Calculated based on number of publications stored in Pure and citations from Scopus
19992022

Research activity per year

Filter
Conference contribution

Search results

  • 2022

    Dynamic Offline TrustZone Virtual Credit Card Generator for Financial Transactions

    Salman, A. S. & Du, W. K., 2022, Advances in Information and Communication - Proceedings of the 2022 Future of Information and Communication Conference, FICC. Arai, K. (ed.). Springer Science and Business Media Deutschland GmbH, p. 962-981 20 p. (Lecture Notes in Networks and Systems; vol. 439 LNNS).

    Research output: Chapter in Book/Entry/PoemConference contribution

  • SEED Emulator: An Internet Emulator for Research and Education

    Du, W., Zeng, H. & Won, K., Nov 14 2022, HotNets 2022 - Proceedings of the 2022 21st ACM Workshop on Hot Topics in Networks. Association for Computing Machinery, Inc, p. 101-107 7 p. (HotNets 2022 - Proceedings of the 2022 21st ACM Workshop on Hot Topics in Networks).

    Research output: Chapter in Book/Entry/PoemConference contribution

    6 Scopus citations
  • Split-QR Decoder Hybrid Design for ARM TrustZone

    Salman, A. S. & Du, W. K., 2022, Advances in Information and Communication - Proceedings of the 2022 Future of Information and Communication Conference, FICC. Arai, K. (ed.). Springer Science and Business Media Deutschland GmbH, p. 941-961 21 p. (Lecture Notes in Networks and Systems; vol. 439 LNNS).

    Research output: Chapter in Book/Entry/PoemConference contribution

  • 2021

    Securing Mobile Systems GPS and Camera Functions Using TrustZone Framework

    Salman, A. S. & Du, W., 2021, Intelligent Computing - Proceedings of the 2021 Computing Conference. Arai, K. (ed.). Springer Science and Business Media Deutschland GmbH, p. 868-884 17 p. (Lecture Notes in Networks and Systems; vol. 285).

    Research output: Chapter in Book/Entry/PoemConference contribution

    3 Scopus citations
  • 2020

    TruzCall: Secure VoIP Calling on Android using ARM TrustZone

    Ahlawat, A. & Du, W., Feb 2020, 2020 6th International Conference on Mobile and Secure Services, MOBISECSERV 2020. Urien, P. & Piramuthu, S. (eds.). Institute of Electrical and Electronics Engineers Inc., 9042945. (2020 6th International Conference on Mobile and Secure Services, MOBISECSERV 2020).

    Research output: Chapter in Book/Entry/PoemConference contribution

    5 Scopus citations
  • 2019

    TruZ-view: Developing trustZone user interface for mobile oS using delegation integration model

    Ying, K., Thavai, P. & Du, W., Mar 13 2019, CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 1-12 12 p. (CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    12 Scopus citations
  • 2018

    TruZ-Droid: Integrating TrustZone with mobile operating system

    Ying, K., Ahlawat, A., Alsharifi, B., Jiang, Y., Thavai, P. & Du, W., Jun 10 2018, MobiSys 2018 - Proceedings of the 16th ACM International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, p. 14-27 14 p. (MobiSys 2018 - Proceedings of the 16th ACM International Conference on Mobile Systems, Applications, and Services).

    Research output: Chapter in Book/Entry/PoemConference contribution

    30 Scopus citations
  • 2016

    Harvesting inconsistent security configurations in custom android ROMs via differential analysis

    Aafer, Y., Zhang, X. & Du, W., 2016, Proceedings of the 25th USENIX Security Symposium. USENIX Association, p. 1153-1168 16 p. (Proceedings of the 25th USENIX Security Symposium).

    Research output: Chapter in Book/Entry/PoemConference contribution

    29 Scopus citations
  • Hey, you, get off of my image: Detecting data residue in android images

    Zhang, X., Aafer, Y., Ying, K. & Du, W., 2016, Computer Security - 21st European Symposium on Research in Computer Security, ESORICS 2016, Proceedings. Katsikas, S., Meadows, C., Askoxylakis, I. & Ioannidis, S. (eds.). Springer Verlag, p. 401-421 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9878 LNCS).

    Research output: Chapter in Book/Entry/PoemConference contribution

    3 Scopus citations
  • Intentio ex machina: Android intent access control via an extensible application hook

    Yagemann, C. & Du, W., 2016, Computer Security - 21st European Symposium on Research in Computer Security, ESORICS 2016, Proceedings. Katsikas, S., Meadows, C., Askoxylakis, I. & Ioannidis, S. (eds.). Springer Verlag, p. 383-400 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9878 LNCS).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    3 Scopus citations
  • Life after App Uninstallation: Are the Data Still Alive? Data Residue Attacks on Android

    Zhang, X., Ying, K., Aafer, Y., Qiu, Z. & Du, W., 2016, 23rd Annual Network and Distributed System Security Symposium, NDSS 2016. The Internet Society, (23rd Annual Network and Distributed System Security Symposium, NDSS 2016).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    18 Scopus citations
  • 2015

    Fine-grained access control for HTML5-based mobile applications in android

    Jin, X., Wang, L., Luo, T. & Du, W., 2015, Information Security - 16th International Conference, ISC 2013, Proceedings. Desmedt, Y. (ed.). Springer Verlag, p. 309-318 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7807).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    17 Scopus citations
  • Hare hunting in the wild android: A study on the threat of hanging attribute references

    Aafer, Y., Zhang, N., Zhang, Z., Zhang, X., Chen, K., Wang, X., Zhou, X., Du, W. & Grace, M., Oct 12 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1248-1259 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

    Research output: Chapter in Book/Entry/PoemConference contribution

    38 Scopus citations
  • 2014

    Attacks on Android clipboard

    Zhang, X. & Du, W., 2014, Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, DIMVA 2014, Proceedings. Springer Verlag, p. 72-91 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8550 LNCS).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    14 Scopus citations
  • Code injection attacks on HTML5-based mobile apps: Characterization, detection and mitigation

    Jin, X., Hu, X., Ying, K., Du, W., Yin, H. & Peri, G. N., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 66-77 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    138 Scopus citations
  • 2013

    AFrame: Isolating advertisements from mobile applications in android

    Zhang, X., Ahlawat, A. & Du, W., 2013, Proceedings - 29th Annual Computer Security Applications Conference, ACSAC 2013. p. 9-18 10 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Entry/PoemConference contribution

    53 Scopus citations
  • A physical layer authentication scheme for countering primary user emulation attack

    Borle, K. M., Chen, B. & Du, W., Oct 18 2013, 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2013 - Proceedings. p. 2935-2939 5 p. 6638195. (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings).

    Research output: Chapter in Book/Entry/PoemConference contribution

    27 Scopus citations
  • DroidAPIMiner: Mining API-level features for robust malware detection in android

    Aafer, Y., Du, W. & Yin, H., 2013, Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Revised Selected Papers. Zia, T., Zomaya, A., Varadharajan, V. & Mao, M. (eds.). Springer Verlag, p. 86-103 18 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 127 LNICST).

    Research output: Chapter in Book/Entry/PoemConference contribution

    569 Scopus citations
  • Mediums: Visual integrity preserving framework

    Luo, T., Jin, X. & Du, W., 2013, CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy. p. 309-316 8 p. (CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Entry/PoemConference contribution

    3 Scopus citations
  • On the effectiveness of API-level access control using bytecode rewriting in Android

    Hao, H., Singh, V. & Du, W., 2013, ASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. p. 25-36 12 p. (ASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    50 Scopus citations
  • Touchjacking attacks on Web in Android, iOS, and Windows Phone

    Luo, T., Jin, X., Ananthanarayanan, A. & Du, W., 2013, Foundations and Practice of Security - 5th International Symposium, FPS 2012, Revised Selected Papers. p. 227-243 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7743 LNCS).

    Research output: Chapter in Book/Entry/PoemConference contribution

    35 Scopus citations
  • 2012

    SCUTA: A server-side access control system for web applications

    Tan, X., Du, W., Luo, T. & Soundararaj, K. D., 2012, SACMAT'12 - Proceedings of the 17th ACM Symposium on Access Control Models and Technologies. p. 71-82 12 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

    Research output: Chapter in Book/Entry/PoemConference contribution

    2 Scopus citations
  • 2011

    Attacks on WebView in the Android system

    Luo, T., Hao, H., Du, W., Wang, Y. & Yin, H., 2011, Proceedings - 27th Annual Computer Security Applications Conference, ACSAC 2011. p. 343-352 10 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    152 Scopus citations
  • Automatic reputation computation through document analysis: A social network approach

    Lee, J. Y., Duan, Y., Oh, J. C., Du, W., Blair, H., Wang, L. & Jin, X., 2011, Proceedings - 2011 International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2011. p. 559-560 2 p. 5992663. (Proceedings - 2011 International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2011).

    Research output: Chapter in Book/Entry/PoemConference contribution

    8 Scopus citations
  • Contego: Capability-based access control for web browsers (Short paper)

    Luo, T. & Du, W., 2011, Trust and Trustworthy Computing - 4th International Conference, TRUST 2011, Proceedings. Springer Verlag, p. 231-238 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6740 LNCS).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    7 Scopus citations
  • Cryptographic link signatures for spectrum usage authentication in cognitive radio

    Tan, X., Borle, K., Du, W. & Chen, B., 2011, WiSec'11 - Proceedings of the 4th ACM Conference on Wireless Network Security. p. 79-90 12 p. (WiSec'11 - Proceedings of the 4th ACM Conference on Wireless Network Security).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    61 Scopus citations
  • PHY-based cooperative key generation in wireless networks

    Lai, L., Liang, Y. & Du, W., 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011. p. 662-669 8 p. 6120231. (2011 49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011).

    Research output: Chapter in Book/Entry/PoemConference contribution

    15 Scopus citations
  • Position paper: Why are there so many vulnerabilities in web applications?

    Du, W., Jayaraman, K., Tan, X., Luo, T. & Chapin, S., 2011, NSPW'11 - Proceedings of the 2011 New Security Paradigms Workshop. p. 83-93 11 p. (Proceedings New Security Paradigms Workshop).

    Research output: Chapter in Book/Entry/PoemConference contribution

    4 Scopus citations
  • Re-designing the web's access control system (Extended abstract)

    Du, W., Tan, X., Luo, T., Jayaraman, K. & Zhu, Z., 2011, Data and Applications Security and Privacy XXV - 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Proceedings. p. 4-11 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6818 LNCS).

    Research output: Chapter in Book/Entry/PoemConference contribution

  • Secret sharing via noisy broadcast channels

    Lai, L., Liang, Y., Du, W. & Shamai, S., 2011, 2011 IEEE International Symposium on Information Theory Proceedings, ISIT 2011. p. 1955-1959 5 p. 6033894. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Entry/PoemConference contribution

    5 Scopus citations
  • 2010

    Bureaucratic protocols for secure two-party sorting, selection, and permuting

    Wang, G., Luo, T., Goodrich, M. T., Du, W. & Zhu, Z., 2010, Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010. p. 226-237 12 p. (Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    26 Scopus citations
  • ESCUDO: A fine-grained protection model for web browsers

    Jayaraman, K., Du, W., Rajagopalan, B. & Chapin, S. J., 2010, ICDCS 2010 - 2010 International Conference on Distributed Computing Systems. p. 231-240 10 p. 5541712. (Proceedings - International Conference on Distributed Computing Systems).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    31 Scopus citations
  • K-anonymous association rule hiding

    Zhu, Z. & Du, W., 2010, Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010. p. 305-309 5 p. (Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010).

    Research output: Chapter in Book/Entry/PoemConference contribution

    10 Scopus citations
  • Understanding privacy risk of publishing decision trees

    Zhu, Z. & Du, W., 2010, Data and Applications Security and Privacy XXIV - 24th Annual IFIP WG 11.3 Working Conference, Proceedings. p. 33-48 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6166 LNCS).

    Research output: Chapter in Book/Entry/PoemConference contribution

    4 Scopus citations
  • 2009

    Deriving private information from association rule mining results

    Zhu, Z., Wang, G. & Du, W., 2009, Proceedings - 25th IEEE International Conference on Data Engineering, ICDE 2009. p. 18-29 12 p. 4812388. (Proceedings - International Conference on Data Engineering).

    Research output: Chapter in Book/Entry/PoemConference contribution

    15 Scopus citations
  • On the approximability of geometric and geographic generalization and the min-max bin covering problem

    Du, W., Eppstein, D., Goodrich, M. T. & Lueker, G. S., 2009, Algorithms and Data Structures - 11th International Symposium, WADS 2009, Proceedings. p. 242-253 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5664 LNCS).

    Research output: Chapter in Book/Entry/PoemConference contribution

    4 Scopus citations
  • 2008

    Inference analysis in privacy-preserving data re-publishing

    Wang, G., Zhu, Z., Du, W. & Teng, Z., 2008, Proceedings - 8th IEEE International Conference on Data Mining, ICDM 2008. p. 1079-1084 6 p. 4781228. (Proceedings - IEEE International Conference on Data Mining, ICDM).

    Research output: Chapter in Book/Entry/PoemConference contribution

    13 Scopus citations
  • OptRR: Optimizing randomized response schemes for privacy-preserving data mining

    Huang, Z. & Du, W., 2008, Proceedings of the 2008 IEEE 24th International Conference on Data Engineering, ICDE'08. p. 705-714 10 p. 4497479. (Proceedings - International Conference on Data Engineering).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    51 Scopus citations
  • Privacy-MaxEnt: Integrating background knowledge in privacy quantification

    Du, W., Teng, Z. & Zhu, Z., 2008, SIGMOD 2008: Proceedings of the ACM SIGMOD International Conference on Management of Data 2008. p. 459-472 14 p. 1376665. (Proceedings of the ACM SIGMOD International Conference on Management of Data).

    Research output: Chapter in Book/Entry/PoemConference contribution

    52 Scopus citations
  • Seluge: Secure and DoS-resistant code dissemination in wireless sensor networks

    Hyun, S., Ning, P., Liu, A. & Du, W., 2008, Proceedings - 2008 International Conference on Information Processing in Sensor Networks, IPSN 2008. p. 445-456 12 p. 4505494. (Proceedings - 2008 International Conference on Information Processing in Sensor Networks, IPSN 2008).

    Research output: Chapter in Book/Entry/PoemConference contribution

    95 Scopus citations
  • 2007

    A hybrid multi-group privacy-preserving approach for building decision trees

    Teng, Z. & Du, W., 2007, Advances in Knowledge Discovery and Data Mining - 11th Pacific-Asia Conference, PAKDD 2007, Proceedings. Springer Verlag, p. 296-307 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4426 LNAI).

    Research output: Chapter in Book/Entry/PoemConference contribution

    14 Scopus citations
  • Containing denial-of-service attacks in broadcast authentication in sensor networks

    Wang, R., Du, W. & Ning, P., 2007, MobiHoc'07: Proceedings of the Eighth ACM International Symposium on Mobile Ad Hoc Networking and Computing. p. 71-79 9 p. (Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    30 Scopus citations
  • Effects of inconsistently masked data using RPT on CF with privacy

    Polat, H. & Du, W., 2007, Proceedings of the 2007 ACM Symposium on Applied Computing. p. 649-653 5 p. (Proceedings of the ACM Symposium on Applied Computing).

    Research output: Chapter in Book/Entry/PoemConference contribution

    9 Scopus citations
  • Searching for better randomized response schemes for privacy-preserving data mining

    Huang, Z., Du, W. & Teng, Z., 2007, Knowledge Discovery in Database: PKDD 2007 - 11th European Conference on Principles and Practice of Knowledge Discovery in Databases, Proceedings. Springer Verlag, p. 487-497 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4702 LNAI).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    2 Scopus citations
  • SEED: A suite of instructional laboratories for computer SEcurity EDucation

    Du, W., Teng, Z. & Wang, R., 2007, SIGCSE 2007: 38th SIGCSE Technical Symposium on Computer Science Education. p. 486-490 5 p. (SIGCSE 2007: 38th SIGCSE Technical Symposium on Computer Science Education).

    Research output: Chapter in Book/Entry/PoemConference contribution

    7 Scopus citations
  • 2006

    Achieving private recommendations using randomized response techniques

    Polat, H. & Du, W., 2006, Advances in Knowledge Discovery and Data Mining - 10th Pacific-Asia Conference, PAKDD 2006, Proceedings. p. 637-646 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3918 LNAI).

    Research output: Chapter in Book/Entry/PoemConference contribution

    52 Scopus citations
  • Comparisons of K-anonymization and randomization schemes under linking attacks

    Teng, Z. & Du, W., 2006, Proceedings - Sixth International Conference on Data Mining, ICDM 2006. p. 1091-1096 6 p. 4053159. (Proceedings - IEEE International Conference on Data Mining, ICDM).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    11 Scopus citations
  • Diversify sensor nodes to improve resilience against node compromise

    Alarifi, A. & Du, W., 2006, Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06. p. 101-112 12 p. (Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    31 Scopus citations
  • 2005

    Attack-resistant location estimation in sensor networks

    Liu, D., Ning, P. & Du, W. K., 2005, 2005 Fourth International Symposium on Information Processing in Sensor Networks, IPSN 2005. p. 99-106 8 p. 1440904. (2005 4th International Symposium on Information Processing in Sensor Networks, IPSN 2005; vol. 2005).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    230 Scopus citations
  • Group-based key pre-distribution in wireless sensor networks

    Liu, D., Ning, P. & Du, W., 2005, WiSe - Proceedings of the 2005 ACM Workshop on Wireless Security. Association for Computing Machinery, p. 11-20 10 p. (WiSe - Proceedings of the 2005 ACM Workshop on Wireless Security).

    Research output: Chapter in Book/Entry/PoemConference contribution

    155 Scopus citations