• 7404 Citations
  • 40 h-Index
19992020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
2020

TruzCall: Secure VoIP Calling on Android using ARM TrustZone

Ahlawat, A. & Du, W., Feb 2020, 2020 6th International Conference on Mobile and Secure Services, MOBISECSERV 2020. Urien, P. & Piramuthu, S. (eds.). Institute of Electrical and Electronics Engineers Inc., 9042945. (2020 6th International Conference on Mobile and Secure Services, MOBISECSERV 2020).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2019

TruZ-view: Developing trustZone user interface for mobile oS using delegation integration model

Ying, K., Thavai, P. & Du, W., Mar 13 2019, CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 1-12 12 p. (CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
1 Scopus citations
2018

TruZ-Droid: Integrating TrustZone with mobile operating system

Ying, K., Ahlawat, A., Alsharifi, B., Jiang, Y., Thavai, P. & Du, W., Jun 10 2018, MobiSys 2018 - Proceedings of the 16th ACM International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, p. 14-27 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations
2016

Harvesting inconsistent security configurations in custom android ROMs via differential analysis

Aafer, Y., Zhang, X. & Du, W., Jan 1 2016, Proceedings of the 25th USENIX Security Symposium. USENIX Association, p. 1153-1168 16 p. (Proceedings of the 25th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

Hey, you, get off of my image: Detecting data residue in android images

Zhang, X., Aafer, Y., Ying, K. & Du, W., 2016, Computer Security - 21st European Symposium on Research in Computer Security, ESORICS 2016, Proceedings. Springer Verlag, Vol. 9878 LNCS. p. 401-421 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9878 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Intentio ex machina: Android intent access control via an extensible application hook

Yagemann, C. & Du, W., 2016, Computer Security - 21st European Symposium on Research in Computer Security, ESORICS 2016, Proceedings. Katsikas, S., Meadows, C., Askoxylakis, I. & Ioannidis, S. (eds.). Springer Verlag, p. 383-400 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9878 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations
2015

Fine-grained access control for HTML5-based mobile applications in android

Jin, X., Wang, L., Luo, T. & Du, W., 2015, Information Security - 16th International Conference, ISC 2013, Proceedings. Desmedt, Y. (ed.). Springer Verlag, p. 309-318 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7807).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Scopus citations

Hare hunting in the wild android: A study on the threat of hanging attribute references

Aafer, Y., Zhang, N., Zhang, Z., Zhang, X., Chen, K., Wang, X., Zhou, X., Du, W. & Grace, M., Oct 12 2015, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, Vol. 2015-October. p. 1248-1259 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

22 Scopus citations
2014

Attacks on Android clipboard

Zhang, X. & Du, W., Jan 1 2014, Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, DIMVA 2014, Proceedings. Springer Verlag, p. 72-91 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8550 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Code injection attacks on HTML5-based mobile apps: Characterization, detection and mitigation

Jin, X., Hu, X., Ying, K., Du, W., Yin, H. & Peri, G. N., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 66-77 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

103 Scopus citations
2013

AFrame: Isolating advertisements from mobile applications in android

Zhang, X., Ahlawat, A. & Du, W., Dec 1 2013, Proceedings - 29th Annual Computer Security Applications Conference, ACSAC 2013. p. 9-18 10 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

39 Scopus citations

A physical layer authentication scheme for countering primary user emulation attack

Borle, K. M., Chen, B. & Du, W., Oct 18 2013, 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2013 - Proceedings. p. 2935-2939 5 p. 6638195. (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

24 Scopus citations

DroidAPIMiner: Mining API-level features for robust malware detection in android

Aafer, Y., Du, W. & Yin, H., Jan 1 2013, Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Revised Selected Papers. Zia, T., Zomaya, A., Varadharajan, V. & Mao, M. (eds.). Springer Verlag, p. 86-103 18 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 127 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

328 Scopus citations

Mediums: Visual integrity preserving framework

Luo, T., Jin, X. & Du, W., Mar 18 2013, CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy. p. 309-316 8 p. (CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

On the effectiveness of API-level access control using bytecode rewriting in Android

Hao, H., Singh, V. & Du, W., May 27 2013, ASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. p. 25-36 12 p. (ASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

41 Scopus citations

Touchjacking attacks on Web in Android, iOS, and Windows Phone

Luo, T., Jin, X., Ananthanarayanan, A. & Du, W., Apr 12 2013, Foundations and Practice of Security - 5th International Symposium, FPS 2012, Revised Selected Papers. p. 227-243 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7743 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

22 Scopus citations
2012

SCUTA: A server-side access control system for web applications

Tan, X., Du, W., Luo, T. & Soundararaj, K. D., Jul 25 2012, SACMAT'12 - Proceedings of the 17th ACM Symposium on Access Control Models and Technologies. p. 71-82 12 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations
2011

Attacks on WebView in the Android system

Luo, T., Hao, H., Du, W., Wang, Y. & Yin, H., 2011, Proceedings - 27th Annual Computer Security Applications Conference, ACSAC 2011. p. 343-352 10 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

115 Scopus citations

Automatic reputation computation through document analysis: A social network approach

Lee, J. Y., Duan, Y., Oh, J. C., Du, W., Blair, H., Wang, L. & Jin, X., Sep 19 2011, Proceedings - 2011 International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2011. p. 559-560 2 p. 5992663. (Proceedings - 2011 International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Contego: Capability-based access control for web browsers (Short paper)

Luo, T. & Du, W., Jun 27 2011, Trust and Trustworthy Computing - 4th International Conference, TRUST 2011, Proceedings. p. 231-238 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6740 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Contego: Capability-based access control for web browsers

Luo, T. & Du, W., Jan 1 2011, Trust and Trustworthy Computing - 4th International Conference, TRUST 2011, Proceedings. Springer Verlag, Vol. 6740 LNCS. p. 231-238 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6740 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Cryptographic link signatures for spectrum usage authentication in cognitive radio

Tan, X., Borle, K., Du, W. & Chen, B., Aug 25 2011, WiSec'11 - Proceedings of the 4th ACM Conference on Wireless Network Security. p. 79-90 12 p. (WiSec'11 - Proceedings of the 4th ACM Conference on Wireless Network Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

46 Scopus citations

PHY-based cooperative key generation in wireless networks

Lai, L., Liang, Y. & Du, W., Dec 1 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011. p. 662-669 8 p. 6120231. (2011 49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Scopus citations

Position paper: Why are there so many vulnerabilities in web applications?

Du, W., Jayaraman, K., Tan, X., Luo, T. & Chapin, S., Dec 1 2011, NSPW'11 - Proceedings of the 2011 New Security Paradigms Workshop. p. 83-93 11 p. (Proceedings New Security Paradigms Workshop).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Re-designing the web's access control system (Extended abstract)

Du, W., Tan, X., Luo, T., Jayaraman, K. & Zhu, Z., Jul 18 2011, Data and Applications Security and Privacy XXV - 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Proceedings. p. 4-11 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6818 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Secret sharing via noisy broadcast channels

Lai, L., Liang, Y., Du, W. & Shamai, S., Oct 26 2011, 2011 IEEE International Symposium on Information Theory Proceedings, ISIT 2011. p. 1955-1959 5 p. 6033894. (IEEE International Symposium on Information Theory - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations
2010

Bureaucratic protocols for secure two-party sorting, selection, and permuting

Wang, G., Luo, T., Goodrich, M. T., Du, W. & Zhu, Z., Jul 16 2010, Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010. p. 226-237 12 p. (Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

19 Scopus citations

ESCUDO: A fine-grained protection model for web browsers

Jayaraman, K., Du, W., Rajagopalan, B. & Chapin, S. J., Aug 27 2010, ICDCS 2010 - 2010 International Conference on Distributed Computing Systems. p. 231-240 10 p. 5541712. (Proceedings - International Conference on Distributed Computing Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

28 Scopus citations

K-anonymous association rule hiding

Zhu, Z. & Du, W., Jul 16 2010, Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010. p. 305-309 5 p. (Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations

Understanding privacy risk of publishing decision trees

Zhu, Z. & Du, W., Oct 29 2010, Data and Applications Security and Privacy XXIV - 24th Annual IFIP WG 11.3 Working Conference, Proceedings. p. 33-48 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6166 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations
2009

Deriving private information from association rule mining results

Zhu, Z., Wang, G. & Du, W., Jul 8 2009, Proceedings - 25th IEEE International Conference on Data Engineering, ICDE 2009. p. 18-29 12 p. 4812388. (Proceedings - International Conference on Data Engineering).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Scopus citations

On the approximability of geometric and geographic generalization and the min-max bin covering problem

Du, W., Eppstein, D., Goodrich, M. T. & Lueker, G. S., Sep 14 2009, Algorithms and Data Structures - 11th International Symposium, WADS 2009, Proceedings. p. 242-253 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5664 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations
2008

Inference analysis in privacy-preserving data re-publishing

Wang, G., Zhu, Z., Du, W. & Teng, Z., Dec 1 2008, Proceedings - 8th IEEE International Conference on Data Mining, ICDM 2008. p. 1079-1084 6 p. 4781228. (Proceedings - IEEE International Conference on Data Mining, ICDM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

OptRR: Optimizing randomized response schemes for privacy-preserving data mining

Huang, Z. & Du, W., Oct 1 2008, Proceedings of the 2008 IEEE 24th International Conference on Data Engineering, ICDE'08. p. 705-714 10 p. 4497479. (Proceedings - International Conference on Data Engineering).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

43 Scopus citations

Privacy-MaxEnt: Integrating background knowledge in privacy quantification

Du, W., Teng, Z. & Zhu, Z., Dec 10 2008, SIGMOD 2008: Proceedings of the ACM SIGMOD International Conference on Management of Data 2008. p. 459-472 14 p. 1376665. (Proceedings of the ACM SIGMOD International Conference on Management of Data).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

45 Scopus citations

Seluge: Secure and DoS-resistant code dissemination in wireless sensor networks

Hyun, S., Ning, P., Liu, A. & Du, W., Sep 12 2008, Proceedings - 2008 International Conference on Information Processing in Sensor Networks, IPSN 2008. p. 445-456 12 p. 4505494. (Proceedings - 2008 International Conference on Information Processing in Sensor Networks, IPSN 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

77 Scopus citations
2007

A hybrid multi-group privacy-preserving approach for building decision trees

Teng, Z. & Du, W., Dec 1 2007, Advances in Knowledge Discovery and Data Mining - 11th Pacific-Asia Conference, PAKDD 2007, Proceedings. p. 296-307 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4426 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Scopus citations

Containing denial-of-service attacks in broadcast authentication in sensor networks

Wang, R., Du, W. & Ning, P., 2007, MobiHoc'07: Proceedings of the Eighth ACM International Symposium on Mobile Ad Hoc Networking and Computing. p. 71-79 9 p. (Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

28 Scopus citations

Effects of inconsistently masked data using RPT on CF with privacy

Polat, H. & Du, W., Oct 18 2007, Proceedings of the 2007 ACM Symposium on Applied Computing. p. 649-653 5 p. (Proceedings of the ACM Symposium on Applied Computing).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

Searching for better randomized response schemes for privacy-preserving data mining

Huang, Z., Du, W. & Teng, Z., Dec 1 2007, Knowledge Discovery in Database: PKDD 2007 - 11th European Conference on Principles and Practice of Knowledge Discovery in Databases, Proceedings. p. 487-497 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4702 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

SEED: A suite of instructional laboratories for computer SEcurity EDucation

Du, W., Teng, Z. & Wang, R., 2007, SIGCSE 2007: 38th SIGCSE Technical Symposium on Computer Science Education. p. 486-490 5 p. (SIGCSE 2007: 38th SIGCSE Technical Symposium on Computer Science Education).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations
2006

Achieving private recommendations using randomized response techniques

Polat, H. & Du, W., Jul 14 2006, Advances in Knowledge Discovery and Data Mining - 10th Pacific-Asia Conference, PAKDD 2006, Proceedings. p. 637-646 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3918 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

45 Scopus citations

Comparisons of K-anonymization and randomization schemes under linking attacks

Teng, Z. & Du, W., 2006, Proceedings - Sixth International Conference on Data Mining, ICDM 2006. p. 1091-1096 6 p. 4053159. (Proceedings - IEEE International Conference on Data Mining, ICDM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Diversify sensor nodes to improve resilience against node compromise

Alarifi, A. & Du, W., Dec 1 2006, Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06. p. 101-112 12 p. (Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

27 Scopus citations
2005

Attack-resistant location estimation in sensor networks

Liu, D., Ning, P. & Du, W. K., Dec 1 2005, 2005 Fourth International Symposium on Information Processing in Sensor Networks, IPSN 2005. p. 99-106 8 p. 1440904. (2005 4th International Symposium on Information Processing in Sensor Networks, IPSN 2005; vol. 2005).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

202 Scopus citations

Group-based key pre-distribution in wireless sensor networks

Liu, D., Ning, P. & Du, W., Jan 1 2005, WiSe - Proceedings of the 2005 ACM Workshop on Wireless Security. Association for Computing Machinery, p. 11-20 10 p. (WiSe - Proceedings of the 2005 ACM Workshop on Wireless Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

139 Scopus citations

LAD: Localization anomaly detection for wireless sensor networks

Du, W., Fang, L. & Ning, P., Dec 1 2005, Proceedings - 19th IEEE International Parallel and Distributed Processing Symposium, IPDPS 2005. p. 41a 1419861. (Proceedings - 19th IEEE International Parallel and Distributed Processing Symposium, IPDPS 2005; vol. 2005).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

89 Scopus citations

Privacy-preserving collaborative filtering on vertically partitioned data

Polat, H. & Du, W., Dec 1 2005, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). p. 651-658 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3721 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

27 Scopus citations

Privacy-preserving top-N recommendation on horizontally partitioned data

Polat, H. & Du, W., 2005, Proceedings - 2005 IEEE/WIC/ACM InternationalConference on Web Intelligence, WI 2005. p. 725-731 7 p. 1517942. (Proceedings - 2005 IEEE/WIC/ACM InternationalConference on Web Intelligence, WI 2005; vol. 2005).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

34 Scopus citations

Risk-based routing protocol for wireless ad-hoc networks

Alarifi, A. & Du, W., Dec 1 2005, Proceedings of the 2005 International Conference on Wireless Networks, ICWN'05. p. 161-165 5 p. (Proceedings of the 2005 International Conference on Wireless Networks, ICWN'05).

Research output: Chapter in Book/Report/Conference proceedingConference contribution