Towards analyzing the input validation vulnerabilities associated with android system services C Cao, N Gao, P Liu, J Xiang Proceedings of the 31st Annual Computer Security Applications Conference …, 2015 | 63 | 2015 |
Device-agnostic firmware execution is possible: A concolic execution approach for peripheral emulation C Cao, L Guan, J Ming, P Liu Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | 57 | 2020 |
System service call-oriented symbolic execution of android framework with applications to vulnerability discovery and exploit generation L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017 | 38 | 2017 |
Assessing the Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs C Cao, L Yuan, A Singhal, P Liu, X Sun, S Zhu IFIP International Conference on Database and Application Security and …, 2018 | 26* | 2018 |
Hey, you, keep away from my device: remotely implanting a virus expeller to defeat Mirai on IoT devices C Cao, L Guan, P Liu, N Gao, J Lin, J Xiang arXiv preprint arXiv:1706.05779, 2017 | 19 | 2017 |
Reviewing IoT Security via Logic Bugs in IoT Platforms and Systems W Zhou, C Cao, D Huo, K Cheng, L Zhang, L Guan, T Liu, Y Jia, Y Zheng, ... IEEE Internet of Things Journal 8 (14), 11621-11639, 2021 | 18 | 2021 |
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM L Guan, C Cao, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger IEEE Transactions on Dependable and Secure Computing 16 (3), 438-453, 2018 | 18 | 2018 |
CryptMe: Data leakage prevention for unmodified programs on ARM devices C Cao, L Guan, N Zhang, N Gao, J Lin, B Luo, P Liu, J Xiang, W Lou Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018 | 17 | 2018 |
Tainting-assisted and context-migrated symbolic execution of Android framework for vulnerability discovery and exploit generation L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu IEEE Transactions on Mobile Computing 19 (12), 2946-2964, 2019 | 14 | 2019 |
Protecting mobile devices from physical memory attacks with targeted encryption L Guan, C Cao, S Zhu, J Lin, P Liu, Y Xia, B Luo Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019 | 7 | 2019 |
Context-aware System Service Call-oriented Symbolic Execution of Android Framework with Application to Exploit Generation L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu arXiv preprint arXiv:1611.00837, 2016 | 7 | 2016 |
Improved three-party password-authenticated key exchange protocol C Cao, YH Gao Jisuanji Gongcheng yu Yingyong(Computer Engineering and Applications) 46 (16), 2010 | 5* | 2010 |
Function escalation attack C Cao, Y Zhang, Q Liu, K Wang International Conference on Security and Privacy in Communication Networks …, 2015 | 4 | 2015 |
Commercial hypervisor-based task sandboxing mechanisms are unsecured? But we can fix it! D Huo, C Cao, P Liu, Y Wang, M Li, Z Xu Journal of Systems Architecture 116, 102114, 2021 | 3 | 2021 |
Logic Bugs in IoT Platforms and Systems: A Review W Zhou, C Cao, D Huo, K Cheng, L Zhang, L Guan, T Liu, Y Zheng, ... arXiv preprint arXiv:1912.13410, 2019 | 1 | 2019 |
Design of the password-authenticated protocol based on mosaic image test T He, T Cao, C Cao 2010 International Conference on Computer Application and System Modeling …, 2010 | | 2010 |