kun sun

 

Dr. Kun Sun, Adjunct Associate Professor
Department of Computer Science,
College of William and Mary

E-Mail:  ksun@wm.edu
Phone:  (757) 221-3457
Fax:     (757) 221-1717
Address: McGrothlin-Street Hall, #105
               
College of William and Mary
               
Williamsburg, VA 23187

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 

Since Fall 2016, I will join Geroge Mason Unversity as an associate professor. You are welcome to visit my new homepage and Sun Security Lab.

 

Research Interests

Sun Security Lab's Seminar 2016

  • Moving Target Defense/Adaptive Cyber Defense: Against the experts in defense, the enemy does not know where to attack.  -- SunTzu
  • System security: trustworthy computing environments
  • Mobile security: resource isolation and access control
  • Password Security: password measurement and enforcement
Current Students

Postdoctoral

  • Lingguang Lei, Postdoctoral

Ph.D. students

  • Yue Li (W&M, co-advised with Prof. Haining Wang)
  • Jianhua Sun (W&M)
  • Kyle Wallace (W&M, co-advised with Prof. Gang Zhou)
  • Shengye Wan (W&M)
  • Chong Guan (CAS IIE, visiting student)

Master students

  • Bennett Summers
Teaching
  • CSCI 454/554 Computer and Network Security (Spring 2015) (Spring 2016)
  • CSCI 680 Advanced System and Network Security (Fall 2015)
  • CSCI 780 Advanced Network Security (Fall 2014)
Professional Services
  • TPC Member: INFOCOM 2016/2017, SecureComm 2016, CCS 2015/2016, CNS 2014/2016, ICCCN 2015/2016, ICC 2015/2016, IPCCC 2015, MTD 2015, CCNC 2015, AsiaCCS-SCC 2014.
  • TPC Co-Chair: First ACM Workshop on Moving Target Defense (MTD 2014), in conjunction with ACM CCS 2014.
  • Journal Editorial Board Member: International Journal of Security and Networks (IJSN).
Recent Publications (Selected Publications)
  • [ICDCS16] Luren Wang, Yue Li, and Kun Sun. "Amnesia: A Bilateral Generative Password Manager." To appear in the 36th IEEE International Conference on Distributed Computing Systems (ICDCS), Nara, Japan, June 27-30, 2016. (Acceptance ratio: 17.62%=68/386)
  • [S&P16] Ning Zhang, Kun Sun, Wenjing Lou, and Tom Hou. "CaSE: Cache-Assisted Secure Execution on ARM Processors." To appear in the 37th IEEE Symposium on Security and Privacy (S&P), SAN JOSE, CA, MAY 23-25, 2016. (Acceptance ratio: 13.75%=55/400)
  • [AsiaCCS16] Chong Guan, Kun Sun, Zhan Wang and Wentao Zhu. "Privacy Breach by Exploiting postMessage in HTML5: Identification, Evaluation, and Countermeasure." To appear in the 11th ACM Symposium on Information, Compute rand Communications Security (ASIACCS), Xi'an, China, May 30 - June 3, 2016. (Acceptance ratio: 20.9%=73/350 (full paper))
  • [Infocom16] Yue Li, Haining Wang, and Kun Sun. "A Study of Personal Information in Human-chosen Passwords and Its Security Implications." To appear in IEEE International Conference on Computer Communications (INFOCOM), San Francisco, CA, April 10-15, 2016. (Acceptance ratio: 18.25%=300/1,644)
  • [Infocom16] Jianhua Sun and Kun Sun. "DESIR: Decoy-Enhanced Seamless IP Randomization." To appear in IEEE International Conference on Computer Communications (INFOCOM), San Francisco, CA, April 10-15, 2016. (Acceptance ratio: 18.25%=300/1,644)
  • [EuroS&P16] Ning Zhang, He Sun, Kun Sun, Wenjing Lou, and Thomas Hou. "CacheKit: Evading Memory Introspection Using Cache Incoherence". To appear in the 1st IEEE European Symposium on Security and Privacy (EuroS&P), Saarbr¨ącken, GERMANY, on March 21-24, 2016. (Acceptance ratio: 17.26%=29/168)
  • [TIFS] He Sun, Kun Sun, Yuewu Wang, and Jiwu Jing. "Reliable and Trustworthy Memory Acquisition on Smartphones". In Information Forensics and Security, IEEE Transactions on (TIFS), vol.10, no.12, pp.2547-2561, Dec. 2015.
  • [GameSec15] Andrew Clark, Kun Sun, Linda Bushnell, and Radha Poovendran. "A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense". To appear in the Sixth Conference on Decision and Game Theory for Security (GameSec), London, UK, on November 4-5, 2015.
  • [CCS15] He Sun, Kun Sun, Yuewu Wang, and Jiwu Jing. "TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens". To appear in the 22nd ACM Conference on Computer and Communications Security (CCS), Denver, Colorado, October 12-16, 2015. (Acceptance ratio: 19.81%=128/646)
  • [SRDS15] Xing Gao, Dachuan Liu, Haining Wang, and Kun Sun. "PmDroid: Permission Supervision for Android Advertising". To appear in the 34th Symposium on Reliable Distributed Systems (SRDS), Montreal, Canada, September 28 - October 01, 2015. (Acceptance ratio: 29.63%=24/81 (regular papers))
  • [DSN15] He Sun, Kun Sun, Yuewu Wang, Jiwu Jing, and Haining Wang. "TrustICE: Hardware-assisted Isolated Computing Environments on Mobile Devices". To appear in the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Rio de Janeiro, Brazil, June 22-25, 2015. (Acceptance ratio: 21.83%=50/229)
  • [S&P15] Fengwei Zhang, Kevin Leach, Angelos Stavrou, Haining Wang, and Kun Sun. "Using Hardware Features for Increased Debugging Transparency". To appear in the 36th IEEE Symposium on Security and Privacy (S&P), Fairmont, San Jose, CA, May 18-20, 2015. (Acceptance ratio:13.51%=55/407)
  • [AsiaCCS15] Ning Zhang, Kun Sun, Wenjing Lou, Y. Thomas Hou, and Sushil Jajodia. "Now You See Me: Hide and Seek in Physical Address Space". To appear in the 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Singapore, April 14-17, 2015. (Acceptance ratio: 17.84%=48/269 (full paper))
  • [NDSS15] Xueqiang Wang, Kun Sun, Yuewu Wang, and Jiwu Jing. "DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices", In the Proceedings of 2015 Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 8-11, 2015. (Acceptance ratio: 16.88%=51/302)