• 7345 Citations
  • 40 h-Index
19992020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2020

TruzCall: Secure VoIP Calling on Android using ARM TrustZone

Ahlawat, A. & Du, W., Feb 2020, 2020 6th International Conference on Mobile and Secure Services, MOBISECSERV 2020. Urien, P. & Piramuthu, S. (eds.). Institute of Electrical and Electronics Engineers Inc., 9042945. (2020 6th International Conference on Mobile and Secure Services, MOBISECSERV 2020).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2019

TruZ-view: Developing trustZone user interface for mobile oS using delegation integration model

Ying, K., Thavai, P. & Du, W., Mar 13 2019, CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 1-12 12 p. (CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
1 Scopus citations
2018

TruZ-Droid: Integrating TrustZone with mobile operating system

Ying, K., Ahlawat, A., Alsharifi, B., Jiang, Y., Thavai, P. & Du, W., Jun 10 2018, MobiSys 2018 - Proceedings of the 16th ACM International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, p. 14-27 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations
2016

Harvesting inconsistent security configurations in custom android ROMs via differential analysis

Aafer, Y., Zhang, X. & Du, W., Jan 1 2016, Proceedings of the 25th USENIX Security Symposium. USENIX Association, p. 1153-1168 16 p. (Proceedings of the 25th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations

Hey, you, get off of my image: Detecting data residue in android images

Zhang, X., Aafer, Y., Ying, K. & Du, W., 2016, Computer Security - 21st European Symposium on Research in Computer Security, ESORICS 2016, Proceedings. Springer Verlag, Vol. 9878 LNCS. p. 401-421 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9878 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Intentio ex machina: Android intent access control via an extensible application hook

Yagemann, C. & Du, W., 2016, Computer Security - 21st European Symposium on Research in Computer Security, ESORICS 2016, Proceedings. Springer Verlag, Vol. 9878 LNCS. p. 383-400 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9878 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations
2015

Evaluating Cybersecurity Education Interventions: Three Case Studies

Mirkovic, J., Dark, M., Du, W., Vigna, G. & Denning, T., May 1 2015, In : IEEE Security and Privacy. 13, 3, p. 63-69 7 p., 7118092.

Research output: Contribution to journalArticle

9 Scopus citations

Fine-grained access control for HTML5-based mobile applications in android

Jin, X., Wang, L., Luo, T. & Du, W., 2015, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 7807. p. 309-318 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7807).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Scopus citations

Hare hunting in the wild android: A study on the threat of hanging attribute references

Aafer, Y., Zhang, N., Zhang, Z., Zhang, X., Chen, K., Wang, X., Zhou, X., Du, W. & Grace, M., Oct 12 2015, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, Vol. 2015-October. p. 1248-1259 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

22 Scopus citations

Physical layer spectrum usage authentication in cognitive radio: Analysis and implementation

Borle, K. M., Chen, B. & Du, W., Oct 1 2015, In : IEEE Transactions on Information Forensics and Security. 10, 10, p. 2225-2235 11 p., 7150393.

Research output: Contribution to journalArticle

15 Scopus citations
2014

Attacks on Android clipboard

Zhang, X. & Du, W., Jan 1 2014, Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, DIMVA 2014, Proceedings. Springer Verlag, p. 72-91 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8550 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Code injection attacks on HTML5-based mobile apps: Characterization, detection and mitigation

Jin, X., Hu, X., Ying, K., Du, W., Yin, H. & Peri, G. N., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 66-77 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

102 Scopus citations

Compac: Enforce component-level access control in Android

Wang, Y., Hariharan, S., Zhao, C., Liu, J. & Du, W., Jan 1 2014, p. 25-36. 12 p.

Research output: Contribution to conferencePaper

38 Scopus citations
2013

AFrame: Isolating advertisements from mobile applications in android

Zhang, X., Ahlawat, A. & Du, W., Dec 1 2013, Proceedings - 29th Annual Computer Security Applications Conference, ACSAC 2013. p. 9-18 10 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

37 Scopus citations

A physical layer authentication scheme for countering primary user emulation attack

Borle, K. M., Chen, B. & Du, W., Oct 18 2013, 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2013 - Proceedings. p. 2935-2939 5 p. 6638195. (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

24 Scopus citations

DroidAPIMiner: Mining API-level features for robust malware detection in android

Aafer, Y., Du, W. & Yin, H., Jan 1 2013, Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Revised Selected Papers. Zia, T., Zomaya, A., Varadharajan, V. & Mao, M. (eds.). Springer Verlag, p. 86-103 18 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 127 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

312 Scopus citations

Mediums: Visual integrity preserving framework

Luo, T., Jin, X. & Du, W., Mar 18 2013, CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy. p. 309-316 8 p. (CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

On the effectiveness of API-level access control using bytecode rewriting in Android

Hao, H., Singh, V. & Du, W., May 27 2013, ASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. p. 25-36 12 p. (ASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

41 Scopus citations

Touchjacking attacks on Web in Android, iOS, and Windows Phone

Luo, T., Jin, X., Ananthanarayanan, A. & Du, W., Apr 12 2013, Foundations and Practice of Security - 5th International Symposium, FPS 2012, Revised Selected Papers. p. 227-243 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7743 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

22 Scopus citations
2012

Containing bogus packet insertion attacks for broadcast authentication in sensor networks

Xiong, K., Wang, R., Du, W. & Ning, P., Jul 1 2012, In : ACM Transactions on Sensor Networks. 8, 3, 20.

Research output: Contribution to journalArticle

4 Scopus citations

Cooperative key generation in wireless networks

Lai, L., Liang, Y. & Du, W., Sep 3 2012, In : IEEE Journal on Selected Areas in Communications. 30, 8, p. 1578-1588 11 p., 6280261.

Research output: Contribution to journalArticle

71 Scopus citations

SCUTA: A server-side access control system for web applications

Tan, X., Du, W., Luo, T. & Soundararaj, K. D., Jul 25 2012, SACMAT'12 - Proceedings of the 17th ACM Symposium on Access Control Models and Technologies. p. 71-82 12 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Social network based reputation computation and document classification

Lee, J. Y., Duan, Y., Oh, J. C., Du, W., Blair, H., Wang, L. & Jin, X., Jun 26 2012, In : Journal of Universal Computer Science. 18, 4, p. 532-553 22 p.

Research output: Contribution to journalArticle

7 Scopus citations
2011

Attacks on WebView in the Android system

Luo, T., Hao, H., Du, W., Wang, Y. & Yin, H., Dec 1 2011, Proceedings - 27th Annual Computer Security Applications Conference, ACSAC 2011. p. 343-352 10 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

114 Scopus citations

Automatic reputation computation through document analysis: A social network approach

Lee, J. Y., Duan, Y., Oh, J. C., Du, W., Blair, H., Wang, L. & Jin, X., Sep 19 2011, Proceedings - 2011 International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2011. p. 559-560 2 p. 5992663. (Proceedings - 2011 International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Contego: Capability-based access control for web browsers

Luo, T. & Du, W., Jan 1 2011, Trust and Trustworthy Computing - 4th International Conference, TRUST 2011, Proceedings. Springer Verlag, Vol. 6740 LNCS. p. 231-238 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6740 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Contego: Capability-based access control for web browsers (Short paper)

Luo, T. & Du, W., Jun 27 2011, Trust and Trustworthy Computing - 4th International Conference, TRUST 2011, Proceedings. p. 231-238 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6740 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Cryptographic link signatures for spectrum usage authentication in cognitive radio

Tan, X., Borle, K., Du, W. & Chen, B., Aug 25 2011, WiSec'11 - Proceedings of the 4th ACM Conference on Wireless Network Security. p. 79-90 12 p. (WiSec'11 - Proceedings of the 4th ACM Conference on Wireless Network Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

45 Scopus citations

PHY-based cooperative key generation in wireless networks

Lai, L., Liang, Y. & Du, W., Dec 1 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011. p. 662-669 8 p. 6120231. (2011 49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Scopus citations

Position paper: Why are there so many vulnerabilities in web applications?

Du, W., Jayaraman, K., Tan, X., Luo, T. & Chapin, S., Dec 1 2011, NSPW'11 - Proceedings of the 2011 New Security Paradigms Workshop. p. 83-93 11 p. (Proceedings New Security Paradigms Workshop).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Re-designing the web's access control system (Extended abstract)

Du, W., Tan, X., Luo, T., Jayaraman, K. & Zhu, Z., Jul 18 2011, Data and Applications Security and Privacy XXV - 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Proceedings. p. 4-11 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6818 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Secret sharing via noisy broadcast channels

Lai, L., Liang, Y., Du, W. & Shamai, S., Oct 26 2011, 2011 IEEE International Symposium on Information Theory Proceedings, ISIT 2011. p. 1955-1959 5 p. 6033894. (IEEE International Symposium on Information Theory - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

SEED: Hands-on lab exercises for computer security education

Du, W., Sep 1 2011, In : IEEE Security and Privacy. 9, 5, p. 70-73 4 p., 6029361.

Research output: Contribution to journalArticle

27 Scopus citations
2010

Bureaucratic protocols for secure two-party sorting, selection, and permuting

Wang, G., Luo, T., Goodrich, M. T., Du, W. & Zhu, Z., Jul 16 2010, Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010. p. 226-237 12 p. (Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

19 Scopus citations

ESCUDO: A fine-grained protection model for web browsers

Jayaraman, K., Du, W., Rajagopalan, B. & Chapin, S. J., Aug 27 2010, ICDCS 2010 - 2010 International Conference on Distributed Computing Systems. p. 231-240 10 p. 5541712. (Proceedings - International Conference on Distributed Computing Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

28 Scopus citations

K-anonymous association rule hiding

Zhu, Z. & Du, W., Jul 16 2010, Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010. p. 305-309 5 p. (Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations

Private predictions on hidden Markov models

Polat, H., Du, W., Renckes, S. & Oysal, Y., Jun 1 2010, In : Artificial Intelligence Review. 34, 1, p. 53-72 20 p.

Research output: Contribution to journalArticle

7 Scopus citations

Understanding privacy risk of publishing decision trees

Zhu, Z. & Du, W., Oct 29 2010, Data and Applications Security and Privacy XXIV - 24th Annual IFIP WG 11.3 Working Conference, Proceedings. p. 33-48 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6166 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations
2009

A hybrid multi-group approach for privacy-preserving data mining

Teng, Z. & Du, W., May 1 2009, In : Knowledge and Information Systems. 19, 2, p. 133-157 25 p.

Research output: Contribution to journalArticle

16 Scopus citations

Deriving private information from association rule mining results

Zhu, Z., Wang, G. & Du, W., Jul 8 2009, Proceedings - 25th IEEE International Conference on Data Engineering, ICDE 2009. p. 18-29 12 p. 4812388. (Proceedings - International Conference on Data Engineering).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Scopus citations

On the approximability of geometric and geographic generalization and the min-max bin covering problem

Du, W., Eppstein, D., Goodrich, M. T. & Lueker, G. S., Sep 14 2009, Algorithms and Data Structures - 11th International Symposium, WADS 2009, Proceedings. p. 242-253 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5664 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

ShortPK: A short-term public key scheme for broadcast authentication in sensor networks

Wang, R., Du, W., Liu, X. & Ning, P., Dec 1 2009, In : ACM Transactions on Sensor Networks. 6, 1, 9.

Research output: Contribution to journalArticle

24 Scopus citations
2008

Attack-resistant location estimation in wireless sensor networks

Liu, D., Ning, P., Liu, A., Wang, C. & Du, W. K., Jul 1 2008, In : ACM Transactions on Information and System Security. 11, 4, 22.

Research output: Contribution to journalArticle

97 Scopus citations

Group-based key predistribution for wireless sensor networks

Liu, D., Ning, P. & Du, W., Mar 1 2008, In : ACM Transactions on Sensor Networks. 4, 2, 11.

Research output: Contribution to journalArticle

79 Scopus citations

Inference analysis in privacy-preserving data re-publishing

Wang, G., Zhu, Z., Du, W. & Teng, Z., Dec 1 2008, Proceedings - 8th IEEE International Conference on Data Mining, ICDM 2008. p. 1079-1084 6 p. 4781228. (Proceedings - IEEE International Conference on Data Mining, ICDM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

Mitigating DoS attacks against broadcast authentication in wireless sensor networks

Ning, P., Liu, A. & Du, W., Jan 1 2008, In : ACM Transactions on Sensor Networks. 4, 1, 1.

Research output: Contribution to journalArticle

119 Scopus citations

OptRR: Optimizing randomized response schemes for privacy-preserving data mining

Huang, Z. & Du, W., Oct 1 2008, Proceedings of the 2008 IEEE 24th International Conference on Data Engineering, ICDE'08. p. 705-714 10 p. 4497479. (Proceedings - International Conference on Data Engineering).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

42 Scopus citations

Privacy-MaxEnt: Integrating background knowledge in privacy quantification

Du, W., Teng, Z. & Zhu, Z., Dec 10 2008, SIGMOD 2008: Proceedings of the ACM SIGMOD International Conference on Management of Data 2008. p. 459-472 14 p. 1376665. (Proceedings of the ACM SIGMOD International Conference on Management of Data).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

45 Scopus citations

Privacy-preserving top-N recommendation on distributed data

Polat, H. & Du, W., May 1 2008, In : Journal of the American Society for Information Science and Technology. 59, 7, p. 1093-1108 16 p.

Research output: Contribution to journalArticle

36 Scopus citations

SEED: A suite of instructional laboratories for computer security education

Du, W. & Wang, R., Mar 1 2008, In : ACM Journal on Educational Resources in Computing. 8, 1, 3.

Research output: Contribution to journalArticle

43 Scopus citations