Follow
Kun Sun
Title
Cited by
Cited by
Year
How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols
P Ning, K Sun
Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society, 2003
3502003
Efficient self-healing group key distribution with revocation capability
D Liu, P Ning, K Sun
Proceedings of the 10th ACM conference on Computer and communications …, 2003
2952003
Hypercheck: A hardware-assistedintegrity monitor
F Zhang, J Wang, K Sun, A Stavrou
IEEE Transactions on Dependable and Secure Computing 11 (4), 332-344, 2013
2862013
TinySeRSync: secure and resilient time synchronization in wireless sensor networks
K Sun, P Ning, C Wang
Proceedings of the 13th ACM conference on Computer and communications …, 2006
2542006
Secure and resilient clock synchronization in wireless sensor networks
K Sun, P Ning, C Wang
IEEE Journal on selected areas in communications 24 (2), 395-408, 2006
1612006
Truspy: Cache side-channel information leakage from the secure world on arm devices
N Zhang, K Sun, D Shands, W Lou, YT Hou
Cryptology ePrint Archive, 2016
1522016
A Measurement Study on Linux Container Security: Attacks and Countermeasures
X Lin, Y Wang, L Lei, J Jing, K Sun, Q Zhou
2018 Annual Computer Security Applications Conference (ACSAC), 2018
1512018
Motag: Moving target defense against internet denial of service attacks
Q Jia, K Sun, A Stavrou
2013 22nd International Conference on Computer Communication and Networks …, 2013
1512013
TrustOTP: Transforming smartphones into secure one-time password tokens
H Sun, K Sun, Y Wang, J Jing
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1432015
Secure distributed cluster formation in wireless sensor networks
K Sun, P Peng, P Ning, C Wang
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 131-140, 2006
1402006
Case: Cache-assisted secure execution on arm processors
N Zhang, K Sun, W Lou, YT Hou
2016 IEEE Symposium on Security and Privacy (SP), 72-90, 2016
1252016
A study of personal information in human-chosen passwords and its security implications
Y Li, H Wang, K Sun
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
1242016
DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices.
X Wang, K Sun, Y Wang, J Jing
Ndss, 2015
1242015
Trustice: Hardware-assisted isolated computing environments on mobile devices
H Sun, K Sun, Y Wang, J Jing, H Wang
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015
1182015
Fault-tolerant cluster-wise clock synchronization for wireless sensor networks
K Sun, P Ning, C Wang
IEEE Transactions on Dependable and Secure Computing 2 (3), 177-189, 2005
1062005
Using hardware features for increased debugging transparency
F Zhang, K Leach, A Stavrou, H Wang, K Sun
2015 IEEE Symposium on Security and Privacy, 55-69, 2015
1012015
Spectre: A dependable introspection framework via system management mode
F Zhang, K Leach, K Sun, A Stavrou
2013 43rd Annual IEEE/IFIP international conference on dependable systems …, 2013
982013
Trustdump: Reliable memory acquisition on smartphones
H Sun, K Sun, Y Wang, J Jing, S Jajodia
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
882014
The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links
J Cao, Q Li, R Xie, K Sun, G Gu, M Xu, Y Yang
USENIX Security Symposium, 2019
822019
DESIR: Decoy-enhanced seamless IP randomization
J Sun, K Sun
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
822016
The system can't perform the operation now. Try again later.
Articles 1–20