default search action
Kun Sun 0001
Person information
- affiliation: George Mason University, Department of Information Sciences and Technology, Fairfax, VA, USA
- affiliation (former): College of William and Mary, Department of Computer Science, Williamsburg, VA, USA
- affiliation (former): Intelligent Automation Inc., Rockville, MD, USA
- affiliation (PhD): North Carolina State University, Department of Computer Science, Raleigh, NC, USA
Other persons with the same name
- Kun Sun — disambiguation page
- Kun Sun 0002 — China University of Geosciences, School of Computer Science, Hubei Key Laboratory of Intelligent Geo-Information Processing, Wuhan, China (and 1 more)
- Kun Sun 0003 — Chinese University of Hong Kong, Li Ka Shing Institute of Health Sciences, Hong Kong
- Kun Sun 0004 — Wuhan University, State Key Laboratory of Information Engineering in Surveying, Mapping and Remote Sensing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [b1]Kun Sun, Shu Wang:
Secure Voice Processing Systems against Malicious Voice Attacks. Springer Briefs in Computer Science, Springer 2024, ISBN 978-3-031-44747-1, pp. 1-111 - [j30]Songsong Liu, Shu Wang, Kun Sun:
Having Difficulty Understanding Manuals? Automatically Converting User Manuals into Instructional Videos. Proc. ACM Hum. Comput. Interact. 8(EICS): 1-19 (2024) - [j29]Jie Wang, Kun Sun, Lingguang Lei, Yuewu Wang, Jiwu Jing, Shengye Wan, Qi Li:
CacheIEE: Cache-Assisted Isolated Execution Environment on ARM Multi-Core Platforms. IEEE Trans. Dependable Secur. Comput. 21(1): 254-269 (2024) - [j28]Yunlong Xing, Xinda Wang, Sadegh Torabi, Zeyu Zhang, Lingguang Lei, Kun Sun:
A Hybrid System Call Profiling Approach for Container Protection. IEEE Trans. Dependable Secur. Comput. 21(3): 1068-1083 (2024) - [j27]Shouyin Xu, Yuewu Wang, Lingguang Lei, Kun Sun, Jiwu Jing, Siyuan Ma, Jie Wang, Heqing Huang:
Condo: Enhancing Container Isolation Through Kernel Permission Data Protection. IEEE Trans. Inf. Forensics Secur. 19: 6168-6183 (2024) - [j26]Renjie Xie, Jiahao Cao, Yuxi Zhu, Yixiang Zhang, Yi He, Hanyi Peng, Yixiao Wang, Mingwei Xu, Kun Sun, Enhuan Dong, Qi Li, Menghao Zhang, Jiang Li:
Cactus: Obfuscating Bidirectional Encrypted TCP Traffic at Client Side. IEEE Trans. Inf. Forensics Secur. 19: 7659-7673 (2024) - [j25]Xiaohan Zhang, Jinwen Wang, Yueqiang Cheng, Qi Li, Kun Sun, Yao Zheng, Ning Zhang, Xinghua Li:
Interface-Based Side Channel in TEE-Assisted Networked Services. IEEE/ACM Trans. Netw. 32(1): 613-626 (2024) - [c116]Xu He, Shu Wang, Pengbin Feng, Xinda Wang, Shiyu Sun, Qi Li, Kun Sun:
BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning. AsiaCCS 2024 - [c115]Shengye Wan, Joshua Saxe, Craig Gomes, Sahana Chennabasappa, Avilash Rath, Kun Sun, Xinda Wang:
Bridging the Gap: A Study of AI-based Vulnerability Management between Industry and Academia. DSN-S 2024: 80-87 - [c114]Ye Wang, Yunpeng Liu, Ningtao Wang, Peiyang Li, Jiahao Hu, Xing Fu, Weiqiang Wang, Kun Sun, Qi Li, Ke Xu:
Enhancing Fraud Transaction Detection via Unlabeled Suspicious Records. IWQoS 2024: 1-10 - [c113]Shiqing Luo, Anh Nguyen, Hafsa Farooq, Kun Sun, Zhisheng Yan:
Eavesdropping on Controller Acoustic Emanation for Keystroke Inference Attack in Virtual Reality. NDSS 2024 - [c112]Yuqi Qing, Qilei Yin, Xinhao Deng, Yihao Chen, Zhuotao Liu, Kun Sun, Ke Xu, Jia Zhang, Qi Li:
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic. NDSS 2024 - [c111]Shu Wang, Kun Sun, Qi Li:
Compensating Removed Frequency Components: Thwarting Voice Spectrum Reduction Attacks. NDSS 2024 - [c110]Yue Xiao, Yi He, Xiaoli Zhang, Qian Wang, Renjie Xie, Kun Sun, Ke Xu, Qi Li:
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices. NDSS 2024 - [c109]Yuxiang Yang, Xuewei Feng, Qi Li, Kun Sun, Ziqiang Wang, Ke Xu:
Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks. NDSS 2024 - [c108]Yuhao Wu, Jinwen Wang, Yujie Wang, Shixuan Zhai, Zihan Li, Yi He, Kun Sun, Qi Li, Ning Zhang:
Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities. USENIX Security Symposium 2024 - [c107]Yunlong Xing, Shu Wang, Shiyu Sun, Xu He, Kun Sun, Qi Li:
What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check. USENIX Security Symposium 2024 - [i19]Ziqiang Wang, Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, Mengyuan Li, Ke Xu, Jianping Wu:
Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack. CoRR abs/2402.12716 (2024) - [i18]Yue Xiao, Yi He, Xiaoli Zhang, Qian Wang, Renjie Xie, Kun Sun, Ke Xu, Qi Li:
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices. CoRR abs/2403.15271 (2024) - [i17]Yuxiang Yang, Xuewei Feng, Qi Li, Kun Sun, Ziqiang Wang, Ke Xu:
Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks. CoRR abs/2404.04601 (2024) - [i16]Shengye Wan, Joshua Saxe, Craig Gomes, Sahana Chennabasappa, Avilash Rath, Kun Sun, Xinda Wang:
Bridging the Gap: A Study of AI-based Vulnerability Management between Industry and Academia. CoRR abs/2405.02435 (2024) - [i15]Xijia Che, Yi He, Xuewei Feng, Kun Sun, Ke Xu, Qi Li:
BlueSWAT: A Lightweight State-Aware Security Framework for Bluetooth Low Energy. CoRR abs/2405.17987 (2024) - [i14]Shu Wang, Kun Sun, Yan Zhai:
Dye4AI: Assuring Data Boundary on Generative AI Services. CoRR abs/2406.14114 (2024) - [i13]Xiyuan Zhao, Xinhao Deng, Qi Li, Yunpeng Liu, Zhuotao Liu, Kun Sun, Ke Xu:
Towards Fine-Grained Webpage Fingerprinting at Scale. CoRR abs/2409.04341 (2024) - 2023
- [j24]Yi He, Yacong Gu, Purui Su, Kun Sun, Yajin Zhou, Zhi Wang, Qi Li:
A Systematic Study of Android Non-SDK (Hidden) Service API Security. IEEE Trans. Dependable Secur. Comput. 20(2): 1609-1623 (2023) - [j23]Jiahao Cao, Mingwei Xu, Qi Li, Kun Sun, Yuan Yang:
The LOFT Attack: Overflowing SDN Flow Tables at a Low Rate. IEEE/ACM Trans. Netw. 31(3): 1416-1431 (2023) - [c106]Renjie Xie, Yixiao Wang, Jiahao Cao, Enhuan Dong, Mingwei Xu, Kun Sun, Qi Li, Licheng Shen, Menghao Zhang:
Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation. ACM TUR-C 2023: 131-132 - [c105]Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, Ke Xu:
Traffic Hijacking in Wi-Fi Networks via ICMP Redirects. ACM TUR-C 2023: 141-142 - [c104]Tommy Chin, Noah Korzak, Kun Sun:
BlueShift: Probing Adaptive Frequency Hopping in Bluetooth. MTD@CCS 2023: 13-16 - [c103]Songsong Liu, Shu Wang, Kun Sun:
Enhancing Honeypot Fidelity with Real-Time User Behavior Emulation. DSN-S 2023: 146-150 - [c102]Shiyu Sun, Shu Wang, Xinda Wang, Yunlong Xing, Elisa Zhang, Kun Sun:
Exploring Security Commits in Python. ICSME 2023: 171-181 - [c101]Shu Wang, Xinda Wang, Kun Sun, Sushil Jajodia, Haining Wang, Qi Li:
GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics. SP 2023: 2409-2426 - [c100]Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, Ke Xu:
Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects. SP 2023: 3162-3177 - [c99]Renjie Xie, Jiahao Cao, Enhuan Dong, Mingwei Xu, Kun Sun, Qi Li, Licheng Shen, Menghao Zhang:
Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation. USENIX Security Symposium 2023: 625-642 - [c98]Yi He, Roland Guo, Yunlong Xing, Xijia Che, Kun Sun, Zhuotao Liu, Ke Xu, Qi Li:
Cross Container Attacks: The Bewildered eBPF on Clouds. USENIX Security Symposium 2023: 5971-5988 - [i12]Shiyu Sun, Shu Wang, Xinda Wang, Yunlong Xing, Elisa Zhang, Kun Sun:
Exploring Security Commits in Python. CoRR abs/2307.11853 (2023) - [i11]Shu Wang, Kun Sun, Qi Li:
Compensating Removed Frequency Components: Thwarting Voice Spectrum Reduction Attacks. CoRR abs/2308.09546 (2023) - [i10]Yuqi Qing, Qilei Yin, Xinhao Deng, Yihao Chen, Zhuotao Liu, Kun Sun, Ke Xu, Jia Zhang, Qi Li:
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic. CoRR abs/2309.04798 (2023) - [i9]Songsong Liu, Shu Wang, Kun Sun:
Having Difficulty Understanding Manuals? Automatically Converting User Manuals into Instructional Videos. CoRR abs/2311.11031 (2023) - [i8]Xu He, Shu Wang, Pengbin Feng, Xinda Wang, Shiyu Sun, Qi Li, Kun Sun:
BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning. CoRR abs/2312.07921 (2023) - 2022
- [j22]Songsong Liu, Pengbin Feng, Shu Wang, Kun Sun, Jiahao Cao:
Enhancing malware analysis sandboxes with emulated user behavior. Comput. Secur. 115: 102613 (2022) - [j21]Yunlong Xing, Jiahao Cao, Kun Sun, Fei Yan, Shengye Wan:
The devil is in the detail: Generating system call whitelist for Linux seccomp. Future Gener. Comput. Syst. 135: 105-113 (2022) - [j20]Yi He, Yuan Zhou, Yajin Zhou, Qi Li, Kun Sun, Yacong Gu, Yong Jiang:
JNI Global References Are Still Vulnerable: Attacks and Defenses. IEEE Trans. Dependable Secur. Comput. 19(1): 607-619 (2022) - [j19]Yue Li, Zeyu Chen, Haining Wang, Kun Sun, Sushil Jajodia:
Understanding Account Recovery in the Wild and its Security Implications. IEEE Trans. Dependable Secur. Comput. 19(1): 620-634 (2022) - [j18]Zijie Yang, Jiahao Cao, Zhuotao Liu, Xiaoli Zhang, Kun Sun, Qi Li:
Good Learning, Bad Performance: A Novel Attack Against RL-Based Congestion Control Systems. IEEE Trans. Inf. Forensics Secur. 17: 1069-1082 (2022) - [j17]Xuewei Feng, Qi Li, Kun Sun, Chuanpu Fu, Ke Xu:
Off-Path TCP Hijacking Attacks via the Side Channel of Downgraded IPID. IEEE/ACM Trans. Netw. 30(1): 409-422 (2022) - [j16]Renjie Xie, Jiahao Cao, Qi Li, Kun Sun, Guofei Gu, Mingwei Xu, Yuan Yang:
Disrupting the SDN Control Channel via Shared Links: Attacks and Countermeasures. IEEE/ACM Trans. Netw. 30(5): 2158-2172 (2022) - [c97]Guannan Liu, Daiping Liu, Shuai Hao, Xing Gao, Kun Sun, Haining Wang:
Ready Raider One: Exploring the Misuse of Cloud Gaming Services. CCS 2022: 1993-2007 - [c96]Yunlong Xing, Jiahao Cao, Xinda Wang, Sadegh Torabi, Kun Sun, Fei Yan, Qi Li:
SysCap: Profiling and Crosschecking Syscall and Capability Configurations for Docker Images. CNS 2022: 236-244 - [c95]Songsong Liu, Pengbin Feng, Jiahao Cao, Xu He, Tommy Chin, Kun Sun, Qi Li:
Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots. DIMVA 2022: 197-217 - [c94]Xu He, Jiahao Cao, Shu Wang, Kun Sun, Lisong Xu, Qi Li:
Auter: Automatically Tuning Multi-layer Network Buffers in Long-Distance Shadowsocks Networks. INFOCOM 2022: 1689-1698 - [c93]Xuewei Feng, Qi Li, Kun Sun, Ke Xu, Baojun Liu, Xiaofeng Zheng, Qiushi Yang, Haixin Duan, Zhiyun Qian:
PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP. NDSS 2022 - [c92]Zili Zha, An Wang, Yang Guo, Qun Li, Kun Sun, Songqing Chen:
EZPath: Expediting Container Network Traffic via Programmable Switches. IFIP Networking 2022: 1-8 - [c91]Xu He, Shu Wang, Yunlong Xing, Pengbin Feng, Haining Wang, Qi Li, Songqing Chen, Kun Sun:
BinProv: Binary Code Provenance Identification without Disassembly. RAID 2022: 350-363 - [c90]Yuan Liang, Xing Gao, Kun Sun, Wenjie Xiong, Haining Wang:
An Investigation on Data Center Cooling Systems Using FPGA-based Temperature Side Channels. SRDS 2022: 46-57 - [c89]Guannan Liu, Xing Gao, Haining Wang, Kun Sun:
Exploring the Unchartered Space of Container Registry Typosquatting. USENIX Security Symposium 2022: 35-51 - [c88]Yi He, Zhenhua Zou, Kun Sun, Zhuotao Liu, Ke Xu, Qian Wang, Chao Shen, Zhi Wang, Qi Li:
RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices. USENIX Security Symposium 2022: 2225-2242 - [c87]Xuewei Feng, Qi Li, Kun Sun, Zhiyun Qian, Gang Zhao, Xiaohui Kuang, Chuanpu Fu, Ke Xu:
Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks. USENIX Security Symposium 2022: 2619-2636 - [c86]Xin Tan, Yuan Zhang, Jiajun Cao, Kun Sun, Mi Zhang, Min Yang:
Understanding the Practice of Security Patch Management across Multiple Branches in OSS Projects. WWW 2022: 767-777 - [i7]Yi He, Yacong Gu, Purui Su, Kun Sun, Yajin Zhou, Zhi Wang, Qi Li:
A Systematic Study of Android Non-SDK (Hidden) Service API Security. CoRR abs/2203.09374 (2022) - 2021
- [j15]Yutao Tang, Yue Li, Qun Li, Kun Sun, Haining Wang, Zhengrui Qin:
User input enrichment via sensing devices. Comput. Networks 196: 108262 (2021) - [j14]Huan Chang, Lingguang Lei, Kun Sun, Yuewu Wang, Jiwu Jing, Yi He, Pingjian Wang:
Vulnerable Service Invocation and Countermeasures. IEEE Trans. Dependable Secur. Comput. 18(4): 1733-1750 (2021) - [j13]Qiyang Song, Zhuotao Liu, Jiahao Cao, Kun Sun, Qi Li, Cong Wang:
SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption. IEEE Trans. Inf. Forensics Secur. 16: 1795-1809 (2021) - [c85]Qiyang Song, Jiahao Cao, Kun Sun, Qi Li, Ke Xu:
Try before You Buy: Privacy-preserving Data Evaluation on Cloud-based Machine Learning Data Marketplace. ACSAC 2021: 260-272 - [c84]Zeyu Zhang, Xiaoli Zhang, Qi Li, Kun Sun, Yinqian Zhang, Songsong Liu, Yukun Liu, Xiaoning Li:
See through Walls: Detecting Malware in SGX Enclaves with SGX-Bouncer. AsiaCCS 2021: 931-943 - [c83]Jiaming Mu, Binghui Wang, Qi Li, Kun Sun, Mingwei Xu, Zhuotao Liu:
A Hard Label Black-box Adversarial Attack Against Graph Neural Networks. CCS 2021: 108-125 - [c82]Xin Tan, Yuan Zhang, Chenyuan Mi, Jiajun Cao, Kun Sun, Yifan Lin, Min Yang:
Locating the Security Patches for Disclosed OSS Vulnerabilities with Vulnerability-Commit Correlation Ranking. CCS 2021: 3282-3299 - [c81]Songsong Liu, Pengbin Feng, Kun Sun:
HoneyBog: A Hybrid Webshell Honeypot Framework against Command Injection. CNS 2021: 218-226 - [c80]Yue Li, Zhenyu Wu, Haining Wang, Kun Sun, Zhichun Li, Kangkook Jee, Junghwan Rhee, Haifeng Chen:
UTrack: Enterprise User Tracking Based on OS-Level Audit Logs. CODASPY 2021: 161-172 - [c79]Xinda Wang, Shu Wang, Pengbin Feng, Kun Sun, Sushil Jajodia:
PatchDB: A Large-Scale Security Patch Dataset. DSN 2021: 149-160 - [c78]Fengting Li, Xuankai Liu, Xiaoli Zhang, Qi Li, Kun Sun, Kang Li:
Detecting Localized Adversarial Examples: A Generic Approach using Critical Region Analysis. INFOCOM 2021: 1-10 - [c77]Xinda Wang, Shu Wang, Pengbin Feng, Kun Sun, Sushil Jajodia, Sanae Benchaaboun, Frank Geck:
PatchRNN: A Deep Learning-Based System for Security Patch Identification. MILCOM 2021: 595-600 - [c76]Shengye Wan, Kun Sun, Ning Zhang, Yue Li:
Remotely controlling TrustZone applications?: a study on securely and resiliently receiving remote commands. WISEC 2021: 204-215 - [i6]Fengting Li, Xuankai Liu, Xiaoli Zhang, Qi Li, Kun Sun, Kang Li:
Detecting Localized Adversarial Examples: A Generic Approach using Critical Region Analysis. CoRR abs/2102.05241 (2021) - [i5]Xinda Wang, Shu Wang, Pengbin Feng, Kun Sun, Sushil Jajodia, Sanae Benchaaboun, Frank Geck:
PatchRNN: A Deep Learning-Based System for Security Patch Identification. CoRR abs/2108.03358 (2021) - [i4]Jiaming Mu, Binghui Wang, Qi Li, Kun Sun, Mingwei Xu, Zhuotao Liu:
A Hard Label Black-box Adversarial Attack Against Graph Neural Networks. CoRR abs/2108.09513 (2021) - 2020
- [c75]Shengye Wan, Mingshen Sun, Kun Sun, Ning Zhang, Xu He:
RusTEE: Developing Memory-Safe ARM TrustZone Applications. ACSAC 2020: 442-453 - [c74]Jie Wang, Kun Sun, Lingguang Lei, Shengye Wan, Yuewu Wang, Jiwu Jing:
Cache-in-the-Middle (CITM) Attacks: Manipulating Sensitive Data in Isolated Execution Environments. CCS 2020: 1001-1015 - [c73]Shu Wang, Jiahao Cao, Xu He, Kun Sun, Qi Li:
When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition. CCS 2020: 1103-1119 - [c72]Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, Ke Xu:
Off-Path TCP Exploits of the Mixed IPID Assignment. CCS 2020: 1323-1335 - [c71]Jianhua Sun, Kun Sun, Qi Li:
Towards a Believable Decoy System: Replaying Network Activities from Real System. CNS 2020: 1-9 - [c70]Xinda Wang, Shu Wang, Kun Sun, Archer L. Batcheller, Sushil Jajodia:
A Machine Learning Approach to Classify Security Patches into Vulnerability Types. CNS 2020: 1-9 - [c69]Yifei Wu, Lingguang Lei, Yuewu Wang, Kun Sun, Jingzi Meng:
Evaluation on the Security of Commercial Cloud Container Services. ISC 2020: 160-177 - [c68]Jiahao Cao, Renjie Xie, Kun Sun, Qi Li, Guofei Gu, Mingwei Xu:
When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN. NDSS 2020 - [c67]Shu Wang, Jiahao Cao, Kun Sun, Qi Li:
SIEVE: Secure In-Vehicle Automatic Speech Recognition Systems. RAID 2020: 365-379 - [c66]Songsong Liu, Qiyang Song, Kun Sun, Qi Li:
SGX-Cube: An SGX-Enhanced Single Sign-On System Against Server-Side Credential Leakage. SecureComm (2) 2020: 275-290 - [c65]Jie Wang, Yuewu Wang, Lingguang Lei, Kun Sun, Jiwu Jing, Quan Zhou:
TrustICT: an efficient trusted interaction interface between isolated execution domains on ARM multi-core processors. SenSys 2020: 271-284 - [p3]Xinda Wang, Kun Sun, Archer L. Batcheller, Sushil Jajodia:
An Empirical Study of Secret Security Patch in Open Source Software. Adaptive Autonomous Secure Cyber Systems 2020: 269-289 - [e3]Noseong Park, Kun Sun, Sara Foresti, Kevin R. B. Butler, Nitesh Saxena:
Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 335, Springer 2020, ISBN 978-3-030-63085-0 [contents] - [e2]Noseong Park, Kun Sun, Sara Foresti, Kevin R. B. Butler, Nitesh Saxena:
Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 336, Springer 2020, ISBN 978-3-030-63094-2 [contents] - [i3]Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, Ke Xu:
Off-Path TCP Exploits of the Mixed IPID Assignment. CoRR abs/2008.12981 (2020) - [i2]Shu Wang, Jiahao Cao, Xu He, Kun Sun, Qi Li:
When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition. CoRR abs/2009.00718 (2020)
2010 – 2019
- 2019
- [j12]Chong Guan, Kun Sun, Lingguang Lei, Pingjian Wang, Yuewu Wang, Wei Chen:
DangerNeighbor attack: Information leakage via postMessage mechanism in HTML5. Comput. Secur. 80: 291-305 (2019) - [j11]Shengye Wan, Yue Li, Kun Sun:
PathMarker: protecting web contents against inside crawlers. Cybersecur. 2(1): 9 (2019) - [j10]Yue Li, Haining Wang, Kun Sun:
BluePass: A Mobile Device Assisted Password Manager. EAI Endorsed Trans. Security Safety 5(17): e3 (2019) - [c64]Jianhua Sun, Songsong Liu, Kun Sun:
A Scalable High Fidelity Decoy Framework against Sophisticated Cyber Attacks. MTD@CCS 2019: 37-46 - [c63]Isabelle Choi, Qiyang Song, Kun Sun:
Federated-Cloud Based Deep Neural Networks with Privacy Preserving Image Filtering Techniques. DSC 2019: 1-8 - [c62]Shengye Wan, Jianhua Sun, Kun Sun, Ning Zhang, Qi Li:
SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM Processors. DSN 2019: 289-301 - [c61]Xinda Wang, Kun Sun, Archer L. Batcheller, Sushil Jajodia:
Detecting "0-Day" Vulnerability: An Empirical Study of Secret Security Patch in OSS. DSN 2019: 485-492 - [c60]Dawei Chu, Yuewu Wang, Lingguang Lei, Yanchu Li, Jiwu Jing, Kun Sun:
OCRAM-Assisted Sensitive Data Protection on ARM-Based Platform. ESORICS (2) 2019: 412-438 - [c59]Pengbin Feng, Jianhua Sun, Songsong Liu, Kun Sun:
UBER: Combating Sandbox Evasion via User Behavior Emulators. ICICS 2019: 34-50 - [c58]Jiahao Cao, Zijie Yang, Kun Sun, Qi Li, Mingwei Xu, Peiyi Han:
Fingerprinting SDN Applications via Encrypted Control Traffic. RAID 2019: 501-515 - [c57]Jianhua Sun, Kun Sun, Chris Shenefiel:
Automated IoT Device Fingerprinting Through Encrypted Stream Classification. SecureComm (1) 2019: 147-167 - [c56]Jiahao Cao, Kun Sun, Qi Li, Mingwei Xu, Zijie Yang, Kyung Joon Kwak, Jason H. Li:
Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts. SecureComm (1) 2019: 429-449 - [c55]Jiahao Cao, Qi Li, Renjie Xie, Kun Sun, Guofei Gu, Mingwei Xu, Yuan Yang:
The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links. USENIX Security Symposium 2019: 19-36 - 2018
- [j9]Ning Zhang, Ruide Zhang, Kun Sun, Wenjing Lou, Y. Thomas Hou, Sushil Jajodia:
Memory Forensic Challenges Under Misused Architectural Features. IEEE Trans. Inf. Forensics Secur. 13(9): 2345-2358 (2018) - [c54]Xin Lin, Lingguang Lei, Yuewu Wang, Jiwu Jing, Kun Sun, Quan Zhou:
A Measurement Study on Linux Container Security: Attacks and Countermeasures. ACSAC 2018: 418-429 - [c53]Ning Zhang, Kun Sun, Deborah Shands, Wenjing Lou, Y. Thomas Hou:
TruSense: Information Leakage from TrustZone. INFOCOM 2018: 1097-1105 - [c52]Yue Li, Haining Wang, Kun Sun:
Email as a Master Key: Analyzing Account Recovery in the Wild. INFOCOM 2018: 1646-1654 - 2017
- [j8]Sangwon Hyun, Kun Sun, Peng Ning:
FEC-Seluge: Efficient, reliable, and secure large data dissemination using erasure codes. Comput. Commun. 104: 191-203 (2017) - [j7]Yue Li, Haining Wang, Kun Sun:
Personal Information in Passwords and Its Security Implications. IEEE Trans. Inf. Forensics Secur. 12(10): 2320-2333 (2017) - [c51]Lingguang Lei, Yi He, Kun Sun, Jiwu Jing, Yuewu Wang, Qi Li, Jian Weng:
Vulnerable Implicit Service: A Revisit. CCS 2017: 1051-1063 - [c50]Jianhua Sun, Kun Sun, Qi Li:
CyberMoat: Camouflaging critical server infrastructures with large scale decoy farms. CNS 2017: 1-9 - [c49]Lingguang Lei, Jianhua Sun, Kun Sun, Chris Shenefiel, Rui Ma, Yuewu Wang, Qi Li:
SPEAKER: Split-Phase Execution of Application Containers. DIMVA 2017: 230-251 - [c48]Yacong Gu, Kun Sun, Purui Su, Qi Li, Yemian Lu, Lingyun Ying, Dengguo Feng:
JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android. DSN 2017: 427-438 - [c47]Yue Li, Nan Zheng, Haining Wang, Kun Sun, Hui Fang:
A measurement study on Amazon wishlist and its privacy exposure. ICC 2017: 1-7 - [c46]Shengye Wan, Yue Li, Kun Sun:
Protecting web contents against persistent distributed crawlers. ICC 2017: 1-6 - [c45]Jing Zheng, Jianhua Sun, Kun Sun, Bo Wu, Qi Li:
Cookie-based amplification repression protocol. IPCCC 2017: 1-8 - [c44]Chong Guan, Yue Li, Kun Sun:
Your Neighbors are Listening: Evaluating PostMessage Use in OAuth. PAC 2017: 210-211 - [c43]Yue Li, Haining Wang, Kun Sun:
BluePass: A Secure Hand-Free Password Manager. SecureComm 2017: 185-205 - [c42]Yi He, Qi Li, Kun Sun:
LinkFlow: Efficient Large-Scale Inter-app Privacy Leakage Detection. SecureComm 2017: 291-311 - [c41]Jiahao Cao, Mingwei Xu, Qi Li, Kun Sun, Yuan Yang, Jing Zheng:
Disrupting SDN via the Data Plane: A Low-Rate Flow Table Overflow Attack. SecureComm 2017: 356-376 - 2016
- [c40]Chong Guan, Kun Sun, Zhan Wang, Wen Tao Zhu:
Privacy Breach by Exploiting postMessage in HTML5: Identification, Evaluation, and Countermeasure. AsiaCCS 2016: 629-640 - [c39]Ning Zhang, He Sun, Kun Sun, Wenjing Lou, Yiwei Thomas Hou:
CacheKit: Evading Memory Introspection Using Cache Incoherence. EuroS&P 2016: 337-352 - [c38]Luren Wang, Yue Li, Kun Sun:
Amnesia: A Bilateral Generative Password Manager. ICDCS 2016: 313-322 - [c37]Yue Li, Haining Wang, Kun Sun:
A study of personal information in human-chosen passwords and its security implications. INFOCOM 2016: 1-9 - [c36]Jianhua Sun, Kun Sun:
DESIR: Decoy-enhanced seamless IP randomization. INFOCOM 2016: 1-9 - [c35]Ning Zhang, Kun Sun, Wenjing Lou, Yiwei Thomas Hou:
CaSE: Cache-Assisted Secure Execution on ARM Processors. IEEE Symposium on Security and Privacy 2016: 72-90 - [i1]Ning Zhang, Kun Sun, Deborah Shands, Wenjing Lou, Y. Thomas Hou:
TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices. IACR Cryptol. ePrint Arch. 2016: 980 (2016) - 2015
- [j6]He Sun, Kun Sun, Yuewu Wang, Jiwu Jing:
Reliable and Trustworthy Memory Acquisition on Smartphones. IEEE Trans. Inf. Forensics Secur. 10(12): 2547-2561 (2015) - [c34]Ning Zhang, Kun Sun, Wenjing Lou, Yiwei Thomas Hou, Sushil Jajodia:
Now You See Me: Hide and Seek in Physical Address Space. AsiaCCS 2015: 321-331 - [c33]He Sun, Kun Sun, Yuewu Wang, Jiwu Jing:
TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens. CCS 2015: 976-988 - [c32]He Sun, Kun Sun, Yuewu Wang, Jiwu Jing, Haining Wang:
TrustICE: Hardware-Assisted Isolated Computing Environments on Mobile Devices. DSN 2015: 367-378 - [c31]Andrew Clark, Kun Sun, Linda Bushnell, Radha Poovendran:
A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense. GameSec 2015: 3-21 - [c30]Xueqiang Wang, Kun Sun, Yuewu Wang, Jiwu Jing:
DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices. NDSS 2015 - [c29]Fengwei Zhang, Kevin Leach, Angelos Stavrou, Haining Wang, Kun Sun:
Using Hardware Features for Increased Debugging Transparency. IEEE Symposium on Security and Privacy 2015: 55-69 - [c28]Xing Gao, Dachuan Liu, Haining Wang, Kun Sun:
PmDroid: Permission Supervision for Android Advertising. SRDS 2015: 120-129 - 2014
- [j5]Fengwei Zhang, Jiang Wang, Kun Sun, Angelos Stavrou:
HyperCheck: A Hardware-AssistedIntegrity Monitor. IEEE Trans. Dependable Secur. Comput. 11(4): 332-344 (2014) - [c27]Brian J. Choi, Kun Sun, Seonho Choi:
Cloud-based user authentication with geo-temporal queries on smartphones. SCC@ASIACCS 2014: 19-26 - [c26]Xingjie Yu, Zhan Wang, Kun Sun, Wen Tao Zhu, Neng Gao, Jiwu Jing:
Remotely wiping sensitive data on stolen smartphones. AsiaCCS 2014: 537-542 - [c25]Sushil Jajodia, Kun Sun:
MTD 2014: First ACM Workshop on Moving Target Defense. CCS 2014: 1550-1551 - [c24]He Sun, Kun Sun, Yuewu Wang, Jiwu Jing, Sushil Jajodia:
TrustDump: Reliable Memory Acquisition on Smartphones. ESORICS (1) 2014: 202-218 - [c23]Kun Sun, Sushil Jajodia:
Protecting Enterprise Networks through Attack Surface Expansion. SafeConfig 2014: 29-32 - [p2]Zhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing:
Proof of Isolation for Cloud Storage. Secure Cloud Computing 2014: 95-121 - [e1]Sushil Jajodia, Kun Sun:
Proceedings of the First ACM Workshop on Moving Target Defense, MTD '14, Scottsdale, Arizona, USA, November 7, 2014. ACM 2014, ISBN 978-1-4503-3150-0 [contents] - 2013
- [j4]Quan Jia, Kun Sun, Angelos Stavrou:
Capability-Based Defenses Against DoS Attacks in Multi-path MANET Communications. Wirel. Pers. Commun. 73(1): 127-148 (2013) - [c22]Zhan Wang, Kun Sun, Jiwu Jing, Sushil Jajodia:
Verification of data redundancy in cloud storage. SCC@ASIACCS 2013: 11-18 - [c21]Andrew Clark, Kun Sun, Radha Poovendran:
Effectiveness of IP address randomization in decoy-based moving target defense. CDC 2013: 678-685 - [c20]Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Kun Sun:
A moving target defense mechanism for MANETs based on identity virtualization. CNS 2013: 278-286 - [c19]Zhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing:
TerraCheck: Verification of Dedicated Cloud Storage. DBSec 2013: 113-127 - [c18]Fengwei Zhang, Kevin Leach, Kun Sun, Angelos Stavrou:
SPECTRE: A dependable introspection framework via System Management Mode. DSN 2013: 1-12 - [c17]Quan Jia, Kun Sun, Angelos Stavrou:
MOTAG: Moving Target Defense against Internet Denial of Service Attacks. ICCCN 2013: 1-9 - [c16]Xiaowei Mei, Donggang Liu, Kun Sun, Dingbang Xu:
On Feasibility of Fingerprinting Wireless Sensor Nodes Using Physical Properties. IPDPS 2013: 1112-1121 - [c15]Li Wang, Zhan Wang, Kun Sun, Sushil Jajodia:
Reducing Attack Surface with VM-Based Phantom Server. MILCOM 2013: 1429-1435 - 2012
- [c14]Brian Schulte, Haris Andrianakis, Kun Sun, Angelos Stavrou:
NetGator: Malware Detection Using Program Interactive Challenges. DIMVA 2012: 164-183 - [c13]Jiang Wang, Kun Sun, Angelos Stavrou:
A dependability analysis of hardware-assisted polling integrity checking systems. DSN 2012: 1-12 - [c12]Zhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing:
Disk storage isolation and verification in cloud. GLOBECOM 2012: 771-776 - [c11]Jiang Wang, Kun Sun, Angelos Stavrou:
Hardware-Assisted Application Integrity Monitor. HICSS 2012: 5375-5383 - [c10]Kun Sun, Jiang Wang, Fengwei Zhang, Angelos Stavrou:
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes. NDSS 2012 - 2011
- [c9]Quan Jia, Kun Sun, Angelos Stavrou:
CapMan: Capability-Based Defense against Multi-Path Denial of Service (DoS) Attacks in MANET. ICCCN 2011: 1-6 - [c8]Kun Sun, Sushil Jajodia, Jason H. Li, Yi Cheng, Wei Tang, Anoop Singhal:
Automatic security analysis using security metrics. MILCOM 2011: 1207-1212 - [c7]Justin Yackoski, Peng Xie, Harry Bullen, Jason H. Li, Kun Sun:
A Self-shielding Dynamic Network Architecture. MILCOM 2011: 1381-1386 - [c6]Jiang Wang, Fengwei Zhang, Kun Sun, Angelos Stavrou:
Firmware-assisted Memory Acquisition and Analysis tools for Digital Forensics. SADFE 2011: 1-5 - [r1]Kun Sun, Peng Ning:
Secure Time Synchronization. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1139-1140
2000 – 2009
- 2009
- [c5]Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas Maughan:
Securing network access in wireless sensor networks. WISEC 2009: 261-268 - 2007
- [p1]Kun Sun, Peng Ning, Cliff Wang:
Secure and Resilient Time Synchronization in Wireless Sensor Networks. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 2007: 347-367 - 2006
- [j3]Kun Sun, Peng Ning, Cliff Wang:
Secure and resilient clock synchronization in wireless sensor networks. IEEE J. Sel. Areas Commun. 24(2): 395-408 (2006) - [c4]Kun Sun, Pai Peng, Peng Ning, Cliff Wang:
Secure Distributed Cluster Formation in Wireless Sensor Networks. ACSAC 2006: 131-140 - [c3]Kun Sun, Peng Ning, Cliff Wang:
TinySeRSync: secure and resilient time synchronization in wireless sensor networks. CCS 2006: 264-277 - 2005
- [j2]Peng Ning, Kun Sun:
How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols. Ad Hoc Networks 3(6): 795-819 (2005) - [j1]Kun Sun, Peng Ning, Cliff Wang:
Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks. IEEE Trans. Dependable Secur. Comput. 2(3): 177-189 (2005) - 2003
- [c2]Donggang Liu, Peng Ning, Kun Sun:
Efficient self-healing group key distribution with revocation capability. CCS 2003: 231-240 - [c1]Peng Ning, Kun Sun:
How to Misuse AODV: A Case Study of Insiider Attacks against Mobile Ad-hoc Routing Protocols. IAW 2003: 60-67
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 21:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint