How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols P Ning, K Sun Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society, 2003 | 350 | 2003 |
Efficient self-healing group key distribution with revocation capability D Liu, P Ning, K Sun Proceedings of the 10th ACM conference on Computer and communications …, 2003 | 296 | 2003 |
Hypercheck: A hardware-assistedintegrity monitor F Zhang, J Wang, K Sun, A Stavrou IEEE Transactions on Dependable and Secure Computing 11 (4), 332-344, 2013 | 286 | 2013 |
TinySeRSync: secure and resilient time synchronization in wireless sensor networks K Sun, P Ning, C Wang Proceedings of the 13th ACM conference on Computer and communications …, 2006 | 254 | 2006 |
Secure and resilient clock synchronization in wireless sensor networks K Sun, P Ning, C Wang IEEE Journal on selected areas in communications 24 (2), 395-408, 2006 | 160 | 2006 |
A Measurement Study on Linux Container Security: Attacks and Countermeasures X Lin, Y Wang, L Lei, J Jing, K Sun, Q Zhou 2018 Annual Computer Security Applications Conference (ACSAC), 2018 | 156 | 2018 |
Truspy: Cache side-channel information leakage from the secure world on arm devices N Zhang, K Sun, D Shands, W Lou, YT Hou Cryptology ePrint Archive, 2016 | 155 | 2016 |
Motag: Moving target defense against internet denial of service attacks Q Jia, K Sun, A Stavrou 2013 22nd International Conference on Computer Communication and Networks …, 2013 | 153 | 2013 |
TrustOTP: Transforming smartphones into secure one-time password tokens H Sun, K Sun, Y Wang, J Jing Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 146 | 2015 |
Secure distributed cluster formation in wireless sensor networks K Sun, P Peng, P Ning, C Wang 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 131-140, 2006 | 140 | 2006 |
Case: Cache-assisted secure execution on arm processors N Zhang, K Sun, W Lou, YT Hou 2016 IEEE Symposium on Security and Privacy (SP), 72-90, 2016 | 126 | 2016 |
A study of personal information in human-chosen passwords and its security implications Y Li, H Wang, K Sun IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016 | 124 | 2016 |
DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices. X Wang, K Sun, Y Wang, J Jing Ndss, 2015 | 123 | 2015 |
Trustice: Hardware-assisted isolated computing environments on mobile devices H Sun, K Sun, Y Wang, J Jing, H Wang 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015 | 121 | 2015 |
Fault-tolerant cluster-wise clock synchronization for wireless sensor networks K Sun, P Ning, C Wang IEEE Transactions on Dependable and Secure Computing 2 (3), 177-189, 2005 | 106 | 2005 |
Using hardware features for increased debugging transparency F Zhang, K Leach, A Stavrou, H Wang, K Sun 2015 IEEE Symposium on Security and Privacy, 55-69, 2015 | 101 | 2015 |
Spectre: A dependable introspection framework via system management mode F Zhang, K Leach, K Sun, A Stavrou 2013 43rd Annual IEEE/IFIP international conference on dependable systems …, 2013 | 99 | 2013 |
Trustdump: Reliable memory acquisition on smartphones H Sun, K Sun, Y Wang, J Jing, S Jajodia Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 89 | 2014 |
The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links J Cao, Q Li, R Xie, K Sun, G Gu, M Xu, Y Yang USENIX Security Symposium, 2019 | 84 | 2019 |
DESIR: Decoy-enhanced seamless IP randomization J Sun, K Sun IEEE INFOCOM 2016-the 35th annual IEEE international conference on computer …, 2016 | 83 | 2016 |