IoT security: ongoing challenges and research opportunities ZK Zhang, MCY Cho, CW Wang, CW Hsu, CK Chen, S Shieh 2014 IEEE 7th international conference on service-oriented computing and …, 2014 | 972 | 2014 |
Method of generating in-kernel hook point candidates to detect rootkits and the system thereof W Chi-Wei, C Chen, CW Wang, S Shieh US Patent 9,747,452, 2017 | 38 | 2017 |
Light weight authentication and secret retrieval S Huang, SP Shieh, SM Chang, W Chi-Wei US Patent 8,595,504, 2013 | 17 | 2013 |
DROIT: Dynamic Alternation of Dual-Level Tainting for Malware Analysis. CW Wang, SW Shieh J. Inf. Sci. Eng. 31 (1), 111-129, 2015 | 13 | 2015 |
Reliability and security of large scale data storage in cloud computing CW Hsu, CW Wang, S Shieh The Reliability Society 2010 Annual Technical Report, 1-7, 2010 | 11 | 2010 |
Light-weight CSRF protection by labeling user-created contents YC Sung, MCY Cho, CW Wang, CW Hsu, SW Shieh 2013 IEEE 7th International Conference on Software Security and Reliability …, 2013 | 9 | 2013 |
SWIFT: Decoupled System-Wide Information Flow Tracking and its Optimizations. CW Wang, SW Shieh J. Inf. Sci. Eng. 31 (4), 1413-1429, 2015 | 6 | 2015 |
MrKIP: Rootkit Recognition with Kernel Function Invocation Pattern. CW Wang, CK Chen, CW Wang, SW Shieh J. Inf. Sci. Eng. 31 (2), 455-473, 2015 | 6 | 2015 |
Divergence detector: A fine-grained approach to detecting vm-awareness malware CW Hsu, FS Shih, CW Wang, SW Shieh 2013 IEEE 7th International Conference on Software Security and Reliability …, 2013 | 6 | 2013 |
Combating software piracy in public clouds CW Wang, MCY Cho, CW Wang, SW Shieh Computer 48 (10), 88-91, 2015 | 5 | 2015 |
Decoupled method for tracking information flow and computer system thereof W Chi-Wei, SP Shieh, YJ Liu US Patent 9,304,792, 2016 | 3 | 2016 |
ProbeBuilder: Uncovering opaque kernel data structures for automatic probe construction CW Wang, CW Wang, S Shieh IEEE Transactions on Dependable and Secure Computing 13 (5), 568-581, 2015 | 3 | 2015 |
Automatic probe construction system and method thereof S Shieh, W Chi-Wei, CW Wang, CW Hsu US Patent 9,898,257, 2018 | 1 | 2018 |
Can Malware Be Exterminated by Better Understanding Its Roots? MCY Cho, CW Hsu, S Shieh, CW Wang IT Professional 16 (6), 47-53, 2014 | 1 | 2014 |
Cloudebug: A Programmable Online Malware Testbed CW Wang, CW Wang, CA Hsieh, SW Shieh Computer 47 (7), 90-92, 2014 | 1 | 2014 |
DROIT+: Taint Tracking for Storage Access on Android. CW Hsu, CH Chang, CW Wang, S Shieh Journal of Information Science & Engineering 33 (5), 2017 | | 2017 |
Malware Behavior Analysis Based on Virtual Machine Introspection and Snapshot Comparison CW Hsu, CW Wang, CW Wang 20th Cryptology and Information Security Conference (CISC 2010), 2010 | | 2010 |
The Evolution of Fine-Grain Malware Behavior Analysis, From Static to Dynamic CW Wang, S Shieh | | |
DROIT+: Taint Tracking for Storage Access on Android C CHANG, C WANG, S SHIEH | | |