Calculated based on number of publications stored in Pure and citations from Scopus
19992022

Research activity per year

Search results

  • 2022

    Dynamic Offline TrustZone Virtual Credit Card Generator for Financial Transactions

    Salman, A. S. & Du, W. K., 2022, Advances in Information and Communication - Proceedings of the 2022 Future of Information and Communication Conference, FICC. Arai, K. (ed.). Springer Science and Business Media Deutschland GmbH, p. 962-981 20 p. (Lecture Notes in Networks and Systems; vol. 439 LNNS).

    Research output: Chapter in Book/Entry/PoemConference contribution

  • SEED Emulator: An Internet Emulator for Research and Education

    Du, W., Zeng, H. & Won, K., Nov 14 2022, HotNets 2022 - Proceedings of the 2022 21st ACM Workshop on Hot Topics in Networks. Association for Computing Machinery, Inc, p. 101-107 7 p. (HotNets 2022 - Proceedings of the 2022 21st ACM Workshop on Hot Topics in Networks).

    Research output: Chapter in Book/Entry/PoemConference contribution

    6 Scopus citations
  • Split-QR Decoder Hybrid Design for ARM TrustZone

    Salman, A. S. & Du, W. K., 2022, Advances in Information and Communication - Proceedings of the 2022 Future of Information and Communication Conference, FICC. Arai, K. (ed.). Springer Science and Business Media Deutschland GmbH, p. 941-961 21 p. (Lecture Notes in Networks and Systems; vol. 439 LNNS).

    Research output: Chapter in Book/Entry/PoemConference contribution

  • 2021

    Securing Mobile Systems GPS and Camera Functions Using TrustZone Framework

    Salman, A. S. & Du, W., 2021, Intelligent Computing - Proceedings of the 2021 Computing Conference. Arai, K. (ed.). Springer Science and Business Media Deutschland GmbH, p. 868-884 17 p. (Lecture Notes in Networks and Systems; vol. 285).

    Research output: Chapter in Book/Entry/PoemConference contribution

    3 Scopus citations
  • 2020

    TruzCall: Secure VoIP Calling on Android using ARM TrustZone

    Ahlawat, A. & Du, W., Feb 2020, 2020 6th International Conference on Mobile and Secure Services, MOBISECSERV 2020. Urien, P. & Piramuthu, S. (eds.). Institute of Electrical and Electronics Engineers Inc., 9042945. (2020 6th International Conference on Mobile and Secure Services, MOBISECSERV 2020).

    Research output: Chapter in Book/Entry/PoemConference contribution

    5 Scopus citations
  • 2019

    TruZ-view: Developing trustZone user interface for mobile oS using delegation integration model

    Ying, K., Thavai, P. & Du, W., Mar 13 2019, CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 1-12 12 p. (CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    12 Scopus citations
  • 2018

    TruZ-Droid: Integrating TrustZone with mobile operating system

    Ying, K., Ahlawat, A., Alsharifi, B., Jiang, Y., Thavai, P. & Du, W., Jun 10 2018, MobiSys 2018 - Proceedings of the 16th ACM International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, p. 14-27 14 p. (MobiSys 2018 - Proceedings of the 16th ACM International Conference on Mobile Systems, Applications, and Services).

    Research output: Chapter in Book/Entry/PoemConference contribution

    30 Scopus citations
  • 2016

    Harvesting inconsistent security configurations in custom android ROMs via differential analysis

    Aafer, Y., Zhang, X. & Du, W., 2016, Proceedings of the 25th USENIX Security Symposium. USENIX Association, p. 1153-1168 16 p. (Proceedings of the 25th USENIX Security Symposium).

    Research output: Chapter in Book/Entry/PoemConference contribution

    29 Scopus citations
  • Hey, you, get off of my image: Detecting data residue in android images

    Zhang, X., Aafer, Y., Ying, K. & Du, W., 2016, Computer Security - 21st European Symposium on Research in Computer Security, ESORICS 2016, Proceedings. Katsikas, S., Meadows, C., Askoxylakis, I. & Ioannidis, S. (eds.). Springer Verlag, p. 401-421 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9878 LNCS).

    Research output: Chapter in Book/Entry/PoemConference contribution

    3 Scopus citations
  • Intentio ex machina: Android intent access control via an extensible application hook

    Yagemann, C. & Du, W., 2016, Computer Security - 21st European Symposium on Research in Computer Security, ESORICS 2016, Proceedings. Katsikas, S., Meadows, C., Askoxylakis, I. & Ioannidis, S. (eds.). Springer Verlag, p. 383-400 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9878 LNCS).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    3 Scopus citations
  • Life after App Uninstallation: Are the Data Still Alive? Data Residue Attacks on Android

    Zhang, X., Ying, K., Aafer, Y., Qiu, Z. & Du, W., 2016, 23rd Annual Network and Distributed System Security Symposium, NDSS 2016. The Internet Society, (23rd Annual Network and Distributed System Security Symposium, NDSS 2016).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    18 Scopus citations
  • 2015

    Evaluating Cybersecurity Education Interventions: Three Case Studies

    Mirkovic, J., Dark, M., Du, W., Vigna, G. & Denning, T., May 1 2015, In: IEEE Security and Privacy. 13, 3, p. 63-69 7 p., 7118092.

    Research output: Contribution to journalArticlepeer-review

    21 Scopus citations
  • Fine-grained access control for HTML5-based mobile applications in android

    Jin, X., Wang, L., Luo, T. & Du, W., 2015, Information Security - 16th International Conference, ISC 2013, Proceedings. Desmedt, Y. (ed.). Springer Verlag, p. 309-318 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7807).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    17 Scopus citations
  • Hare hunting in the wild android: A study on the threat of hanging attribute references

    Aafer, Y., Zhang, N., Zhang, Z., Zhang, X., Chen, K., Wang, X., Zhou, X., Du, W. & Grace, M., Oct 12 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1248-1259 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

    Research output: Chapter in Book/Entry/PoemConference contribution

    38 Scopus citations
  • Physical layer spectrum usage authentication in cognitive radio: Analysis and implementation

    Borle, K. M., Chen, B. & Du, W. K., Oct 1 2015, In: IEEE Transactions on Information Forensics and Security. 10, 10, p. 2225-2235 11 p., 7150393.

    Research output: Contribution to journalArticlepeer-review

    24 Scopus citations
  • 2014

    Attacks on Android clipboard

    Zhang, X. & Du, W., 2014, Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, DIMVA 2014, Proceedings. Springer Verlag, p. 72-91 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8550 LNCS).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    14 Scopus citations
  • Code injection attacks on HTML5-based mobile apps: Characterization, detection and mitigation

    Jin, X., Hu, X., Ying, K., Du, W., Yin, H. & Peri, G. N., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 66-77 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    138 Scopus citations
  • Compac: Enforce component-level access control in Android

    Wang, Y., Hariharan, S., Zhao, C., Liu, J. & Du, W., 2014, p. 25-36. 12 p.

    Research output: Contribution to conferencePaperpeer-review

    51 Scopus citations
  • 2013

    AFrame: Isolating advertisements from mobile applications in android

    Zhang, X., Ahlawat, A. & Du, W., 2013, Proceedings - 29th Annual Computer Security Applications Conference, ACSAC 2013. p. 9-18 10 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Entry/PoemConference contribution

    53 Scopus citations
  • A physical layer authentication scheme for countering primary user emulation attack

    Borle, K. M., Chen, B. & Du, W., Oct 18 2013, 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2013 - Proceedings. p. 2935-2939 5 p. 6638195. (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings).

    Research output: Chapter in Book/Entry/PoemConference contribution

    27 Scopus citations
  • DroidAPIMiner: Mining API-level features for robust malware detection in android

    Aafer, Y., Du, W. & Yin, H., 2013, Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Revised Selected Papers. Zia, T., Zomaya, A., Varadharajan, V. & Mao, M. (eds.). Springer Verlag, p. 86-103 18 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 127 LNICST).

    Research output: Chapter in Book/Entry/PoemConference contribution

    569 Scopus citations
  • Mediums: Visual integrity preserving framework

    Luo, T., Jin, X. & Du, W., 2013, CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy. p. 309-316 8 p. (CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Entry/PoemConference contribution

    3 Scopus citations
  • On the effectiveness of API-level access control using bytecode rewriting in Android

    Hao, H., Singh, V. & Du, W., 2013, ASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. p. 25-36 12 p. (ASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    50 Scopus citations
  • Touchjacking attacks on Web in Android, iOS, and Windows Phone

    Luo, T., Jin, X., Ananthanarayanan, A. & Du, W., 2013, Foundations and Practice of Security - 5th International Symposium, FPS 2012, Revised Selected Papers. p. 227-243 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7743 LNCS).

    Research output: Chapter in Book/Entry/PoemConference contribution

    35 Scopus citations
  • 2012

    Containing bogus packet insertion attacks for broadcast authentication in sensor networks

    Xiong, K., Wang, R., Du, W. & Ning, P., Jul 2012, In: ACM Transactions on Sensor Networks. 8, 3, 20.

    Research output: Contribution to journalArticlepeer-review

    4 Scopus citations
  • Cooperative key generation in wireless networks

    Lai, L., Liang, Y. & Du, W., 2012, In: IEEE Journal on Selected Areas in Communications. 30, 8, p. 1578-1588 11 p., 6280261.

    Research output: Contribution to journalArticlepeer-review

    87 Scopus citations
  • SCUTA: A server-side access control system for web applications

    Tan, X., Du, W., Luo, T. & Soundararaj, K. D., 2012, SACMAT'12 - Proceedings of the 17th ACM Symposium on Access Control Models and Technologies. p. 71-82 12 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

    Research output: Chapter in Book/Entry/PoemConference contribution

    2 Scopus citations
  • Social network based reputation computation and document classification

    Lee, J. Y., Duan, Y., Oh, J. C., Du, W., Blair, H., Wang, L. & Jin, X., 2012, In: Journal of Universal Computer Science. 18, 4, p. 532-553 22 p.

    Research output: Contribution to journalArticlepeer-review

    7 Scopus citations
  • 2011

    Attacks on WebView in the Android system

    Luo, T., Hao, H., Du, W., Wang, Y. & Yin, H., 2011, Proceedings - 27th Annual Computer Security Applications Conference, ACSAC 2011. p. 343-352 10 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    152 Scopus citations
  • Automatic reputation computation through document analysis: A social network approach

    Lee, J. Y., Duan, Y., Oh, J. C., Du, W., Blair, H., Wang, L. & Jin, X., 2011, Proceedings - 2011 International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2011. p. 559-560 2 p. 5992663. (Proceedings - 2011 International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2011).

    Research output: Chapter in Book/Entry/PoemConference contribution

    8 Scopus citations
  • Contego: Capability-based access control for web browsers (Short paper)

    Luo, T. & Du, W., 2011, Trust and Trustworthy Computing - 4th International Conference, TRUST 2011, Proceedings. Springer Verlag, p. 231-238 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6740 LNCS).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    7 Scopus citations
  • Cryptographic link signatures for spectrum usage authentication in cognitive radio

    Tan, X., Borle, K., Du, W. & Chen, B., 2011, WiSec'11 - Proceedings of the 4th ACM Conference on Wireless Network Security. p. 79-90 12 p. (WiSec'11 - Proceedings of the 4th ACM Conference on Wireless Network Security).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    61 Scopus citations
  • PHY-based cooperative key generation in wireless networks

    Lai, L., Liang, Y. & Du, W., 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011. p. 662-669 8 p. 6120231. (2011 49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011).

    Research output: Chapter in Book/Entry/PoemConference contribution

    15 Scopus citations
  • Position paper: Why are there so many vulnerabilities in web applications?

    Du, W., Jayaraman, K., Tan, X., Luo, T. & Chapin, S., 2011, NSPW'11 - Proceedings of the 2011 New Security Paradigms Workshop. p. 83-93 11 p. (Proceedings New Security Paradigms Workshop).

    Research output: Chapter in Book/Entry/PoemConference contribution

    4 Scopus citations
  • Re-designing the web's access control system (Extended abstract)

    Du, W., Tan, X., Luo, T., Jayaraman, K. & Zhu, Z., 2011, Data and Applications Security and Privacy XXV - 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Proceedings. p. 4-11 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6818 LNCS).

    Research output: Chapter in Book/Entry/PoemConference contribution

  • Secret sharing via noisy broadcast channels

    Lai, L., Liang, Y., Du, W. & Shamai, S., 2011, 2011 IEEE International Symposium on Information Theory Proceedings, ISIT 2011. p. 1955-1959 5 p. 6033894. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Entry/PoemConference contribution

    5 Scopus citations
  • SEED: Hands-on lab exercises for computer security education

    Du, W., Sep 2011, In: IEEE Security and Privacy. 9, 5, p. 70-73 4 p., 6029361.

    Research output: Contribution to journalArticlepeer-review

    60 Scopus citations
  • 2010

    Bureaucratic protocols for secure two-party sorting, selection, and permuting

    Wang, G., Luo, T., Goodrich, M. T., Du, W. & Zhu, Z., 2010, Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010. p. 226-237 12 p. (Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    26 Scopus citations
  • ESCUDO: A fine-grained protection model for web browsers

    Jayaraman, K., Du, W., Rajagopalan, B. & Chapin, S. J., 2010, ICDCS 2010 - 2010 International Conference on Distributed Computing Systems. p. 231-240 10 p. 5541712. (Proceedings - International Conference on Distributed Computing Systems).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    31 Scopus citations
  • K-anonymous association rule hiding

    Zhu, Z. & Du, W., 2010, Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010. p. 305-309 5 p. (Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010).

    Research output: Chapter in Book/Entry/PoemConference contribution

    10 Scopus citations
  • Private predictions on hidden Markov models

    Polat, H., Du, W., Renckes, S. & Oysal, Y., Jun 2010, In: Artificial Intelligence Review. 34, 1, p. 53-72 20 p.

    Research output: Contribution to journalArticlepeer-review

    10 Scopus citations
  • Understanding privacy risk of publishing decision trees

    Zhu, Z. & Du, W., 2010, Data and Applications Security and Privacy XXIV - 24th Annual IFIP WG 11.3 Working Conference, Proceedings. p. 33-48 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6166 LNCS).

    Research output: Chapter in Book/Entry/PoemConference contribution

    4 Scopus citations
  • 2009

    A hybrid multi-group approach for privacy-preserving data mining

    Teng, Z. & Du, W., May 2009, In: Knowledge and Information Systems. 19, 2, p. 133-157 25 p.

    Research output: Contribution to journalArticlepeer-review

    19 Scopus citations
  • Deriving private information from association rule mining results

    Zhu, Z., Wang, G. & Du, W., 2009, Proceedings - 25th IEEE International Conference on Data Engineering, ICDE 2009. p. 18-29 12 p. 4812388. (Proceedings - International Conference on Data Engineering).

    Research output: Chapter in Book/Entry/PoemConference contribution

    15 Scopus citations
  • Key pre-distribution for sensor networks using group deployment knowledge

    Liu, D., Ning, P. & Du, W., Sep 18 2009, Security In Ad-hoc And Sensor Networks. World Scientific Publishing Co. Pte Ltd, p. 67-102 36 p.

    Research output: Chapter in Book/Entry/PoemChapter

  • On the approximability of geometric and geographic generalization and the min-max bin covering problem

    Du, W., Eppstein, D., Goodrich, M. T. & Lueker, G. S., 2009, Algorithms and Data Structures - 11th International Symposium, WADS 2009, Proceedings. p. 242-253 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5664 LNCS).

    Research output: Chapter in Book/Entry/PoemConference contribution

    4 Scopus citations
  • ShortPK: A short-term public key scheme for broadcast authentication in sensor networks

    Wang, R., Du, W., Liu, X. & Ning, P., Dec 1 2009, In: ACM Transactions on Sensor Networks. 6, 1, 9.

    Research output: Contribution to journalArticlepeer-review

    25 Scopus citations
  • Uncheatable grid computing

    Du, W., Murugesan, M. & Jia, J., Nov 20 2009, Algorithms and Theory of Computation Handbook, Second Edition, Volume 2: Special Topics and Techniques. CRC Press, p. 30.1-30.21

    Research output: Chapter in Book/Entry/PoemChapter

  • 2008

    Attack-resistant location estimation in wireless sensor networks

    Liu, D., Ning, P., Liu, A., Wang, C. & Du, W. K., Jul 1 2008, In: ACM Transactions on Information and System Security. 11, 4, 22.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    121 Scopus citations
  • Group-based key predistribution for wireless sensor networks

    Liu, D., Ning, P. & Du, W., Mar 1 2008, In: ACM Transactions on Sensor Networks. 4, 2, 11.

    Research output: Contribution to journalArticlepeer-review

    88 Scopus citations