Kailiang Ying, Amit Ahlawat, Bilal Alsharifi, Yuexin Jiang, Priyank Thavai, and Wenliang Du.
TruZ-Droid: Integrating TrustZone with Mobile Operating System.
In Proceedings of The 16th ACM International Conference on Mobile Systems, Applications,
and Services (MobiSys 2018). June 10 - 15, 2018. Munich, Germany.
[Yousra Aafer, Nan Zhang] co-first author, Zhongwen Zhang, Xiao Zhang,
Kai Chen, XiaoFeng Wang, Xiaoyong Zhou, Wenliang Du, and Michael Grace.
Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References.
In Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS),
Denver, Colorado, USA. October 12-16, 2015.
Xing Jin, Tongbo Luo, Derek G. Tsui, and Wenliang Du.
Code Injection Attacks on HTML5-based Mobile Apps.
See additional information, including attack demonstration,
from this web site.
A shorter version of this paper appears in
Proceedings of the Mobile Security Technologies (MoST) workshop, May 16, 2014.
(Bib)
Xiao Zhang and Wenliang Du.
Attacks on Android Clipboard.
In Proceedings of the 11th Conference on Detection of Intrusions and
Malware & Vulnerability Assessment (DIMVA), Egham, UK. July 10-11, 2014.
(Bib)
Yifei Wang, Srinivas Hariharan, Chenxi Zhao, Jiaming Liu, Wenliang Du.
Compac: Enforce Component-Level Access Control in Android.
In Proceedings of the 4th ACM Conference on Data and Application Security and
Privacy (CODASPY).
San Antonio, TX, USA.
March 3-5, 2014.
(Bib)
Tongbo Luo, Xing Jin, and Wenliang Du.
Mediums: Visual Integrity Preserving Framework.
In Proceedings of the 3rd ACM Conference on Data and Application
Security and Privacy (CODASPY), Feb 18-20, 2013. San Antonio, TX, USA.
Tongbo Luo, Hao Hao, Wenliang Du, Yifei Wang, and Heng Yin.
Attacks on WebView in the Android System.
In Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC),
Orlando, Florida, USA. December 5-9, 2011.
(Bib)
Wenliang Du, Xi Tan, Tongbo Luo, Karthick Jayaraman, and Zutao Zhu.
Re-designing the Web's Access Control System.
Invited Talk. In Proceedings of the 25th Annual WG 11.3 Conference on Data and
Applications Security and Privacy (DBSec'11), Richmond, Virginia USA.
July 11-13, 2011.
(Bib)
Karthick Jayaraman, Wenliang Du, Balamurugan Rajagopalan, and Steve J. Chapin
.
Escudo: A Fine-grained Protection Model for Web Browsers.
In ICDCS: The 30th International Conference on Distributed
Computing Systems, Genoa, Italy, June 21-25, 2010.
(Acceptance ratio 14.4%=84/585).
(Bib)
Zutao Zhu and Wenliang Du.
K-anonymous Association Rule Hiding (short paper).
In the ACM Symposium on Information, Computer and Communications Security.
Beijing, China, April 13-16, 2010.
Wenliang Du, David Eppstein, Michael Goodrich and George Lueker.
On the Approximability of Geometric and Geographic Generalization and the
Min-Max Bin Covering Problem.
In Algorithms and Data Structres Symposium (WADS), 21-23 Auguest, 2009.
Banff Conference Centre, Banff, Alberta, Canada.
Guan Wang, Zutao Zhu, Wenliang Du, and Zhouxuan Teng.
Inference Analysis in Privacy-Preserving Data Re-publishing.
In the 8th IEEE International Conference on Data Mining (ICDM),
Pisa, Italy, Dec. 15-19, 2008 (short paper). (Acceptance ratio: 20% = 144/724).
Zhengli Huang, Wenliang Du, and Zhouxuan Teng.
Searching for Better Randomized Response Schemes for
Privacy-Preserving Data Mining.
In the 11th European Conference on Principles and
Practice of Knowledge Discovery in Databases (PKDD).
September 17 - 21, 2007. Warsaw, Poland.
Pages 487-497.
Zhouxuan Teng and Wenliang Du.
A Hybrid Multi-Group Privacy Preserving Approach for Building Decision Trees.
In Knowledge and Information Systems (KAIS), Springer London, August 2008.
Zhengli Huang, Wenliang Du, and Biao Chen.
Deriving Private Information from Randomized Data.
In Proceedings of the ACM SIGMOD Conference,
June 14-16, 2005, Baltimore, Maryland, USA. Pages 37-48
(Acceptance ratio 15.3% = 66/431).
(Slides)
(Bib).
Huseyin Polat, Wenliang Du, Sahin Renckes, and Yusuf Oysal.
Private predictions on hidden Markov models.
In the Artificial Intelligence Review,
Volume 34 Issue 1, June 2010.
Huseyin Polat and Wenliang Du.
Privacy-Preserving Top-N Recommendation on Distributed Data.
In the Journal of the American Society for Information
Science and Technology, Volume 59, Issue 7, Pages 1093 - 1108. March, 2008.
Huseyin Polat and Wenliang Du.
Privacy-Preserving Collaborative Filtering.
In the International Journal of Electronic Commerce (IJEC),
pages 9-35. Volume 9, Number 4, Summer 2005.
Huseyin Polat and Wenliang Du.
Effects of Inconsistently Masked Data Using RPT on
CF with Privacy. In the 22nd Annual ACM Symposium on Applied Computing,
Track on E-commerce Technologies. Seoul, Korea, March 11-15, 2007.
Huseyin Polat and Wenliang Du.
Privacy-Preserving Collaborative Filtering on Vertically Partitioned Data.
In Proceedings of the 9th European Conference on Principles and
Practice of Knowledge Discovery in Databases (PKDD) (short paper).
Porto, Portugal, October 3-7, 2005. Pages 651-658.
Huseyin Polat and Wenliang Du.
SVD-based Collaborative Filtering with Privacy.
In The 20th ACM Symposium on Applied Computing,
Track on E-commerce Technologies. Pages 791-795.
Santa Fe, New Mexico, USA.
March 13-17, 2005.
Wenliang Du and Zhijun Zhan.
Building Decision Tree Classifier on Private Data.
In Workshop on Privacy, Security, and Data Mining at
The 2002 IEEE International Conference on Data Mining (ICDM'02)
December 9, 2002, Maebashi City, Japan.
Wenliang Du, Jing Deng, Yunghsiang S. Han, and Pramod Varshney.
A Key Predistribution Scheme for Sensor Networks Using Deployment
Knowledge.
In IEEE Transactions on Dependable and Secure Computing,
Volume 3, Number 2, January-March 2006. Pages 62-77.
This paper is an extended version of the INFOCOM'04 paper.
Wenliang Du, Lei Fang and Peng Ning.
LAD: Localization Anomaly Detection for Wireless Sensor Networks
.
In The Journal of Parallel and Distributed Computing (JPDC).
Volume 66, Issue 7, July 2006. Pages 874-886.
This paper is the journal verision of the IPDPS'05 paper.
Kaiqi Xiong, Ronghua Wang, Wenliang Du, and Peng Ning,
Containing Bogus Packet Insertion Attacks for Broadcast Authentication in Sensor Networks.
In ACM Transactions on Sensor Networks,
Volume 8 Issue 3, July 2012.
Donggang Liu, Peng Ning, and Wenliang Du.
Group-Based Key Pre-Distribution in Wireless Sensor Networks.
In ACM Transactions on Sensor Networks (TOSN), Vol. 4, No. 2,
pages 11:1--11:30, March 2008.
Donggang Liu, Peng Ning, An Liu, Cliff Wang, Wenliang Du,
Attack-Resistant Location Estimation in Wireless Sensor Networks.
In ACM Transactions in Information and Systems Security (TISSEC),
Vol. 11, No. 4, pages 1--39, July 2008.
Wenliang Du, Ronghua Wang, and Peng Ning.
An Efficient Scheme for
Authenticating Public Keys in Sensor Networks.
In Proceedings of The 6th ACM International Symposium on Mobile Ad Hoc
Networking and Computing (MobiHoc), May 25-28, 2005.
Urbana-Champaign, Illinois, USA. Pages 58-67.
(Acceptance ratio 14.2% = 40/281)
(Slides)
(Bib).
Wenliang Du, Lei Fang and Peng Ning.
LAD: Localization Anomaly Detection for Wireless Sensor Networks.
In The 19th International Parallel and Distributed
Processing Symposium (IPDPS),
Best Paper Award in the Algorithm track.
April 4-8, 2005, Denver, Colorado, USA.
(Slides)
(Bib).
This paper is invited to submit to
The Journal of Parallel and Distributed Computing (JPDC).
Donggang Liu, Peng Ning and Wenliang Du.
Attack-Resistant Location Estimation in Sensor Networks.
In Proceedings of The Fourth International Conference on
Information Processing in Sensor Networks (IPSN).
Pages 99--106, April 2005. Pages 99-106.
Wenliang Du, Jing Deng, Yunghsiang S. Han, and Pramod Varshney.
A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks.
In Proceedings of the 10th ACM Conference on Computer and Communications
Security (CCS), Washington DC, October 27-31, 2003. Pages 42-51.
(Acceptance ratio 13.9% = 35/252).
(Slides)
(Bib).
Wenliang Du, Lei Fang, Ronghua Wang, and Shigang Chen.
Key Pre-Distribution Using Sensor Pre-Deployment Knowledge.
Peer reviewed poster session in
ACM Workshop on Wireless Security (WiSe),
in conjunction with ACM MobiCom 2003. San Diego, CA, USA.
September 19, 2003.
Wenliang Du, Lei Fang, Peng Ning.
Beaconless Location Discovery in Wireless Sensor Networks.
In Cliff Wang, Radha Poovendran, Sumit Roy (Eds),
Secure Localization and Time Synchronization for Wireless Sensor and
Ad Hoc Networks, Springer, 2007.
Peng Ning, Donggang Liu, Wenliang Du.
Secure and Resilient Location Discovery in Wireless Sensor Networks.
In Cliff Wang, Radha Poovendran, Sumit Roy (Eds),
Secure Localization and Time Synchronization for Wireless Sensor and
Ad Hoc Networks, Springer, 2007.
Kapil Borle, Biao Chen, and Wenliang Du.
A physical layer authentication scheme for countering primary user emulation attack.
In Proceedings of IEEE International Conference on
Acoustics, Speech and Signal Processing (ICASSP), May 26-31, 2013. Page 2935-2939.
Ninghui Li, Wenliang Du, and Dan Boneh.
Oblivious Signature-based Envelope.
In 22nd ACM Symposium on Principles of Distributed Computing (PODC 2003).
Boston, Massachusetts. July 13-16, 2003. Pages 182-189.
(Acceptance ratio 16.3% = 34/208).
(Slides)
(Bib).
This paper is invited to submit to
Springer-Verlag's journal Distributed Computing.
Wenliang Du, Jing Jia, Manish Mangal and Mummoorthy Murugesan.
Uncheatable Grid Computing
(Provisional patent were filed for the contents of this paper).
In The 24th International Conference on Distributed Computing
Systems (ICDCS'04), March 23-26, 2004, Tokyo, Japan.
Pages 4-11. (Acceptance ratio 17.7% = 84/475)
(Bib).
Shigang Chen, Yong Tang, and Wenliang Du.
Stateful DDoS Attacks and Targeted Filtering.
Accepted by Journal of Network and Computer Applications,
Special Issue on Distributed Denial of Service and Intrusion Detection,
2005/2006.
Haizhi Xu, Steve J. Chapin, and Wenliang Du.
Detecting Exploit Code Execution in Loadable Kernel Modules.
In ACSAC'04: the 20th Annual Computer Security Applications
Conference.
Tucson, Arizona, USA. December 6-10, 2004.
(Acceptance ratio 26%=35/134).
Wenliang Du and Mikhail J. Atallah.
Privacy-Preserving Cooperative Statistical Analysis.
In 2001 ACSAC: Annual Computer Security Applications Conference.
December 10-14, 2001, New Orleans, Louisiana, USA. Pages 102-110.
(PDF)
Mikhail J. Atallah and Wenliang Du.
Secure Multi-Party Computational Geometry.
In
Lecture Notes in Computer Science, 2125, Springer Verlag.
Proceedings of 7th International Workshop on Algorithms and Data Structures (WADS 2001),
August, 8-10, 2001, Providence, Rhode Island, USA. Pages 165-179.
(PDF)
Wenliang Du and Aditya P. Mathur.
Testing for Software Vulnerability Using Environment Perturbation,In Workshop On Dependability Versus Malicious Faults,
International Conference on Dependable Systems and Networks (DSN 2000),
pp. 603-612. June 25-28 2000, New York City, NY, USA. Pages 603-612.
(PDF)
Wenliang Du, Praerit Garg and Aditya P. Mathur.
Security Relevancy Analysis On The Registry Of Windows NT 4.0,In Proceeding of the 15th Annual Computer
Security Applications Conference (ACSAC'99), pp. 331-340.
December 6-10, 1999, Phoenix, Arizona, USA. Pages 331-340.
(PDF)
,
In Proceeding of the 21st National Information
Systems Security Conference (NISSC'98), Crystal City, VA, 1998.
(PDF)
Yi Deng, Wenliang Du, Paul C. Attie, and Michael Evangelist. A Formalism
for Architectural Modeling of Concurrent Real-Time Systems,
In Proceeding of the 8th International Conference on Software Engineering and
Knowledge Engineering (SEKE'96).