Diego, California, February 2015. (Acceptance ratio: 16.88%=51/302) [pdf]

2014

  • He Sun, Kun Sun, Yuewu Wang, Jiwi Jing, and Sushil Jajodia. “TrustDump: Reliable memory acquisition on smartphones” Proc. 18th European Symp. on Research in Computer Security (ESORICS), Springer Lecture Notes in Computer Science, Wroclaw, Poland, September 7-11, 2014. (Acceptance ratio: 24.78%=58/234) [pdf]
  • Xingjie Yu, Zhan Wang, Kun Sun, Wen Tao Zhu, Neng Gao and Jiwu Jing, “Remotely Wiping Sensitive Data on Stolen Smartphones”. In the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Kyoto, Japan, June 4-6, 2014. (Acceptance ratio: 19.60%=50/255 (short paper)) [pdf]
  • Fengwei Zhang, Jiang Wang, Kun Sun, and Angelos Stavrou, “HyperCheck: A Hardware-Assisted Integrity Monitor”. In IEEE Transactions on Dependable and Secure Computing (TDSC), vol.11, no.4, pp.332,344, July-Aug. 2014. [pdf]

2013

  • Rui Zhao, Chuan Yue, and Kun Sun. “A Security Analysis of Two Commercial Browser and Cloud Based Password Managers”. In proceedings of the 5th ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT), 2013. (top 5% accepted paper)
  • Andrew W. Clark, Kun Sun, and Radha Poovendran, “Effectiveness of IP Address Randomization in Decoy-Based Moving Target Defense”. In the 52nd IEEE Conference on Decision and Control (CDC), Florence, Italy, December 10-13, 2013. [pdf]
  • Massimiliano Albanese, Alessandra De Benedictisy, Sushil Jajodia, and Kun Sun, “A Moving Target Defense Mechanism for MANETs Based on Identity Virtualization”. In the First IEEE Conference on Communications and Network Security (CNS), Washington D.C., USA, October 14-16, 2013. (Acceptance ratio: 28.36%=40/141) [pdf]
  • Zhan Wang, Kun Sun, Sushil Jajodia and Jiwu Jing, “TerraCheck: Verification of Dedicated Cloud Storage”. In the 27th IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC), Rutgers University, Newark, NJ, USA, July 15-17, 2013. (Acceptance ratio: 35.55%=16/45 (full paper)) [pdf]
  • Quan Jia, Kun Sun, and Angelos Stavrou, “MOTAG: Moving Target Defense Against Internet Denial of Service Attacks”. In the International Conference on Computer Communications and Networks (ICCCN), Nassau, Bahamas, 2013. (Acceptance ratio: 28.66%=86/300 (regular paper)) [pdf]
  • Fengwei Zhang, Kevin Leach, Kun Sun, and Angelos Stavrou, “Spectre: A Dependable Introspection Framework via System Management Mode”. In the 43nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Budapest, June 2013. (Acceptance ratio: 20.90%=46/220) [pdf]
  • Xiaowei Mei, Donggang Liu, Kun Sun, and Dingbang Xu, “On Feasibility of Fingerprinting Wireless Sensor Nodes Using Physical Properties”. In the 27th IEEE International Parallel & Distributed Processing Symposium (IPDPS), Boston, Massachusetts, May 2013. (Acceptance ratio: 21.45%=106/494) [pdf]

2012

  • Brian Schulte, Haris Andrianakis, Kun Sun, and Angelos Stavrou, “NetGator: Malware Detection Using Program Interactive Challenges”. In the 9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Heraklion, Crete, Greece, July 26-27th, 2012. (Acceptance ratio: 31.81%=14/44) [pdf]
  • Jiang Wang, Kun Sun, and Angelos Stavrou, “A Dependability Analysis of Hardware-Assisted Polling Integrity Checking Systems”. In the Proceedings of the 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Boston, Massachusetts, June, 2012. (Acceptance ratio: 21.61%=51/236) [pdf]
  • Kun Sun, Jiang Wang, Fengwei Zhang, and Angelos Stavrou, “SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes”. In the Proceedings of the 19th Annual Network & Distributed System Security Symposium (NDSS), San Diego, California, 5-8 February 2012. (Acceptance ratio: 17.82%=46/258) [pdf]

Comments are closed.