Hybrid firmware analysis for known mobile and iot security vulnerabilities P Sun, L Garcia, G Salles-Loustau, S Zonouz 2020 50th annual IEEE/IFIP international conference on dependable systems …, 2020 | 39 | 2020 |
Compromising security of economic dispatch in power system operations D Shelar, P Sun, S Amin, S Zonouz 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 29 | 2017 |
Tell Me More Than Just Assembly! Reversing Cyber-physical Execution Semantics of Embedded IoT Controller Software Binaries P Sun, L Garcia, S Zonouz The 49th IEEE/IFIP International Conference on Dependable Systems and …, 2019 | 26 | 2019 |
Mini-me, you complete me! data-driven drone security via dnn-based approximate computing A Ding, P Murthy, L Garcia, P Sun, M Chan, S Zonouz Proceedings of the 24th International Symposium on Research in Attacks …, 2021 | 18 | 2021 |
Reliable migration module in trusted cloud based on security level-Design and implementation Y Chen, Q Shen, P Sun, Y Li, Z Chen, S Qing 2012 IEEE 26th International Parallel and Distributed Processing Symposium …, 2012 | 16 | 2012 |
Poster: LBMS: Load balancing based on multilateral security in cloud P Sun, Q Shen, Y Chen, Z Wu, C Zhang, A Ruan, L Gu Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 15 | 2011 |
Towards data isolation & collaboration in storage cloud Q Shen, X Yang, X Yu, P Sun, Y Yang, Z Wu 2011 IEEE Asia-Pacific Services Computing Conference, 139-146, 2011 | 14 | 2011 |
Reverse engineering and retrofitting robotic aerial vehicle control firmware using dispatch T Kim, A Ding, S Etigowni, P Sun, J Chen, L Garcia, S Zonouz, D Xu, ... Proceedings of the 20th Annual International Conference on Mobile Systems …, 2022 | 12 | 2022 |
A covert channel using core alternation Y Li, Q Shen, C Zhang, P Sun, Y Chen, S Qing 2012 26th International Conference on Advanced Information Networking and …, 2012 | 7 | 2012 |
Him of Many Faces: Characterizing Billion-scale Adversarial and Benign Browser Fingerprints on Commercial Websites. S Wu, P Sun, Y Zhao, Y Cao NDSS, 2023 | 6 | 2023 |
Trace-free memory data structure forensics via past inference and future speculations P Sun, R Han, M Zhang, S Zonouz Proceedings of the 32nd Annual Conference on computer security applications …, 2016 | 6 | 2016 |
PLCloud: Comprehensive power grid PLC security monitoring with zero safety disruption H Senyondo, P Sun, R Berthier, S Zonouz 2015 IEEE International Conference on Smart Grid Communications …, 2015 | 6 | 2015 |
Dynamic memory protection via Intel SGX-supported heap allocation S Zonouz, M Zhang, P Sun, L Garcia, X Liu 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th …, 2018 | 5 | 2018 |
Multilateral security architecture for virtualization platform in multi-tenancy cloud environment P Sun, Q Shen, L Gu, Y Li, S Qing, Z Chen IEEE Conference Anthology, 1-5, 2013 | 5 | 2013 |
Power grid safety control via fine-grained multi-persona programmable logic controllers G Salles-Loustau, L Garcia, P Sun, M Dehnavi, S Zonouz 2017 IEEE International Conference on Smart Grid Communications …, 2017 | 4 | 2017 |
A User-Friendly Two-Factor Authentication Method against Real-Time Phishing Attacks Y Sun, S Zhu, Y Zhao, P Sun 2022 IEEE Conference on Communications and Network Security (CNS), 91-99, 2022 | 3 | 2022 |
Poster: Known Vulnerability Detection for WebAssembly Binaries P Sun, L Garcia, Y Han, S Zonouz, Y Zhao Poster: Known Vulnerability Detection for WebAssembly Binaries, 2021 | 2 | 2021 |
Cyber-air-gapped detection of controller attacks through physical interdependencies S Etigowni, M Cintuglu, M Kazerooni, S Hossain, P Sun, K Davis, ... 2017 IEEE International Conference on Smart Grid Communications …, 2017 | 2 | 2017 |
Exploring semantic reverse engineering for software binary protection P Sun Rutgers University, 2019 | 1 | 2019 |
Selfie: User-defined Sensitive Memory Protection and Recovery P Sun, S Zonouz arXiv preprint arXiv:1909.04213, 2019 | | 2019 |