Follow
Chen Cao
Chen Cao
Verified email at psu.edu
Title
Cited by
Cited by
Year
Towards analyzing the input validation vulnerabilities associated with android system services
C Cao, N Gao, P Liu, J Xiang
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
632015
Device-agnostic firmware execution is possible: A concolic execution approach for peripheral emulation
C Cao, L Guan, J Ming, P Liu
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
572020
System service call-oriented symbolic execution of android framework with applications to vulnerability discovery and exploit generation
L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
382017
Assessing the Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs
C Cao, L Yuan, A Singhal, P Liu, X Sun, S Zhu
IFIP International Conference on Database and Application Security and …, 2018
26*2018
Hey, you, keep away from my device: remotely implanting a virus expeller to defeat Mirai on IoT devices
C Cao, L Guan, P Liu, N Gao, J Lin, J Xiang
arXiv preprint arXiv:1706.05779, 2017
192017
Reviewing IoT Security via Logic Bugs in IoT Platforms and Systems
W Zhou, C Cao, D Huo, K Cheng, L Zhang, L Guan, T Liu, Y Jia, Y Zheng, ...
IEEE Internet of Things Journal 8 (14), 11621-11639, 2021
182021
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM
L Guan, C Cao, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger
IEEE Transactions on Dependable and Secure Computing 16 (3), 438-453, 2018
182018
CryptMe: Data leakage prevention for unmodified programs on ARM devices
C Cao, L Guan, N Zhang, N Gao, J Lin, B Luo, P Liu, J Xiang, W Lou
Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018
172018
Tainting-assisted and context-migrated symbolic execution of Android framework for vulnerability discovery and exploit generation
L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu
IEEE Transactions on Mobile Computing 19 (12), 2946-2964, 2019
142019
Protecting mobile devices from physical memory attacks with targeted encryption
L Guan, C Cao, S Zhu, J Lin, P Liu, Y Xia, B Luo
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
72019
Context-aware System Service Call-oriented Symbolic Execution of Android Framework with Application to Exploit Generation
L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu
arXiv preprint arXiv:1611.00837, 2016
72016
Improved three-party password-authenticated key exchange protocol
C Cao, YH Gao
Jisuanji Gongcheng yu Yingyong(Computer Engineering and Applications) 46 (16), 2010
5*2010
Function escalation attack
C Cao, Y Zhang, Q Liu, K Wang
International Conference on Security and Privacy in Communication Networks …, 2015
42015
Commercial hypervisor-based task sandboxing mechanisms are unsecured? But we can fix it!
D Huo, C Cao, P Liu, Y Wang, M Li, Z Xu
Journal of Systems Architecture 116, 102114, 2021
32021
Logic Bugs in IoT Platforms and Systems: A Review
W Zhou, C Cao, D Huo, K Cheng, L Zhang, L Guan, T Liu, Y Zheng, ...
arXiv preprint arXiv:1912.13410, 2019
12019
Design of the password-authenticated protocol based on mosaic image test
T He, T Cao, C Cao
2010 International Conference on Computer Application and System Modeling …, 2010
2010
The system can't perform the operation now. Try again later.
Articles 1–16