If you made any changes in Pure, your changes will be visible here soon.

Research Output 2000 2019

  • 6986 Citations
  • 39 h-Index
  • 69 Conference contribution
  • 24 Article
  • 2 Chapter
2019

TruZ-view: Developing trustZone user interface for mobile oS using delegation integration model

Ying, K., Thavai, P. & Du, W., Mar 13 2019, CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 1-12 12 p. (CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
User interfaces
Application programs
Mobile devices
2018
3 Citations (Scopus)

TruZ-Droid: Integrating TrustZone with mobile operating system

Ying, K., Ahlawat, A., Alsharifi, B., Jiang, Y., Thavai, P. & Du, W., Jun 10 2018, MobiSys 2018 - Proceedings of the 16th ACM International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, p. 14-27 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Application programming interfaces (API)
Mobile devices
Servers
Hardware
2016
1 Citation (Scopus)

Intentio ex machina: Android intent access control via an extensible application hook

Yagemann, C. & Du, W., 2016, Computer Security - 21st European Symposium on Research in Computer Security, ESORICS 2016, Proceedings. Springer Verlag, Vol. 9878 LNCS. p. 383-400 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9878 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hooks
Access Control
Access control
Firewall
Communication
2015
5 Citations (Scopus)

Evaluating Cybersecurity Education Interventions: Three Case Studies

Mirkovic, J., Dark, M., Du, W., Vigna, G. & Denning, T., May 1 2015, In : IEEE Security and Privacy. 13, 3, p. 63-69 7 p., 7118092.

Research output: Contribution to journalArticle

Education
evaluation
education
university
12 Citations (Scopus)

Fine-grained access control for HTML5-based mobile applications in android

Jin, X., Wang, L., Luo, T. & Du, W., 2015, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 7807. p. 309-318 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7807).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile Applications
Access Control
Access control
JavaScript
Middleware
18 Citations (Scopus)

Hare hunting in the wild android: A study on the threat of hanging attribute references

Aafer, Y., Zhang, N., Zhang, Z., Zhang, X., Chen, K., Wang, X., Zhou, X., Du, W. & Grace, M., Oct 12 2015, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, Vol. 2015-October. p. 1248-1259 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Defects
Electronic mail
Industrial plants
Hazards
11 Citations (Scopus)

Physical layer spectrum usage authentication in cognitive radio: Analysis and implementation

Borle, K. M., Chen, B. & Du, W., Oct 1 2015, In : IEEE Transactions on Information Forensics and Security. 10, 10, p. 2225-2235 11 p., 7150393.

Research output: Contribution to journalArticle

Cognitive radio
Authentication
Hash functions
Software radio
Degradation
2014
6 Citations (Scopus)

Attacks on Android clipboard

Zhang, X. & Du, W., 2014, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 8550 LNCS. p. 72-91 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8550 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Attack
Injection
Manipulation
JavaScript
88 Citations (Scopus)

Code injection attacks on HTML5-based mobile apps: Characterization, detection and mitigation

Jin, X., Hu, X., Ying, K., Du, W., Yin, H. & Peri, G. N., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 66-77 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Mobile devices
36 Citations (Scopus)

Compac: Enforce component-level access control in Android

Wang, Y., Hariharan, S., Zhao, C., Liu, J. & Du, W., 2014, CODASPY 2014 - Proceedings of the 4th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, p. 25-36 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
2013
34 Citations (Scopus)

AFrame: Isolating advertisements from mobile applications in android

Zhang, X., Ahlawat, A. & Du, W., 2013, ACM International Conference Proceeding Series. p. 9-18 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Display devices
23 Citations (Scopus)

A physical layer authentication scheme for countering primary user emulation attack

Borle, K. M., Chen, B. & Du, W., Oct 18 2013, ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings. p. 2935-2939 5 p. 6638195

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Cognitive radio
Degradation
264 Citations (Scopus)

DroidAPIMiner: Mining API-level features for robust malware detection in android

Aafer, Y., Du, W. & Yin, H., 2013, Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Revised Selected Papers. Springer Verlag, Vol. 127 LNICST. p. 86-103 18 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 127 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programming interfaces (API)
Classifiers
Application programs
Android (operating system)
Malware
2 Citations (Scopus)

Mediums: Visual integrity preserving framework

Luo, T., Jin, X. & Du, W., 2013, CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy. p. 309-316 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Web browsers
Access control
Containers
Servers
Display devices
40 Citations (Scopus)

On the effectiveness of API-level access control using bytecode rewriting in Android

Hao, H., Singh, V. & Du, W., 2013, ASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. p. 25-36 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programming interfaces (API)
Access control
Static analysis
18 Citations (Scopus)

Touchjacking attacks on Web in Android, iOS, and Windows Phone

Luo, T., Jin, X., Ananthanarayanan, A. & Du, W., 2013, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 7743 LNCS. p. 227-243 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7743 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programming interfaces (API)
Attack
Black Box
User Interface
User interfaces
2012
4 Citations (Scopus)

Containing bogus packet insertion attacks for broadcast authentication in sensor networks

Xiong, K., Wang, R., Du, W. & Ning, P., Jul 2012, In : ACM Transactions on Sensor Networks. 8, 3, 20.

Research output: Contribution to journalArticle

Sensor nodes
Authentication
Sensor networks
Public key cryptography
Broadcasting
65 Citations (Scopus)

Cooperative key generation in wireless networks

Lai, L., Liang, Y. & Du, W., 2012, In : IEEE Journal on Selected Areas in Communications. 30, 8, p. 1578-1588 11 p., 6280261.

Research output: Contribution to journalArticle

Multiplexing
Wireless networks
Network protocols
2 Citations (Scopus)

SCUTA: A server-side access control system for web applications

Tan, X., Du, W., Luo, T. & Soundararaj, K. D., 2012, Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. p. 71-82 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Servers
Control systems
Security of data
Websites
6 Citations (Scopus)

Social network based reputation computation and document classification

Lee, J. Y., Duan, Y., Oh, J. C., Du, W., Blair, H. A., Wang, L. & Jin, X., 2012, In : Journal of Universal Computer Science. 18, 4, p. 532-553 22 p.

Research output: Contribution to journalArticle

Document Classification
Social Networks
Community Detection
Scale-free Networks
Complex networks
2011
104 Citations (Scopus)

Attacks on WebView in the Android system

Luo, T., Hao, H., Du, W., Wang, Y. & Yin, H., 2011, ACM International Conference Proceeding Series. p. 343-352 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Application programming interfaces (API)
Smartphones
Websites
6 Citations (Scopus)

Automatic reputation computation through document analysis: A social network approach

Lee, J. Y., Duan, Y., Oh, J. C., Du, W., Blair, H. A., Wang, L. & Jin, X., 2011, Proceedings - 2011 International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2011. p. 559-560 2 p. 5992663

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Complex networks
4 Citations (Scopus)

Contego: Capability-based access control for web browsers (Short paper)

Luo, T. & Du, W., 2011, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6740 LNCS. p. 231-238 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6740 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Web browsers
Access Control
Access control
Websites
Vulnerability
44 Citations (Scopus)

Cryptographic link signatures for spectrum usage authentication in cognitive radio

Tan, X., Borle, K., Du, W. & Chen, B., 2011, WiSec'11 - Proceedings of the 4th ACM Conference on Wireless Network Security. p. 79-90 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cognitive radio
Authentication
Telecommunication links
Radio receivers
Modulation
12 Citations (Scopus)

PHY-based cooperative key generation in wireless networks

Lai, L., Liang, Y. & Du, W., 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011. p. 662-669 8 p. 6120231

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Multiplexing
Wireless networks
Network protocols
4 Citations (Scopus)

Position paper: Why are there so many vulnerabilities in web applications?

Du, W., Jayaraman, K., Tan, X., Luo, T. & Chapin, S. J., 2011, Proceedings New Security Paradigms Workshop. p. 83-93 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Trusted computing

Re-designing the web's access control system (Extended abstract)

Du, W., Tan, X., Luo, T., Jayaraman, K. & Zhu, Z., 2011, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6818 LNCS. p. 4-11 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6818 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access Control
Access control
Control System
Control systems
Security of data
4 Citations (Scopus)

Secret sharing via noisy broadcast channels

Lai, L., Liang, Y., Du, W. & Shamai, S., 2011, IEEE International Symposium on Information Theory - Proceedings. p. 1955-1959 5 p. 6033894

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Broadcast Channel
Secret Sharing
Secret Sharing Scheme
Scenarios
Coding
22 Citations (Scopus)

SEED: Hands-on lab exercises for computer security education

Du, W., Sep 2011, In : IEEE Security and Privacy. 9, 5, p. 70-73 4 p., 6029361.

Research output: Contribution to journalArticle

Security of data
Education
Network security
Security systems
Access control
2010
18 Citations (Scopus)

Bureaucratic protocols for secure two-party sorting, selection, and permuting

Wang, G., Luo, T., Goodrich, M. T., Du, W. & Zhu, Z., 2010, Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010. p. 226-237 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sorting
Networks (circuits)
25 Citations (Scopus)

ESCUDO: A fine-grained protection model for web browsers

Jayaraman, K., Du, W., Rajagopalan, B. & Chapin, S. J., 2010, Proceedings - International Conference on Distributed Computing Systems. p. 231-240 10 p. 5541712

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Web browsers
World Wide Web
Access control
Websites
10 Citations (Scopus)

K-anonymous association rule hiding

Zhu, Z. & Du, W., 2010, Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010. p. 305-309 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Association rules
Heuristic algorithms
Experiments
7 Citations (Scopus)

Private predictions on hidden Markov models

Polat, H., Du, W., Renckes, S. & Oysal, Y., Jun 2010, In : Artificial Intelligence Review. 34, 1, p. 53-72 20 p.

Research output: Contribution to journalArticle

Hidden Markov models
privacy
Hidden Markov Model
Prediction
Finance
1 Citation (Scopus)

Understanding privacy risk of publishing decision trees

Zhu, Z. & Du, W., 2010, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6166 LNCS. p. 33-48 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6166 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Decision trees
Decision tree
Privacy
Maximum Entropy
Quantify
2009
14 Citations (Scopus)

A hybrid multi-group approach for privacy-preserving data mining

Teng, Z. & Du, W., May 2009, In : Knowledge and Information Systems. 19, 2, p. 133-157 25 p.

Research output: Contribution to journalArticle

Data mining
Data privacy
Miners
Association rules
Decision trees
14 Citations (Scopus)

Deriving private information from association rule mining results

Zhu, Z., Wang, G. & Du, W., 2009, Proceedings - International Conference on Data Engineering. p. 18-29 12 p. 4812388

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Association rules
Data mining
Data privacy
Entropy
Experiments
4 Citations (Scopus)

On the approximability of geometric and geographic generalization and the min-max bin covering problem

Du, W., Eppstein, D., Goodrich, M. T. & Lueker, G. S., 2009, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5664 LNCS. p. 242-253 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5664 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Covering Problem
Approximability
Bins
Min-max
Attribute
21 Citations (Scopus)

ShortPK: A short-term public key scheme for broadcast authentication in sensor networks

Wang, R., Du, W., Liu, X. & Ning, P., Dec 1 2009, In : ACM Transactions on Sensor Networks. 6, 1, 9.

Research output: Contribution to journalArticle

Public key cryptography
Authentication
Sensor networks
Packet loss
Sensor nodes
2008
94 Citations (Scopus)

Attack-resistant location estimation in wireless sensor networks

Liu, D., Ning, P., Liu, A., Wang, C. & Du, W., Jul 1 2008, In : ACM Transactions on Information and System Security. 11, 4, 22.

Research output: Contribution to journalArticle

Wireless sensor networks
Sensor networks
Authentication
Sensors
Network protocols
77 Citations (Scopus)

Group-based key predistribution for wireless sensor networks

Liu, D., Ning, P. & Du, W., Mar 1 2008, In : ACM Transactions on Sensor Networks. 4, 2, 11.

Research output: Contribution to journalArticle

Sensor nodes
Wireless sensor networks
Sensors
Sensor networks
Polynomials
9 Citations (Scopus)

Inference analysis in privacy-preserving data re-publishing

Wang, G., Zhu, Z., Du, W. & Teng, Z., 2008, Proceedings - IEEE International Conference on Data Mining, ICDM. p. 1079-1084 6 p. 4781228

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data privacy
Entropy
Experiments
116 Citations (Scopus)

Mitigating DoS attacks against broadcast authentication in wireless sensor networks

Ning, P., Liu, A. & Du, W., Jan 1 2008, In : ACM Transactions on Sensor Networks. 4, 1, 1.

Research output: Contribution to journalArticle

Authentication
Wireless sensor networks
Sensor nodes
Denial-of-service attack
Electronic document identification systems
39 Citations (Scopus)

OptRR: Optimizing randomized response schemes for privacy-preserving data mining

Huang, Z. & Du, W., 2008, Proceedings - International Conference on Data Engineering. p. 705-714 10 p. 4497479

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data mining
Multiobjective optimization
44 Citations (Scopus)

Privacy-MaxEnt: Integrating background knowledge in privacy quantification

Du, W., Teng, Z. & Zhu, Z., 2008, Proceedings of the ACM SIGMOD International Conference on Management of Data. p. 459-472 14 p. 1376665

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Entropy
Data privacy

Privacy-preserving top-N recommendation on distributed data

Polat, H. & Du, W., May 2008, In : Revista Espanola de Cirugia Ortopedica y Traumatologia. 52, 7, p. 1093-1108 16 p.

Research output: Contribution to journalArticle

Privacy
privacy
Data privacy
Collaborative filtering
Industry
38 Citations (Scopus)

SEED: A suite of instructional laboratories for computer security education

Du, W. & Wang, R., Mar 1 2008, In : ACM Journal on Educational Resources in Computing. 8, 1, 3.

Research output: Contribution to journalArticle

Security of data
Education
Computer operating systems
Curricula
Computer science
77 Citations (Scopus)

Seluge: Secure and DoS-resistant code dissemination in wireless sensor networks

Hyun, S., Ning, P., Liu, A. & Du, W., 2008, Proceedings - 2008 International Conference on Information Processing in Sensor Networks, IPSN 2008. p. 445-456 12 p. 4505494

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless sensor networks
Military operations
Sensor nodes
Telecommunication links
Data acquisition
2007
2 Citations (Scopus)

A beacon-less location discovery scheme for wireless sensor networks

Fang, L., Du, W. & Ning, P., 2007, Advances in Information Security. Vol. 30. p. 33-55 23 p. (Advances in Information Security; vol. 30).

Research output: Chapter in Book/Report/Conference proceedingChapter

Wireless sensor networks
Sensors
Global positioning system
Maximum likelihood estimation
Sensor nodes
12 Citations (Scopus)

A hybrid multi-group privacy-preserving approach for building decision trees

Teng, Z. & Du, W., 2007, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4426 LNAI. p. 296-307 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4426 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Decision Trees
Privacy
Privacy Preserving
Random Allocation
Decision trees
27 Citations (Scopus)

Containing denial-of-service attacks in broadcast authentication in sensor networks

Wang, R., Du, W. & Ning, P., 2007, Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). p. 71-79 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Public key cryptography
Sensor nodes
Authentication
Sensor networks
Broadcasting