2024:
C. Guan, G. Cao, S. Zhu.
HoneyLLM: Enabling Shell Honeypots with Large Language
Models
Proceedings of IEEE Conference on Communications and Network Security (CNS),
2024.
C. Wu, S. Zhu, P.
Mitra, W. Wang.
Unlearning Backdoor Attacks in
Federated Learning.
Proceedings of IEEE Conference on Communications and Network Security (CNS),
2024.
D. He, J. Zhang, H. Li, S. Zhu and S. Chan.
PPTFI: Patch Presence Test for Function-Irrelevant Patches.
Proceedings of The 20th International Conference on
Mobility, Sensing and Networking (MSN 2024).
P. Nagasubramaniam, C. Wu, Y. Sun, N.
Karamchandani, S. Zhu and Y. He.
Privacy-Preserving Live
Video Analytics for Drones via Edge Computing.
Applied Sciences, Special Issue on Advances and Application of
Intelligent Video Surveillance Systems: Volume II, 14(22):10254, 2024.
2023:
C.Guan, H.Liu,
G.Cao, S.Zhu, T.LaPorta.
HoneyIoT: Adaptive High-Interaction Honeypot for IoT
Devices.
Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and
Mobile Networks (WiSec), 2023.
B. Zhou, D. He, S.Zhu, S.Zhu,
S. Chan, and X. Yang.
Password
Cracking by Exploiting User Group Information.
19th EAI International Conference on Security and Privacy in Communication
Networks (Securecomm), 2023.
C. Wu, S. Zhu and P. Mitra.
Unlearning Backdoor Attacks in Federated Learning.
ICLR Workshop on Backdoor Attacks aNd DefenSes in Machine Learning (BANDS), 2023,
H. Li, C. Wu, S. Zhu and Z. Zheng.
Learning to Backdoor Federated
Learning.
ICLR Workshop on Backdoor Attacks aNd DefenSes in Machine Learning (BANDS), 2023,
Y.He, W.Ming,
S.Zhu, W.Wang, Y.Zhang, Q.Li, A.Yu
Automatically
Identifying CVE Affected Versions with Patches and Developer Logs.
IEEE Transactions on Dependable and Secure Computing (TDSC), 2023.
2022:
Y. Sun, S. Zhu and Y. Chen
ZoomP^3: Privacy-Preserving Publishing of
Online Video Conference Recordings.
Proceedings of the 22nd Privacy Enhancing Technologies Symposium (PoPETS), 2022.
C. Wu, X. Yang, S. Zhu and P. Mitra
Toward Cleansing Backdoored Neural Networks in
Federated Learning.
Proceedings of the 42nd IEEE International Conference on Distributed Computing
Systems (ICDCS), 2022.
C.Guan, X.Chen,
G.Cao, S.Zhu, T.LaPorta.
HoneyCam: Towards Scalable High-Interaction IoT Camera
Honeypot Based on 360 Degree Videos.
Proceedings of IEEE Conference on Communications and Network Security (CNS),
2022.
Y. Sun, S. Zhu, Y. Zhao and P. Sun.
A User-Friendly Two-Factor
Authentication Method against Real-Time Phishing Attacks.
Proceedings of IEEE Conference on Communications and Network Security (CNS),
2022. CoRR
abs/2109.00132.
D. Su, J.. Liu, S. Zhu, W. Wang, and X. Wang.
Alexa Skills: Security Vulnerabilities and Countermeasures.
Proceedings of IEEE Conference on Communications and Network Security (CNS),
2022. CoRR
abs/2010.10788 (2020).
B.Zolbayar,
R.Sheatsley, P.McDaniel, M.Weisman, S.Zhu, S.Zhu, S.Krishnamurthy.
Generating Practical Adversarial
Network Traffic Flows Using NIDSGAN.
https://arxiv.org/abs/2203.06694
2021:
D. Su, J.. Liu, S. Zhu, X. Wang, W. Wang, and X.
Zhang.
AppQ:
Warm-starting App Recommendation Based on View Graphs.
CoRR abs/2109.03798.
L. Yuan, P. Liu, and S. Zhu.
Recompose Event Sequences vs.
Predict Next Events: A Novel Anomaly Detection Approach for Discrete Event
Logs.
Proceedings of ACM Symposium on Information, Computer and Communications
Security (AsiaCCS),
2021.
L.Yuan, E. Choo, T. Yu, I.
Khalil, S. Zhu.
Time-Window Based Group-Behavior
Supported Method for Accurate Detection of Anomalous Users.
Proceedings of the 51st IEEE/IFIP International Conference on Dependable
Systems and Networks (DSN), 2021.
A. Fitwi, Y. Chen, S. Zhu, E.Blasch, G.Chen.
Privacy-Preserving
Surveillance as an Edge Service Based on Lightweight Video Protection Schemes
Using Face De-Identification and Window Masking.
MDPI Electronics, 2021.
A. Fitwi, Y. Chen, S. Zhu.
Enforcing
Privacy Preservation on Edge Cameras using Lightweight Video Frame Scrambling.
IEEE Transactions on Services Computing, preprint 2021.
A. Fitwi, Y. Chen, S. Zhu.
Lightweight
Frame Scrambling Mechanisms for End-to-End Privacy in Edge Smart Surveillance.
The Institution of Engineering and Technology (IET) Smart Cities,2021.
T. Xia, Y. Sun, S. Zhu, Z. Rasheed and K. Shafique.
Toward A
Network-Assisted Approach for Effective Ransomware Detection.
EAI Transactions on Security and Safety, 2021.
2020:
Y. Sun, S. Chen, S. Zhu and Y. Chen.
iRyP: A Purely Edge-based Visual Privacy-Respecting System
for Mobile Cameras.
Proceedings of the 12th ACM Conference on Security and Privacy in Wireless and
Mobile Networks (WiSec), 2020.
L. Cong, H. Zhong, A. Squicciarini, S. Zhu and D. Miller.
Backdoor Embedding in
Convolutional Neural Network Models via Invisible Perturbation.
Proceedings of ACM Conference on Data and Applications Security and Privacy
(CODASPY), 2020.
C. Li, D. He, S. Li S. Zhu, S. Chan and Y. Cheng.
Android-based
Cryptocurrency Wallets: Attacks and Countermeasures.
Proceedings of IEEE International Conference on Blockchain (Blockchain), 2020.
A. Fitwi, Y. Chen, and S. Zhu.
PriSE: Slenderized Privacy-Preserving Surveillance as
an Edge Service.
Proceedings of 6th IEEE International Conference on Collaboration and Internet
Computing, 2020 (best paper award).
X. Liu, D. He, Y. Gao, S. Zhu, S. Chan.
TLP-IDS: A Two-layer
Intrusion Detection System for Integrated Electronic Systems.
Proceedings of the 39th International Symposium on Reliable Distributed Systems
(SRDS), 2020.
Q. Qiao, D. He, Y. Gao, S. Zhu, J. Gao and S. Chan.
Hybrid Intrusion Detection Mechanisms for
Integrated Electronic Systems.
Proceedings of 17th Annual IEEE International Conference on Sensing,
Communication, and Networking (SECON), 2020.
H. Fu, P. Hu, Z. Zheng, A. Das, P. Pathak, T. Gu, S. Zhu, and P.
Mohapatra.
Towards Automatic
Detection of Nonfunctional Sensitive Transmissions in Mobile Applications.
IEEE Transactions on Mobile Computing (TMC), 2020.
D. He, H. Gu, T. Li, Y. Du, X. Wang, S. Zhu, and N. Guizani.
Towards Hybrid
Static-Dynamic Detection of Vulnerabilities in IoT Firmware.
IEEE Network Magazine, 2020.
D. He, X. Liu, J. Zheng, S. Chan, S. Zhu, W. Min and N. Guizani.
A Lightweight and Intelligent Intrusion Detection
System for Integrated Electronic Systems.
IEEE Network Magazine, Volume: 34, Issue: 4, July/August 2020.
D. He, S. Li, C. Li, S. Zhu, S. Chan, W. Min, X. Li, and N. Guizani.
Security Analysis of Cryptocurrency Wallets in Android-based Applications.
IEEE Network Magazine.
Y. Khazbak, J. Fan, S. Zhu
and G. Cao.
Preserving personalized
location privacy in ride-hailing service.
Tsinghua Science and Technology, 2020
2019:
A. Fitwi, Y. Chen, and S. Zhu.
No Peeking through My Windows: Conserving Privacy in Personal Drones.
Proceedings of IEEE International Smart Cities Conference (ISC2), 2019.
M. Alrizah, S. Zhu, X. Xing, G. Wang.
Errors,
Misunderstandings, and Vulnerabilities: Analyzing the Crowdsourcing Process of
Ad-blocking Systems.
Proceedings of ACM Internet Measurement Conference (IMC), 2019.
L. Yuan, W.Hu, T. Yu, P. Liu, S. Zhu.
Towards Large-Scale Hunting for Android
Negative-Day Malware.
The 22nd International Symposium on Research in Attacks, Intrusions and
Defenses (RAID), 2019.
L. Guan, C. Cao, S. Zhu, J. Lin, P. Liu, Y. Xia, B. Luo.
Protecting Mobile Devices from Physical Memory
Attacks with Targeted Encryption.
Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and
Mobile Networks (WiSec), 2019.
A. Fitwi, Y. Chen, and S. Zhu.
A Lightweight Blockchain-based Privacy Protection for Smart Surveillance at the
Edge.
1st International Workshop on Lightweight Blockchain for Edge Intelligence and
Security (LightChain, colocated
with IEEE BlockChain Conference), 2019.
X. Wang, A. Continella, Y. Yang, Y. He and S.
Zhu.
LeakDoctor: Toward
Automatically Diagnosing Privacy Leaks in Mobile Applications.
ACM International Joint Conference on Pervasive and Ubiquitous Computing
(Ubicomp) (Proceedings of ACM IMWUT), 2019
H. Fu, Z. Zheng, S. Zhu, P. Mohapatra.
Keeping Context In Mind: Automating Mobile App Access Control with User
Interface Inspection.
Proceedings of IEEE International Conference on Computer Communications
(INFOCOM), 2019
Y. Song, C. Wu, S. Zhu, H. Wang.
A Machine Learning
Based Approach for Mobile App Rating Manipulation Detection.
EAI Transactions on Security and Safety, 2019.
X. Liu, J. Liu, S. Zhu, W. Wang, X. Zhang.
Privacy Risk Analysis and Mitigation of
Analytics Libraries in the Android Ecosystem.
IEEE Transactions on Mobile Computing (TMC), 2019.
D. Nagothu, Y. Chen, E. Blasch, A. Aved, and S.Zhu.
Detecting Malicious False Frame Injection
Attacks on Surveillance Systems at the Edge Using Electrical Network Frequency
Signals.
MDPI Sensors Journal, 2019.
Y. Lin, X. Wang, F. Hao, Y. Jiang, Y. Wu, G. Min, D. He, S. Zhu, W. Zhao.
Dynamic Control
of Fraud Information Spreading in Mobile Social Networks.
IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2019.
Y. Zhang, J. Xiao, S. Hao, H. Wang, S. Zhu, S.Jajodia.
Understanding the
Manipulation on Recommender Systems through Web Injection.
IEEE Transactions on Information Forensics & Security (TIFS), 2019.
Accepted,
2018:
X. Wang, Y. Yang, and S. Zhu.
Automated Hybrid
Analysis of Android Malware Through Augmenting Fuzzing with Forced Execution.
IEEE Transactions on Mobile Computing (TMC), 2018.
D. He, Y. Qiao, S. Chen, X. Du, W. Chen, S. Zhu, and M. Guizani.
A Friendly and Low-Cost
Technique for Capturing Non-Cooperative Civilian Unmanned Aerial Vehicles.
IEEE Network Magazine, 2018.
L. Yuan, P. Liu, S. Zhu.
Android STAR: An Efficient
Interaction-Preserving Record-Replay System for Messenger App Usage
Surveillance.
Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and
Mobile Networks (WiSec), 2018.
Y. Khazbak, J. Fan, S. Zhu
and G. Cao.
Preserving Location Privacy in Ride-Hailing
Service.
Proceedings of IEEE Conference on Communications and Network Security (CNS),
2018
L. Cong, H. Zhong, S. Zhu and A. Squicciarini.
Server-Based Manipulation Attacks
Against Machine Learning Models.
Proceedings of ACM Conference on Data and Applications Security and Privacy
(CODASPY), 2018.
C. Cao, L. Yuan, A. Singhal, P. Liu, X. Sun and S. Zhu.
Assessing Attack Impact on Business Processes by
Interconnecting Attack Graphs and Entity Dependency Graphs.
Proceedings of the 32th IFIP WG 11.3 Conference on Data and Applications
Security and Privacy (DBSec), 2018.
X. Liu, J. Liu, W. Wang, S. Zhu.
Android Single Sign-On
Security: Issues, Taxonomy and Directions.
To appear in Elsevier Journal on Future Generation Computer Systems (FGCS),
2018.
H. Huang, C. Zheng, J. Zeng, W. Zhou, S. Zhu, P.
Liu, I. Molloy, S. Chari, G. Zhang, and Q. Guan.
A Large-scale Study of
Android Malware Development Phenomenon on Public Malware Submission and
Scanning Platform.
IEEE Transactions on Big Data, 2018.
2017:
X. Wang, S. Zhu, D. Zhou and Y. Yang.
Droid-AntiRM: Taming
Control Flow Anti-analysis to Support Automated Dynamic Analysis of Android
Malware.
Proceedings of Annual Computer Security Applications Conference (ACSAC), 2017.
X. Chen, H. Huang, S. Zhu, Q. Li, Q. Guan.
SweetDroid: Toward a
Context-Sensitive Privacy Policy Enforcement Framework for Android OS.
Proceedings of ACM Workshop on Privacy in the Electronic Society (WPES), in
conjunction with the ACM CCS conference, 2017.
H. Chen, D. He, S. Zhu and J. Yang.
Toward Detecting Collusive Ranking
Manipulation Attackers in Mobile App Markets.
Proceedings of ACM Symposium on Information, Computer and Communications
Security (AsiaCCS),
2017.
C. Ren, P. Liu, S. Zhu.
WindowGuard: Systematic
Protection of GUI Security in Android.
Proceedings of The Network and Distributed System Security Symposium (NDSS),
2017.
2016:
H. Huang, C. Zheng, J. Zeng, W. Zhou, S. Zhu, P. Liu, S. Chari, C. Zhang.
Android Malware Development on Public Malware
Scanning Platforms: A Large-scale Data-driven Study.
Proceedings of IEEE International Conference on Big Data, 2016 (A new
Android malware dataset released @ the result website)
Z. Xie, S. Zhu, Q.Li and W. Wang.
You Can Promote, But You Can’t Hide: Large-Scale
Abused App Detection in Mobile App Stores.
Proceedings of Annual Computer Security Applications Conference (ACSAC), 2016.
L. Luo, Y. Fu, D. Wu, S. Zhu and P. Liu.
Repackage-proofing Android Apps.
Proceedings of The 46th Annual IEEE/IFIP International Conference on Dependable
Systems and Networks (DSN), 2016.
Y. Yang, S. Zhu, and G. Cao.
Improving Sensor Network Immunity under Worm Attacks:
A Software Diversity Approach.
Ad-hoc Networks Journal.
Z. Tian, T. Liu, Q. Zheng, F. Tong, D. Wu, S. Zhu, and K. Chen..
Software Plagiarism Detection: A Survey.
(In Chinese)
Journal of Cyber Security, 2016.
2015:
H. Huang, S. Zhu, K. Chen and P. Liu.
From System Services Freezing to System Server
Shutdown in Android: All You Need Is a Loop in an Application.
Proceedings of the 22th ACM Conference on Computer and
Communications Security (CCS), 2015.
Z. Xu and S. Zhu.
SemaDroid: A Privacy-Aware Sensor Management Framework for
Smartphones.
Proceedings of The Fifth ACM Conference on Data and
Application Security and Privacy (CODASPY), 2015. (Outstanding paper
award)
H. Huang, K. Chen, C. Ren, P. Liu, S. Zhu and D. Wu.
Towards
Discovering and Understanding the Unexpected Hazards in Tailoring Antivirus
Software for Android.
Proceedings of ACM Symposium on Information,
Computer and Communications Security (ASIACCS), 2015.
Y. Jhi, X. Jia, X. Wang, S. Zhu, P. Liu, and D.
Wu.
Program
Characterization Using Runtime Values and Its Application to Software
Plagiarism Detection.
IEEE Transactions on Software Engineering (TSE),
2015.
2014:
X. Chen, J. Cho, and S. Zhu.
GlobalTrust: An Attack-Resilient Reputation System for Tactical
Networks.
Proceedings of 11th IEEE Conference on
Sensing and Communication in Wireless Networks (SECON), 2014.
2013:
Y. Chen, S. Zhu, H. Xu, and Y. Zhou.
Children’s
Exposure to Mobile In-App Advertising: An Analysis of Content Appropriateness.
Proceedings of The ASE/IEEE
International Conference on Social Computing (SocialCom),
2013.
Y. Chen, H. Xu, Y. Zhou and S. Zhu.
Is This App Safe for
Children? A Comparison Study of Maturity Ratings on Android and iOS
Applications.
Proceedings of the 22nd International
World Wide Web conference (
X. Chen, H. Patankar, S. Zhu, M. Srivatsa, J. Opper.
Zigzag: Partial
Mutual Revocation Based Trust Management in Tactical Ad Hoc Networks.
Proceedings of 10th IEEE Conference on
Sensing and Communication in Wireless Networks (SECON), 2013.
W. Xu, F. Zhang and S. Zhu.
JStill: Mostly Static Detection of Obfuscated Malicious
JavaScript Code.
Proceedings of Third ACM Conference on Data and
Application Security and Privacy (CODASPY), 2013.
T. Cheng, P. Li, S. Zhu, and D. Torrieri.
M-cluster
and X-ray: Two Methods for Multi-Jammer Localization in Wireless Sensor
Networks.
Journal of Integrated Computer-Aided Engineering (ICAE), 2013.
2012:
V. Natarajan, Y.
Yang and S. Zhu.
Secure Trust Metadata Management For
Mobile Ad-Hoc Networks.
Proceedings of The
Eighth International Conference on Information Systems Security (ICISS 2012).
W. Xu, F. Zhang and S. Zhu.
The Power of
Obfuscation Techniques in Malicious JavaScript Code: A Measurement Study.
Proceedings of MALWARE 2012.
Y. Chen, Y. Zhou, S. Zhu and H. Xu.
Detecting Offensive Languages in Social
Media to Protect Adolescent Online Safety.
Proceedings of The ASE/IEEE International Conference on Social
Computing (SocialCom), 2012.
Z. Xu and S. Zhu.
Abusing Notification
Services on Smartphones for Phishing and Spamming.
Proceedings of The 6th
USENIX Workshop on Offensive Technologies (WOOT), 2012.
Z. Xu, H. Hsu, X. Chen, S. Zhu and A. Hurson.
AK-PPM: An
Authenticated Packet Attribution Scheme for Mobile Ad Hoc Networks.
Proceedings of The 15th
International Symposium on Research in Attacks, Intrusions and Defenses (RAID),
2012.
Z. Xu, K. Bai, and S. Zhu.
TapLogger: Inferring
User Inputs on Smartphone Touchscreens Using On-board Motion Sensors.
Proceedings of The ACM Conference on Wireless
Network Security (WiSec), 2012.
C. Huang, S. Zhu, and D. Wu.
Towards
Trusted Services: Result Verification Schemes for MapReduce.
Proceedings of the IEEE/ACM International Symposium on Cluster,
Cloud and Grid Computing (CCGrid), 2012.
T. Cheng. P. Li, and S. Zhu.
An Algorithm
for Jammer Localization in Wireless Sensor Networks.
Proceedings of The 26th IEEE International
Conference on Advanced Information Networking and Applications (AINA),
2012.
V. Natarajan, S. Zhu, M. Srivatsa and J. Opper
Semantics-Aware Storage and Replication of Trust
Metadata in Mobile Ad-Hoc Networks.
Proceedings of The 26th IEEE International Conference on Advanced
Information Networking and Applications (AINA), 2012.
Y. Yang, M. Shao, S. Zhu, and G. Cao.
Towards Statistically Strong Source Anonymity for
Sensor Networks.
ACM Transaction on Sensor Networks (ToSN).
Q. Li, W. Gao, S. Zhu, and G. Cao.
To Lie or To Comply: Defending against Flood Attacks
in Disruption Tolerant Networks.
IEEE Transactions on Dependable and Secure Computing (TDSC).
2011:
T. Cheng, P. Li, and S. Zhu.
Multi-jammer Localization in Wireless Sensor
Networks.
Proceedings of International Conference on Computational
Intelligence and Security (CIS), 2011.
V. Natarajan, Y. Yi, and S. Zhu
Resource-Misuse Attack Detection in Delay-Tolerant
Networks.
Proceedings of International Performance Computing and
Communications Conference (IPCCC), 2011.
A. Chaugule, Z. Xu, and S. Zhu.
A
Specification Based Intrusion Detection Framework for Mobile Phones.
Proceedings of Applied Cryptography and Network Security (ACNS),
Spain, 2011.
Y. Jhi, X. Wang, X. Jia, S. Zhu, P. Liu, and D.
Wu.
Value-based
program characterization and its application to software plagiarism detection.
Proceedings of the 33rd International Conference on Software Engineering
(ICSE), Software Engineering in Practice Track, 2011.
Z. Xu, K. Bai, S. Zhu, L. Liu and R. Moulic.
Context-Related Access Control for Mobile Caching.
Proceedings of International Conference on Security and Privacy in
Communication Networks (Securecomm), 2011.
Z. Xin, H. Chen, X. Wang, P. Liu, S. Zhu and B. Mao.
Replacement Attacks on Behavior Based Software
Birthmark.
Proceedings of International Security Conference (ISC), 2011. (Best paper
award). Its journal version to appear in International Journal of Information
Security (IJIS).
D. He, J. Bu, S. Zhu, S. Chan, and C. Chen.
Distributed Access Control with Privacy Support in
Wireless Sensor Networks.
IEEE Transactions on Wireless Communications.
X. Jiang, W. Hu, S. Zhu, and G. Cao.
Compromise-Resilient Anti-Jamming for Wireless Sensor
Networks.
Wireless Networks (WINET).
Q. Li, S. Zhu and G. Cao.
A RoutingProtocol
for Socially Selfish Delay Tolerant Networks.
Ad Hoc Networks Journal.
2010:
B. Zhao, Z. Xu, C. Chi, S. Zhu, and G. Cao.
Mirroring Smartphones For Good: A Feasibility
Study.
Proceedings of the 7th International ICST Conference on Mobile and
Ubiquitous Systems: Computing, Networking and Services (Mobiquitous),
2010.
X. Jiang, W. Hu, S. Zhu, and G. Cao.
Compromise-Resilient
Anti-Jamming for Wireless Sensor Networks.
Proceedings of Twelfth International Conference on Information and
Communications Security (ICICS), 2010.
W. Xu, F. Zhang, and S. Zhu.
Toward Worm Detection in Online Social Networks.
Proceedings of 25th Annual Computer Security Applications Conference (ACSAC),
2010.
W. Chen, S. Zhu and Deying Li.
VAN:
Vehicle-Assisted Shortest-Time Path Navigation.
Proceedings of IEEE International Conference on Mobile Ad-hoc and Sensor
Systems (MASS'10), 2010.
D. Kong, Y. Jhi, Q. Pan, S. Zhu, P. Liu, and H.
Xi.
SAS: Semantics Aware Signature Generation for
Polymorphic Worm Detection.
Proceedings of International Conference on Security and Privacy in
Communication Networks (Securecomm), 2010.
Z. Xu and S. Zhu.
Filtering Offensive Language in Online
Communities using Grammatical Relations.
Proceedings of The Seventh Annual Collaboration, Electronic messaging,
Anti-Abuse and Spam Conference (CEAS'10) , 2010.
W. Xu, S. Zhu, and H. Xu.
COP:
A Step Toward Children Online Privacy.
Proceedings of Applied Cryptography and Network Security (ACNS), Beijing,
China, 2010.
L. Xie, X. Zhang, J. Seifert and S. Zhu.
pBMDS: A
Behavior-based Malware Detection System for Cellphone Devices.
Proceedings of The ACM Conference on Wireless Network Security (WiSec), Mar. 2010.
Q. Li, S. Zhu and G. Cao.
Routing in Socially Selfish Delay Tolerant Networks.
Proceedings of Infocom 2010, San Diego, CA.
H. Hsu, S. Zhu and A. Hurson.
A Hotspot-based Protocol for Attack Traceback in
Mobile Ad Hoc Networks.
Proceedings of ACM Symposium on Information, Computer and Communications
Security (AsiaCCS), Beijing, China, 2010. (short
paper)
2009:
X. Wang, Y. Jhi, S. Zhu and P. Liu.
Detecting
Software Theft via System Call Based Birthmarks.
Proceedings of 25th Annual Computer Security Applications Conference (ACSAC), Dec., 2009.
X. Wang, Y. Jhi, S. Zhu and P. Liu.
Behavior
Based Software Theft Detection .
Proceedings of 16th ACM Conference on Computer and Communications Security
(CCS), 2009.
Y. Yang, S. Zhu, G. Cao, and T. LaPorta.
An Active
Global Attack Model for Sensor Source Location Privacy: Analysis and
Countermeasures.
Proceedings of International Conference on Security and Privacy in
Communication Networks (Securecomm), 2009.
L. Xie, X. Zhang, A. Chaugule, T. Jaeger and S. Zhu
Designing System-level
Defenses against Cellphone Malware.
Proceedings of 28th IEEE International Symposium on Reliable Distributed
Systems (SRDS), 2009.
M. Shao, W. Hu, S. Zhu, G. Cao, S. Krishnamurthy, T. La Porta.
Cross-layer
Enhanced Source Location Privacy in Sensor Networks
Proceedings of the 6th IEEE Communications Society Conference on Sensor,
Mesh and Ad Hoc Communications and Networks (SECON 2009).
Z. Zhu, G. Cao, S. Zhu, S. Ranjan, A. Nucci.
A Social Network
Based Patching Scheme for Worm Containment in Cellular Networks.
Proceedings of IEEE INFOCOM, 2009.
B. Zhao, C. Chi, W. Gao, S. Zhu, G. Cao.
A Chain Reaction
DoS Attack on 3G Networks: Analysis and Defenses.
Proceedings of IEEE INFOCOM, 2009.
M. Shao, S. Zhu, W. Zhang, G. Cao, Y. Yang.
pDCS: Security and Privacy Support for Data-Centric Sensor
Networks.
IEEE
Transactions on Mobile Computing, Volume 8, Number 8,
August 2009.
W. Zhang, S. Zhu, and G. Cao
Predistribution and local collaboration-based group rekeying for wireless sensor
networks
Ad Hoc Networks, Volume 7, Issue 6, August 2009.
G. Ruan, S. Jain, and S. Zhu
SensorEar:
A Sensor Network Based Eavesdropping System
Workshop on
Embedded Systems and Communications Security, in conjunction with SRDS 2009.
H. Song,
S. Zhu, W. Zhang, and G. Cao.
Least
Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises
in Wireless Sensor Networks.
In ACM Transaction on Sensor Networks
(TOSN), Vol.4-4, Nov. 2008.
X. Wang, C. Pan, P. Liu, S. Zhu.
SigFree: A Signature-free Buffer Overflow Attack Blocker.
In IEEE
Transactions on Dependable and Secure Computing
(TDSC),
2008.
X. Wang, Y-C Jhi, S. Zhu, P. Liu.
STILL:
Exploit Code Detection via Static Taint and Initialization Analyses
Proceedings of 24th Annual Computer Security Applications Conference (ACSAC), Dec., 2008.
Liang Xie, Hui Song, Trent Jaeger and Sencun Zhu
Towards a Systematic Approach for
Cell-phone Worm Containment.
(Poster), Proc. 17th International World Wide Web Conference (WWW 2008),
Beijing, China, April 2008.
H. Xu, N. Irani, S. Zhu, and W. Xu.
Alleviating Parental Concerns for Children's
Online Privacy: A Value Sensitive Design Investigation.
Research in
Progress, Proceedings of 29th Annual International Conference on
Information Systems (ICIS 2008), Paris, France, Dec. 2008.
M. Shao, S. Zhu, G. Cao, T. La Porta and P.
Mohapatra.
A Cross-layer Dropping Attack in Video
Streaming over Ad Hoc Networks.
In Proc. of International Conference on Security and Privacy in Communication
Networks (Securecomm), 2008.
M. Masud, L. Khan, B. Thuraisingham, X. Wang, P. Liu and S. Zhu
A Data Mining
Technique to Detect Remote Exploits
The Fourth IFIP WG 11.9 International Conference on Digital Forensics, 2008.
Liang Xie, Hui Song, and Sencun Zhu
On the Effectiveness of Internal Patch Dissemination against
File-sharing Worms
Proceedings of Applied Cryptography and Network Security (ACNS), June, 2008. (best student paper award)
Liang Xie and Sencun Zhu
Message Dropping Attacks in Overlay Networks: Attack
Detection and Attacker Identification
In ACM
Transactions on Information and System Security (TISSEC), Volume 11 ,
Issue 3, 2008.
Y. Yang, X. Wang, S. Zhu, and G. Cao.
SDAP:
A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks.
In ACM
Transactions on Information and System Security (TISSEC), Volume 11 ,
Issue 4, July
2008.
Y. Yang, S. Zhu, and G. Cao.
Improving Sensor Network Immunity under Worm Attacks:
A Software Diversity Approach.
Proceedings of ACM Mobihoc, May 2008.
Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G.
Cao.
Towards Event Source Unobservability with Minimum
Network Traffic in Sensor Networks.
Proceedings of The ACM Conference on Wireless Network Security (WiSec), Mar. 2008.
M. Shao, Y. Yang, S. Zhu, and G. Cao.
Towards Statistically Strong Source Anonymity for
Sensor Networks.
Proceedings of IEEE Infocom, Mar. 2008.
H. Song, S. Zhu and G. Cao.
SVATS: A Sensor-network-based Vehicle Anti-Theft
System.
Proceedings of IEEE Infocom mini-conference, Mar. 2008.
Y. Yang,
X. Wang, S. Zhu, and G. Cao.
Distributed
Software-based Attestation for Node Compromise Detection in Sensor Networks
Proceedings of 26th IEEE International Symposium on Reliable Distributed
Systems (SRDS), Oct. 2007.
W. Zhang, M. Tran, S. Zhu, and G. Cao.
A Random
Perturbation-Based Scheme for Pairwise Key Establishment in Sensor Networks.
Proceedings of ACM Mobihoc'07, Sept. 2007.
H. Song, L. Xie, S. Zhu, and G. Cao.
Sensor Node Compromise Detection: The Location
Perspective.
in Proc. of International Wireless Communications and Mobile Computing
Conference (IWCMC), Aug. 2007.
H. Choi, S. Zhu, and T. Laporta.
SET: Detecting node clones in Sensor
Networks.
Proceedings of International Conference on
Security and Privacy in Communication Networks (SecureComm),
Sept. 2007.
M. Shao, S. Zhu, W. Zhang, and G. Cao.
pDCS: Security
and Privacy Support for Data-Centric Sensor Networks.
In Proc. of IEEE Infocom'07, May 2007.
Liang Xie and Sencun Zhu
A Feasibility
Study on Defending Against Ultra-Fast Topological Worms
Proceedings of The Seventh IEEE International Conference on Peer-to-Peer
Computing (P2P'07), Galway, Ireland, Sep. 2007.
P. Traynor, R. Kumar, H. Choi, G. Cao, S. Zhu, and T. La Porta,
Efficient Hybrid Security Mechanisms for Heterogeneous
Sensor Networks,
In IEEE
Transactions on Mobile Computing (TMC), Vol. 6, No.
6, pp. 663-677, June 2007.
Hungyuan Hsu, Sencun Zhu, and
Ali Hurson.
LIP:
A Lightweight Inter-layer Protocol for Preventing
Packet Injection Attacks in Mobile Ad Hoc Networks.
In International
Journal of Security and Networks (IJSN) Special Issue on "Cryptography in
Networks". 2(3/4):202-215,
2007
Qijun Gu, Peng Liu, Sencun
Zhu, and Chao-Chien Chu.
Defence against
Packet Injection Attacks in Unreliable Ad Hoc Networks.
International
Journal of Security and Networks 2007 - Vol. 2, No.1/2 pp. 154 - 169.
Sencun Zhu, Sanjeev Setia, Sushil Jajodia, and
Peng Ning
Interleaved Hop-by-Hop Authentication
Against False Data Injection Attacks in Sensor Networks.
in ACM
Transaction on Sensor Networks (TOSN), Aug. 2007.
(source code here)
2006:
X. Wang, C. Pan, P. Liu, S. Zhu.
SigFree: A Signature-free Buffer Overflow Attack Blocker.
Proceedings of USENIX Security'06, Aug.
2006. (Patented)
Liang Xie and Sencun Zhu
Message Dropping Attacks in Overlay Networks: Attack
Detection and Attacker Identification
Proceedings of International Conference on Security and Privacy in
Communication Networks (SecureComm), Aug., 2006.
Y. Yang, X. Wang, S. Zhu, and G. Cao.
SDAP:
A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks.
In Proc. of ACM MOBIHOC'06, May 2006.
Sencun Zhu, Cao Yao, Donggang Liu, Sanjeev
Setia, and Sushil Jajodia.
Efficient Security Mechanisms for Overlay Multicast-based Content Distribution.
In Elsevier
Journal of Computer Communications.
P. Traynor, H. Choi, G. Cao, S. Zhu, and T. La Porta.
Establishing Pair-Wise Keys In Heterogeneous Sensor Networks.
Proceedings of the 25th Annual IEEE Conference on Computer Communications
(INFOCOM'06), April 2006.
Pirretti, M., S. Zhu, V.
Narayanan, P. McDaniel, M. Kandemir, R. Brooks.
The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of
Defense.
In International
Journal of Distributed Sensor Networks, 2(3):267-287, 2006.
Qijun Gu, Chao Chu, Peng Liu,
Sencun Zhu.
Slander
Resistant Attacker Isolation in Ad Hoc Networks.
In Int.
J. Mobile Network Design and Innovation, Vol. 1, Nos. 3/4, 2006.
Sencun Zhu, Sanjeev Setia, Shouhuai Xu, and
Sushil Jajodia.
GKMPAN: An
Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks.
In Journal
of Computer Security (JCS), 2006.
Sencun Zhu, Sanjeev Setia, and Sushil Jajodia.
LEAP+: Efficient Security Mechanisms
for Large-Scale Distributed Sensor Networks.
In ACM
Transaction on Sensor Networks (TOSN), Nov. 2006
2005:
Sencun Zhu, Cao Yao, Donggang Liu, Sanjeev
Setia, and Sushil Jajodia.
Efficient
Security Mechanisms for Overlay Multicast-based Content Distribution.
In Proc. of Applied Cryptography and Network Security (ACNS)
conference, New York, June, 2005.
Hui Song, Sencun Zhu, and Guohong Cao..
Attack-Resilient
Time Synchronization for Wireless Sensor Networks.
In Proc. of IEEE International Conference on Mobile Ad-hoc
and Sensor Systems (MASS'05), 2005.
Pirretti, M., S. Zhu, V.
Narayanan, P. McDaniel, M. Kandemir, R. Brooks.
The
Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense.
In Proc. of the Innovations and Commercial Applications of
Distributed Sensor Networks Symposium (ICA DSN 2005). Washington, D.C. (Best
paper) October 18-19, 2005.
Wensheng Zhang, Hui Song, Sencun
Zhu, and Guohong Cao.
Least
Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises
in Wireless Sensor Networks.
In Proc. of ACM Mobihoc'05, May 2005.
D. Liu, P. Ning, S. Zhu, and S. Jajodia.
Practical
Broadcast Authentication in Sensor Networks.
In Proc. of the 2nd International Conference on Mobile and
Ubiquitous Systems (Mobiquitous'05), San Diego, Jul, 2005.
Qijun Gu, Peng Liu, Sencun
Zhu, and Chao-Chien Chu.
Defending
against Packet Injection Attacks in Unreliable Ad Hoc Networks.
In Proc. of IEEE Globecom 2005.
Qijun Gu, Chao Chu, Peng Liu,
Sencun Zhu.
Slander
Resistant Attacker Isolation in Ad Hoc Networks.
In Proceedings of the International Conference on Telecommunication
Systems, Modeling and Analysis (ICTSM 2005). Dallas, TX, November 17-20,
2005.
Yingjiu Li, Sencun Zhu, X. Sean
Wang, Sushil Jajodia.
Looking into the Seeds of Time: Discovering Temporal Patterns in
Large Transaction Sets
Elsevier
Journal Information Sciences, 2005.
Sencun Zhu, Shouhuai Xu, Sanjeev Setia and
Sushil Jajodia.
LHAP: A Lightweight Hop-by-Hop
Authentication Protocol For Ad-Hoc Networks.
In Elsevier
Ad Hoc Networks Journal, 2005.
2004:
Sencun Zhu, Sanjeev Setia, Shouhuai Xu, and
Sushil Jajodia.
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in
Ad-Hoc Networks.
In Proc. of the 1st ACM International Conference on Mobile and
Ubiquitous Systems (Mobiquitous'04), Boston, Massachusetts, August 22-25,
2004.
Sencun Zhu, Sanjeev Setia, Sushil Jajodia, and
Peng Ning
An
Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False
Data in Sensor Networks.
In Proc. of IEEE Symposium on Security and Privacy, Oakland,
California, May 2004.
Sencun Zhu, Sushil Jajodia.
Scalable group rekeying for secure multicast: A survey
In Proc. 5th International Workshop on Distributed Computing,
Springer Lecture Notes in Computer Science, Vol. 2918 (Samir R. Das and Sajal
K. Das editors), 2004, pages 1-10.
2003:
Sencun Zhu, Shouhuai Xu, Sanjeev Setia and
Sushil Jajodia.
LHAP: A Lightweight Hop-by-Hop
Authentication Protocol For Ad-Hoc Networks.
In Proc. of ICDCS 2003 International Workshop on Mobile and Wireless
Network (MWN 2003), May 2003
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, and
Sushil Jajodia.
Establishing
Pair-wise Keys For Secure Communication in Ad Hoc
Networks: A Probabilistic Approach.
In Proc. of the 11th IEEE International Conference on Network
Protocols (ICNP'03), Atlanta, Georgia, November 4-7, 2003.
Sencun
Zhu, Sanjeev Setia, and Sushil Jajodia.
Performance
Optimizations for Group Key Management Schemes for Secure Multicast.
In Proc. of the 23rd IEEE International Conference on Distributed
Computing Systems (ICDCS 2003), May 2003.
Sencun Zhu, Sanjeev Setia and Sushil Jajodia.
Adding
Reliable and Self-Healing Key Distribution to the Subset Difference Group
Rekeying Method for Secure Multicast.
In Proc. of Networked Group Communications (NGC 2003), Germany, Sep.
2003.
Sencun Zhu, Sanjeev Setia, and Sushil Jajodia.
LEAP:
Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks.
In Proc. of the 10th ACM Conference on Computer and Communications
Security (CCS '03), Washington D.C., October,
2003.
2002:
Sanjeev Setia, Sencun Zhu, and Sushil Jajodia.
A
Comparative Performance Analysis of Reliable Group Rekey Transport Protocols
for Secure Multicast.
In Performance
Evaluation, special issue Proceedings of Performance 2002 , Rome, Italy, Sep., 2002.
Y. Li, S. Zhu, L. Wang and S. Jajodia.
A Privacy Enhanced Microaggregation
Method.
In Proc. FoIKS 2002, pages 148-159, Salzau Castle, Germany, February 20-23, 2002.