What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Kun Sun
Google Scholar
83
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack.
Ziqiang Wang
Xuewei Feng
Qi Li
Kun Sun
Yuxiang Yang
Mengyuan Li
Ganqiu Du
Ke Xu
Jianping Wu
2025
conf/ndss
ReDAN: An Empirical Study on Remote DoS Attacks against NAT Networks.
Xuewei Feng
Yuxiang Yang
Qi Li
Xingxiang Zhan
Kun Sun
Ziqiang Wang
Ao Wang
Ganqiu Du
Ke Xu
2025
conf/uss
DISPATCH: Unraveling Security Patches from Entangled Code Changes.
Shiyu Sun
Yunlong Xing
Xinda Wang
Shu Wang
Qi Li
Kun Sun
2025
conf/uss
TYPEPULSE: Detecting Type Confusion Bugs in Rust Programs.
Hung-Mao Chen
Xu He
Shu Wang
Xiaokuan Zhang
Kun Sun
2024
journals/tifs
Cactus: Obfuscating Bidirectional Encrypted TCP Traffic at Client Side.
Renjie Xie
Jiahao Cao
Yuxi Zhu
Yixiang Zhang
Yi He
Hanyi Peng
Yixiao Wang
Mingwei Xu
Kun Sun
Enhuan Dong
Qi Li
Menghao Zhang
Jiang Li
2024
journals/tifs
Condo: Enhancing Container Isolation Through Kernel Permission Data Protection.
Shouyin Xu
Yuewu Wang
Lingguang Lei
Kun Sun
Jiwu Jing
Siyuan Ma
Jie Wang
Heqing Huang
2024
conf/ccs
Dye4AI: Assuring Data Boundary on Generative AI Services.
Shu Wang
Kun Sun
Yan Zhai
2024
conf/ccs
Poster: Repairing Bugs with the Introduction of New Variables: A Multi-Agent Large Language Model.
Elisa Zhang
Shiyu Sun
Yunlong Xing
Kun Sun
2024
conf/ccs
Towards Fine-Grained Webpage Fingerprinting at Scale.
Xiyuan Zhao
Xinhao Deng
Qi Li
Yunpeng Liu
Zhuotao Liu
Kun Sun
Ke Xu
2024
conf/ccs
BlueSWAT: A Lightweight State-Aware Security Framework for Bluetooth Low Energy.
Xijia Che
Yi He
Xuewei Feng
Kun Sun
Ke Xu
Qi Li
2024
conf/uss
What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check.
Yunlong Xing
Shu Wang
Shiyu Sun
Xu He
Kun Sun
Qi Li
2024
conf/uss
Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities.
Yuhao Wu
Jinwen Wang
Yujie Wang
Shixuan Zhai
Zihan Li
Yi He
Kun Sun
Qi Li
Ning Zhang
2024
conf/asiaccs
BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning.
Xu He
Shu Wang
Pengbin Feng
Xinda Wang
Shiyu Sun
Qi Li
Kun Sun
2024
conf/ndss
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic.
Yuqi Qing
Qilei Yin
Xinhao Deng
Yihao Chen
Zhuotao Liu
Kun Sun
Ke Xu
Jia Zhang
Qi Li
2024
conf/ndss
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices.
Yue Xiao
Yi He
Xiaoli Zhang
Qian Wang
Renjie Xie
Kun Sun
Ke Xu
Qi Li
2024
conf/ndss
Compensating Removed Frequency Components: Thwarting Voice Spectrum Reduction Attacks.
Shu Wang
Kun Sun
Qi Li
2024
conf/ndss
Eavesdropping on Controller Acoustic Emanation for Keystroke Inference Attack in Virtual Reality.
Shiqing Luo
Anh Nguyen
Hafsa Farooq
Kun Sun
Zhisheng Yan
2024
conf/ndss
Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks.
Yuxiang Yang
Xuewei Feng
Qi Li
Kun Sun
Ziqiang Wang
Ke Xu
2024
conf/dsn
Bridging the Gap: A Study of AI-based Vulnerability Management between Industry and Academia.
Shengye Wan
Joshua Saxe
Craig Gomes
Sahana Chennabasappa
Avilash Rath
Kun Sun
Xinda Wang
2023
conf/ccs
BlueShift: Probing Adaptive Frequency Hopping in Bluetooth.
Tommy Chin
Noah Korzak
Kun Sun
2023
conf/uss
Cross Container Attacks: The Bewildered eBPF on Clouds.
Yi He
Roland Guo
Yunlong Xing
Xijia Che
Kun Sun
Zhuotao Liu
Ke Xu
Qi Li
2023
conf/uss
Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation.
Renjie Xie
Jiahao Cao
Enhuan Dong
Mingwei Xu
Kun Sun
Qi Li
Licheng Shen
Menghao Zhang
2023
conf/sp
Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects.
Xuewei Feng
Qi Li
Kun Sun
Yuxiang Yang
Ke Xu
2023
conf/sp
GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics.
Shu Wang
Xinda Wang
Kun Sun
Sushil Jajodia
Haining Wang
Qi Li
2023
conf/dsn
Enhancing Honeypot Fidelity with Real-Time User Behavior Emulation.
Songsong Liu
Shu Wang
Kun Sun
2022
journals/compsec
Enhancing malware analysis sandboxes with emulated user behavior.
Songsong Liu
Pengbin Feng
Shu Wang
Kun Sun
Jiahao Cao
2022
journals/tifs
Good Learning, Bad Performance: A Novel Attack Against RL-Based Congestion Control Systems.
Zijie Yang
Jiahao Cao
Zhuotao Liu
Xiaoli Zhang
Kun Sun
Qi Li
2022
conf/ccs
Ready Raider One: Exploring the Misuse of Cloud Gaming Services.
Guannan Liu
Daiping Liu
Shuai Hao
Xing Gao
Kun Sun
Haining Wang
2022
conf/uss
Exploring the Unchartered Space of Container Registry Typosquatting.
Guannan Liu
Xing Gao
Haining Wang
Kun Sun
2022
conf/uss
RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices.
Yi He
Zhenhua Zou
Kun Sun
Zhuotao Liu
Ke Xu
Qian Wang
Chao Shen
Zhi Wang
Qi Li
2022
conf/uss
Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks.
Xuewei Feng
Qi Li
Kun Sun
Zhiyun Qian
Gang Zhao
Xiaohui Kuang
Chuanpu Fu
Ke Xu
2022
conf/cns
SysCap: Profiling and Crosschecking Syscall and Capability Configurations for Docker Images.
Yunlong Xing
Jiahao Cao
Xinda Wang
Sadegh Torabi
Kun Sun
Fei Yan
Qi Li
2022
conf/ndss
PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP.
Xuewei Feng
Qi Li
Kun Sun
Ke Xu
Baojun Liu
Xiaofeng Zheng
Qiushi Yang
Haixin Duan
Zhiyun Qian
2021
journals/tifs
SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption.
Qiyang Song
Zhuotao Liu
Jiahao Cao
Kun Sun
Qi Li
Cong Wang
2021
conf/ccs
Locating the Security Patches for Disclosed OSS Vulnerabilities with Vulnerability-Commit Correlation Ranking.
Xin Tan
Yuan Zhang
Chenyuan Mi
Jiajun Cao
Kun Sun
Yifan Lin
Min Yang
2021
conf/ccs
A Hard Label Black-box Adversarial Attack Against Graph Neural Networks.
Jiaming Mu
Binghui Wang
Qi Li
Kun Sun
Mingwei Xu
Zhuotao Liu
2021
conf/asiaccs
See through Walls: Detecting Malware in SGX Enclaves with SGX-Bouncer.
Zeyu Zhang
Xiaoli Zhang
Qi Li
Kun Sun
Yinqian Zhang
Songsong Liu
Yukun Liu
Xiaoning Li
2021
conf/cns
HoneyBog: A Hybrid Webshell Honeypot Framework against Command Injection.
Songsong Liu
Pengbin Feng
Kun Sun
2021
conf/dsn
PatchDB: A Large-Scale Security Patch Dataset.
Xinda Wang
Shu Wang
Pengbin Feng
Kun Sun
Sushil Jajodia
2021
conf/acsac
Try before You Buy: Privacy-preserving Data Evaluation on Cloud-based Machine Learning Data Marketplace.
Qiyang Song
Jiahao Cao
Kun Sun
Qi Li
Ke Xu
2021
conf/wisec
Remotely controlling TrustZone applications?: a study on securely and resiliently receiving remote commands.
Shengye Wan
Kun Sun
Ning Zhang
Yue Li
2020
conf/ccs
Off-Path TCP Exploits of the Mixed IPID Assignment.
Xuewei Feng
Chuanpu Fu
Qi Li
Kun Sun
Ke Xu
2020
conf/ccs
Cache-in-the-Middle (CITM) Attacks: Manipulating Sensitive Data in Isolated Execution Environments.
Jie Wang
Kun Sun
Lingguang Lei
Shengye Wan
Yuewu Wang
Jiwu Jing
2020
conf/ccs
When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition.
Shu Wang
Jiahao Cao
Xu He
Kun Sun
Qi Li
2020
conf/cns
A Machine Learning Approach to Classify Security Patches into Vulnerability Types.
Xinda Wang
Shu Wang
Kun Sun
Archer L. Batcheller
Sushil Jajodia
2020
conf/cns
Towards a Believable Decoy System: Replaying Network Activities from Real System.
Jianhua Sun
Kun Sun
Qi Li
2020
conf/ndss
When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN.
Jiahao Cao
Renjie Xie
Kun Sun
Qi Li
Guofei Gu
Mingwei Xu
2020
conf/acsac
RusTEE: Developing Memory-Safe ARM TrustZone Applications.
Shengye Wan
Mingshen Sun
Kun Sun
Ning Zhang
Xu He
2019
journals/compsec
DangerNeighbor attack: Information leakage via postMessage mechanism in HTML5.
Chong Guan
Kun Sun
Lingguang Lei
Pingjian Wang
Yuewu Wang
Wei Chen
2019
conf/ccs
A Scalable High Fidelity Decoy Framework against Sophisticated Cyber Attacks.
Jianhua Sun
Songsong Liu
Kun Sun
2019
conf/uss
The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links.
Jiahao Cao
Qi Li
Renjie Xie
Kun Sun
Guofei Gu
Mingwei Xu
Yuan Yang
2019
conf/esorics
OCRAM-Assisted Sensitive Data Protection on ARM-Based Platform.
Dawei Chu
Yuewu Wang
Lingguang Lei
Yanchu Li
Jiwu Jing
Kun Sun
2019
conf/icics
UBER: Combating Sandbox Evasion via User Behavior Emulators.
Pengbin Feng
Jianhua Sun
Songsong Liu
Kun Sun
2019
conf/dsn
Detecting "0-Day" Vulnerability: An Empirical Study of Secret Security Patch in OSS.
Xinda Wang
Kun Sun
Archer L. Batcheller
Sushil Jajodia
2019
conf/dsn
SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM Processors.
Shengye Wan
Jianhua Sun
Kun Sun
Ning Zhang
Qi Li
2018
journals/tifs
Memory Forensic Challenges Under Misused Architectural Features.
Ning Zhang
Ruide Zhang
Kun Sun
Wenjing Lou
Y. Thomas Hou
Sushil Jajodia
2018
conf/acsac
A Measurement Study on Linux Container Security: Attacks and Countermeasures.
Xin Lin
Lingguang Lei
Yuewu Wang
Jiwu Jing
Kun Sun
Quan Zhou
2017
journals/tifs
Personal Information in Passwords and Its Security Implications.
Yue Li
Haining Wang
Kun Sun
2017
conf/ccs
Vulnerable Implicit Service: A Revisit.
Lingguang Lei
Yi He
Kun Sun
Jiwu Jing
Yuewu Wang
Qi Li
Jian Weng
2017
conf/cns
CyberMoat: Camouflaging critical server infrastructures with large scale decoy farms.
Jianhua Sun
Kun Sun
Qi Li
2017
conf/dsn
JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android.
Yacong Gu
Kun Sun
Purui Su
Qi Li
Yemian Lu
Lingyun Ying
Dengguo Feng
2016
conf/ccs
Privacy Breach by Exploiting postMessage in HTML5: Identification, Evaluation, and Countermeasure.
Chong Guan
Kun Sun
Zhan Wang
Wen Tao Zhu
2016
conf/sp
CaSE: Cache-Assisted Secure Execution on ARM Processors.
Ning Zhang
Kun Sun
Wenjing Lou
Yiwei Thomas Hou
2016
conf/eurosp
CacheKit: Evading Memory Introspection Using Cache Incoherence.
Ning Zhang
He Sun
Kun Sun
Wenjing Lou
Yiwei Thomas Hou
2015
journals/tifs
Reliable and Trustworthy Memory Acquisition on Smartphones.
He Sun
Kun Sun
Yuewu Wang
Jiwu Jing
2015
conf/ccs
TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens.
He Sun
Kun Sun
Yuewu Wang
Jiwu Jing
2015
conf/ccs
Now You See Me: Hide and Seek in Physical Address Space.
Ning Zhang
Kun Sun
Wenjing Lou
Yiwei Thomas Hou
Sushil Jajodia
2015
conf/sp
Using Hardware Features for Increased Debugging Transparency.
Fengwei Zhang
Kevin Leach
Angelos Stavrou
Haining Wang
Kun Sun
2015
conf/ndss
DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices.
Xueqiang Wang
Kun Sun
Yuewu Wang
Jiwu Jing
2015
conf/dsn
TrustICE: Hardware-Assisted Isolated Computing Environments on Mobile Devices.
He Sun
Kun Sun
Yuewu Wang
Jiwu Jing
Haining Wang
2014
conf/ccs
MTD 2014: First ACM Workshop on Moving Target Defense.
Sushil Jajodia
Kun Sun
2014
conf/ccs
Cloud-based user authentication with geo-temporal queries on smartphones.
Brian J. Choi
Kun Sun
Seonho Choi
2014
conf/ccs
Remotely wiping sensitive data on stolen smartphones.
Xingjie Yu
Zhan Wang
Kun Sun
Wen Tao Zhu
Neng Gao
Jiwu Jing
2014
conf/esorics
TrustDump: Reliable Memory Acquisition on Smartphones.
He Sun
Kun Sun
Yuewu Wang
Jiwu Jing
Sushil Jajodia
2013
conf/ccs
Verification of data redundancy in cloud storage.
Zhan Wang
Kun Sun
Jiwu Jing
Sushil Jajodia
2013
conf/cns
A moving target defense mechanism for MANETs based on identity virtualization.
Massimiliano Albanese
Alessandra De Benedictis
Sushil Jajodia
Kun Sun
2013
conf/dsn
SPECTRE: A dependable introspection framework via System Management Mode.
Fengwei Zhang
Kevin Leach
Kun Sun
Angelos Stavrou
2012
conf/ndss
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes.
Kun Sun
Jiang Wang
Fengwei Zhang
Angelos Stavrou
2012
conf/dsn
A dependability analysis of hardware-assisted polling integrity checking systems.
Jiang Wang
Kun Sun
Angelos Stavrou
2009
conf/wisec
Securing network access in wireless sensor networks.
Kun Sun
An Liu
Roger Xu
Peng Ning
W. Douglas Maughan
2006
conf/ccs
TinySeRSync: secure and resilient time synchronization in wireless sensor networks.
Kun Sun
Peng Ning
Cliff Wang
2006
conf/acsac
Secure Distributed Cluster Formation in Wireless Sensor Networks.
Kun Sun
Pai Peng
Peng Ning
Cliff Wang
2003
conf/ccs
Efficient self-healing group key distribution with revocation capability.
Donggang Liu
Peng Ning
Kun Sun
Coauthors
Alessandra De Benedictis
(1)
An Liu
(1)
Angelos Stavrou
(4)
Anh Nguyen
(1)
Ao Wang
(1)
Archer L. Batcheller
(2)
Avilash Rath
(1)
Baojun Liu
(1)
Binghui Wang
(1)
Brian J. Choi
(1)
Chao Shen
(1)
Chenyuan Mi
(1)
Chong Guan
(2)
Chuanpu Fu
(2)
Cliff Wang
(2)
Cong Wang
(1)
Craig Gomes
(1)
Daiping Liu
(1)
Dawei Chu
(1)
Dengguo Feng
(1)
Donggang Liu
(1)
Elisa Zhang
(1)
Enhuan Dong
(2)
Fei Yan
(1)
Fengwei Zhang
(3)
Gang Zhao
(1)
Ganqiu Du
(2)
Guannan Liu
(2)
Guofei Gu
(2)
Hafsa Farooq
(1)
Haining Wang
(6)
Haixin Duan
(1)
Hanyi Peng
(1)
He Sun
(5)
Heqing Huang
(1)
Hung-Mao Chen
(1)
Jia Zhang
(1)
Jiahao Cao
(10)
Jiajun Cao
(1)
Jiaming Mu
(1)
Jian Weng
(1)
Jiang Li
(1)
Jiang Wang
(2)
Jianhua Sun
(5)
Jianping Wu
(1)
Jie Wang
(2)
Jinwen Wang
(1)
Jiwu Jing
(12)
Joshua Saxe
(1)
Ke Xu
(14)
Kevin Leach
(2)
Kun Sun
(83)
Licheng Shen
(1)
Lingguang Lei
(6)
Lingyun Ying
(1)
Massimiliano Albanese
(1)
Menghao Zhang
(2)
Mengyuan Li
(1)
Min Yang
(1)
Mingshen Sun
(1)
Mingwei Xu
(5)
Neng Gao
(1)
Ning Zhang
(8)
Noah Korzak
(1)
Pai Peng
(1)
Peng Ning
(4)
Pengbin Feng
(5)
Pingjian Wang
(1)
Purui Su
(1)
Qi Li
(35)
Qian Wang
(2)
Qilei Yin
(1)
Qiushi Yang
(1)
Qiyang Song
(2)
Quan Zhou
(1)
Renjie Xie
(5)
Roger Xu
(1)
Roland Guo
(1)
Ruide Zhang
(1)
Sadegh Torabi
(1)
Sahana Chennabasappa
(1)
Seonho Choi
(1)
Shengye Wan
(5)
Shiqing Luo
(1)
Shixuan Zhai
(1)
Shiyu Sun
(4)
Shouyin Xu
(1)
Shu Wang
(12)
Shuai Hao
(1)
Siyuan Ma
(1)
Songsong Liu
(6)
Sushil Jajodia
(10)
Tommy Chin
(1)
W. Douglas Maughan
(1)
Wei Chen
(1)
Wen Tao Zhu
(2)
Wenjing Lou
(4)
Xiaofeng Zheng
(1)
Xiaohui Kuang
(1)
Xiaokuan Zhang
(1)
Xiaoli Zhang
(3)
Xiaoning Li
(1)
Xijia Che
(2)
Xin Lin
(1)
Xin Tan
(1)
Xinda Wang
(8)
Xing Gao
(2)
Xingjie Yu
(1)
Xingxiang Zhan
(1)
Xinhao Deng
(2)
Xiyuan Zhao
(1)
Xu He
(5)
Xueqiang Wang
(1)
Xuewei Feng
(8)
Y. Thomas Hou
(1)
Yacong Gu
(1)
Yan Zhai
(1)
Yanchu Li
(1)
Yemian Lu
(1)
Yi He
(7)
Yifan Lin
(1)
Yihao Chen
(1)
Yinqian Zhang
(1)
Yiwei Thomas Hou
(3)
Yixiang Zhang
(1)
Yixiao Wang
(1)
Yuan Yang
(1)
Yuan Zhang
(1)
Yue Li
(2)
Yue Xiao
(1)
Yuewu Wang
(11)
Yuhao Wu
(1)
Yujie Wang
(1)
Yukun Liu
(1)
Yunlong Xing
(5)
Yunpeng Liu
(1)
Yuqi Qing
(1)
Yuxi Zhu
(1)
Yuxiang Yang
(4)
Zeyu Zhang
(1)
Zhan Wang
(3)
Zhenhua Zou
(1)
Zhi Wang
(1)
Zhisheng Yan
(1)
Zhiyun Qian
(2)
Zhuotao Liu
(7)
Zihan Li
(1)
Zijie Yang
(1)
Ziqiang Wang
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to