Deftl: Implementing plausibly deniable encryption in flash translation layer S Jia, L Xia, B Chen, P Liu Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 52 | 2017 |
Nfps: Adding undetectable secure deletion to flash translation layer S Jia, L Xia, B Chen, P Liu Proceedings of the 11th ACM on Asia conference on computer and …, 2016 | 44 | 2016 |
Extracting robust keys from NAND flash physical unclonable functions S Jia, L Xia, Z Wang, J Lin, G Zhang, Y Ji Information Security: 18th International Conference, ISC 2015, Trondheim …, 2015 | 34 | 2015 |
Sanitizing data is not enough! Towards sanitizing structural artifacts in flash media B Chen, S Jia, L Xia, P Liu Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016 | 26 | 2016 |
Supporting transparent snapshot for bare-metal malware analysis on mobile devices L Guan, S Jia, B Chen, F Zhang, B Luo, J Lin, P Liu, X Xing, L Xia Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017 | 25 | 2017 |
Ensuring data confidentiality via plausibly deniable encryption and secure deletion–a survey Q Zhang, S Jia, B Chang, B Chen Cybersecurity 1, 1-20, 2018 | 18 | 2018 |
Mimosaftl: adding secure and practical ransomware defense strategy to flash translation layer P Wang, S Jia, B Chen, L Xia, P Liu Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019 | 17 | 2019 |
Cryptogo: Automatic detection of go cryptographic api misuses W Li, S Jia, L Liu, F Zheng, Y Ma, J Lin Proceedings of the 38th Annual Computer Security Applications Conference …, 2022 | 13 | 2022 |
Identification of cloned HF RFID proximity cards based on RF fingerprinting G Zhang, L Xia, S Jia, Y Ji 2016 IEEE Trustcom/BigDataSE/ISPA, 292-300, 2016 | 13 | 2016 |
Physical-layer identification of HF RFID cards based on RF fingerprinting G Zhang, L Xia, S Jia, Y Ji Information Security Practice and Experience: 12th International Conference …, 2016 | 7 | 2016 |
EnclavePoSt: A Practical Proof of Storage‐Time in Cloud via Intel SGX Y Zhang, W You, S Jia, L Liu, Z Li, W Qian Security and Communication Networks 2022 (1), 7868502, 2022 | 5 | 2022 |
Splitter: an efficient scheme to determine the geolocation of cloud data publicly Y Zhang, D Jia, S Jia, L Liu, J Lin 2020 29th International Conference on Computer Communications and Networks …, 2020 | 4 | 2020 |
VoteGeo: An IoT-based voting approach to verify the geographic location of cloud hosts D Jia, L Liu, S Jia, J Lin 2019 IEEE 38th International Performance Computing and Communications …, 2019 | 4 | 2019 |
EHIFS: an efficient history independent file system B Gao, B Chen, S Jia, L Xia Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019 | 4 | 2019 |
MDEFTL: Incorporating multi-snapshot plausible deniability into flash translation layer S Jia, Q Zhang, L Xia, J Jing, P Liu IEEE Transactions on Dependable and Secure Computing 19 (5), 3494-3507, 2021 | 3 | 2021 |
Enhancing the security of mobile device management with seccomp Y Niu, Y Wang, S Jia, Q Zhou, L Lei, Q Zhang, X Zhao Journal of Physics: Conference Series 1646 (1), 012138, 2020 | 3 | 2020 |
Dpvgeo: Delay-based public verification of cloud data geolocation D Jia, Y Zhang, S Jia, L Liu, J Lin 2020 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2020 | 3 | 2020 |
Ensuring data confidentiality with a secure XTS-AES design in flash translation layer Q Zhang, S Jia, J He, X Zhao, L Xia, Y Niu, J Jing 2020 IEEE 5th International Conference on Cloud Computing and Big Data …, 2020 | 3 | 2020 |
Enhancing location privacy for electric vehicles by obfuscating the linkages of charging events X Sun, L Xia, S Jia 2015 IEEE 5th International Conference on Electronics Information and …, 2015 | 3 | 2015 |
SASAK: Shrinking the Attack Surface for Android Kernel with Stricter “seccomp” Restrictions Y Niu, L Lei, Y Wang, J Chang, S Jia, C Kou 2020 16th International Conference on Mobility, Sensing and Networking (MSN …, 2020 | 2 | 2020 |