Publications
C Conference Proceeding | J Journal Article | W Workshop Proceeding
Commercial hypervisor-based task sandboxing mechanisms are unsecured? But we can fix it!
Dongdong Huo, Chen Cao, Peng Liu, Yazhe Wang, Mingxuan Li, Zhen Xu
Journal of Systems Architecture, 2021. JReviewing IoT Security via Logic Bugs in IoT Platforms and Systems
Wei Zhou, Chen Cao, Dongdong Huo, Kai Cheng, Lan Zhang, Le Guan, Tao Liu, Yan Jia, Yaowen Zheng, Yuqing Zhang, Limin Sun, Yazhe Wang and Peng Liu
IEEE Internet of Things Journal, 2021. JDevice-agnostic Firmware Execution is Possible: A Concolic Execution Approach for Peripheral Emulation
Chen Cao, Le Guan, Jiang Ming and Peng Liu
ACSAC ‘20: Annual Computer Security Applications Conference
Austin, USA, December 2020. CProtecting Mobile Devices from Physical Memory Attacks with Targeted Encryption
Le Guan, Chen Cao, Sencun Zhu, Jingqiang Lin, Peng Liu, Yubin Xia and Bo Luo
The 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks, (WiSec)
Miami, USA, May 2019. CCryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices
Chen Cao, Le Guan, Ning Zhang, Jingqiang Lin, Bo Luo, Neng Gao, Peng Liu, Ji Xiang and Wenjing Lou
The 21st International Symposium on Research in Attacks, Intrusions and Defenses, (RAID)
Heraklion, Greece, September 2018. CBuilding a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM
Le Guan, Chen Cao, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu and Trent Jaeger
IEEE Transactions on Dependable and Secure Computing (TDSC), 2018. JAssessing the Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs
Chen Cao, Lunpin Yuan, Anoop Singhal, Peng Liu, Xiaoyan Sun, Sencun Zhu
IFIP International Conference on Database and Application Security and Privacy (DBSEC)
Bergamo, Italy, July 2018. CHey, you, keep away from my device: remotely implanting a virus expeller to defeat Mirai on IoT devices
Chen Cao, Le Guan, Peng Liu, Neng Gao, Jingqiang Lin, and Ji Xiang
The 1st International Workshop on Security and Privacy for the Internet-of-Things (IoTSec)
Orlando, USA, April 2018. WSystem service call-oriented symbolic execution of android framework with applications to vulnerability discovery and exploit generation
Lannan Luo*, Qiang Zeng*, Chen Cao, Kai Chen, Jian Liu, Limin Liu, Neng Gao, Min Yang, Xinyu Xing, Peng Liu
Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys)
Niagara Falls, USA, April 2017. CTowards analyzing the input validation vulnerabilities associated with android system services
Chen Cao, Neng Gao, Peng Liu, Ji Xiang
Proceedings of the 31st Annual Computer Security Applications Conference (ACSAC)
Los Angeles, USA, December 2015. CFunction escalation attack
Chen Cao, Yuqing Zhang, Qixu Liu, Kai Wang
10th International Conference on Security and Privacy in Communication Networks (SecureComm)
Beijing, China, September 2014. CDesign of the password-authenticated protocol based on mosaic image test
Tao He, Tianjie Cao, Chen Cao
International Conference on Computer Application and System Modeling (ICCASM)
Taiyuan, China, October 2010. CImproved three-party password-authenticated key exchange protocol
Chen Cao, and Yuhang Gao
Computer Engineering and Applications, 2010. (in Chinese) J