- [ICDCS16] Luren Wang, Yue Li, and Kun Sun. "Amnesia: A Bilateral Generative Password Manager." To appear in the 36th IEEE International Conference on Distributed Computing Systems (ICDCS), Nara, Japan, June 27-30, 2016. (Acceptance ratio: 17.62%=68/386)
- [S&P16] Ning Zhang, Kun Sun, Wenjing Lou, and Tom Hou. "CaSE: Cache-Assisted Secure Execution on ARM Processors." To appear in the 37th IEEE Symposium on Security and Privacy (S&P), SAN JOSE, CA, MAY 23-25, 2016. (Acceptance ratio: 13.75%=55/400)
- [AsiaCCS16] Chong Guan, Kun Sun, Zhan Wang and Wentao Zhu. "Privacy Breach by Exploiting postMessage in HTML5: Identification, Evaluation, and Countermeasure." To appear in the 11th ACM Symposium on Information, Compute rand Communications Security (ASIACCS), Xi'an, China, May 30 - June 3, 2016. (Acceptance ratio: 20.9%=73/350 (full paper))
- [Infocom16] Yue Li, Haining Wang, and Kun Sun. "A Study of Personal Information in Human-chosen Passwords and Its Security Implications." To appear in IEEE International Conference on Computer Communications (INFOCOM), San Francisco, CA, April 10-15, 2016. (Acceptance ratio: 18.25%=300/1,644)
- [Infocom16] Jianhua Sun and Kun Sun. "DESIR: Decoy-Enhanced Seamless IP Randomization." To appear in IEEE International Conference on Computer Communications (INFOCOM), San Francisco, CA, April 10-15, 2016. (Acceptance ratio: 18.25%=300/1,644)
- [EuroS&P16] Ning Zhang, He Sun, Kun Sun, Wenjing Lou, and Thomas Hou. "CacheKit: Evading Memory Introspection Using Cache Incoherence". To appear in the 1st IEEE European Symposium on Security and Privacy (EuroS&P), Saarbr¨ącken, GERMANY, on March 21-24, 2016. (Acceptance ratio: 17.26%=29/168)
- [TIFS] He Sun, Kun Sun, Yuewu Wang, and Jiwu Jing. "Reliable and Trustworthy Memory Acquisition on Smartphones". In Information Forensics and Security, IEEE Transactions on (TIFS), vol.10, no.12, pp.2547-2561, Dec. 2015.
- [GameSec15] Andrew Clark, Kun Sun, Linda Bushnell, and Radha Poovendran. "A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense". To appear in the Sixth Conference on Decision and Game Theory for Security (GameSec), London, UK, on November 4-5, 2015.
- [CCS15] He Sun, Kun Sun, Yuewu Wang, and Jiwu Jing. "TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens". To appear in the 22nd ACM Conference on Computer and Communications Security (CCS), Denver, Colorado, October 12-16, 2015. (Acceptance ratio: 19.81%=128/646)
- [SRDS15] Xing Gao, Dachuan Liu, Haining Wang, and Kun Sun. "PmDroid: Permission Supervision for Android Advertising". To appear in the 34th Symposium on Reliable Distributed Systems (SRDS), Montreal, Canada, September 28 - October 01, 2015. (Acceptance ratio: 29.63%=24/81 (regular papers))
- [DSN15] He Sun, Kun
Sun, Yuewu Wang, Jiwu Jing, and Haining Wang. "TrustICE: Hardware-assisted Isolated Computing Environments on Mobile Devices". To appear in the 45th Annual IEEE/IFIP
International Conference on Dependable Systems and Networks (DSN),
Rio de Janeiro, Brazil, June 22-25, 2015. (Acceptance ratio: 21.83%=50/229)
- [S&P15] Fengwei Zhang, Kevin Leach, Angelos Stavrou, Haining Wang, and Kun Sun. "Using Hardware Features for Increased Debugging Transparency". To appear in the 36th IEEE Symposium on Security and Privacy (S&P), Fairmont, San Jose, CA, May 18-20, 2015. (Acceptance ratio:13.51%=55/407)
- [AsiaCCS15] Ning Zhang, Kun Sun, Wenjing Lou, Y. Thomas Hou, and Sushil Jajodia. "Now You See Me: Hide and Seek in Physical Address Space". To appear in the 10th ACM
Symposium on Information, Computer and Communications Security (ASIACCS),
Singapore, April 14-17, 2015. (Acceptance ratio: 17.84%=48/269 (full paper))
- [NDSS15] Xueqiang Wang, Kun Sun, Yuewu Wang, and Jiwu Jing. "DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices", In the Proceedings of 2015 Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 8-11, 2015. (Acceptance ratio: 16.88%=51/302)
|