Security-as-a-service for microservices-based cloud applications Y Sun, S Nanda, T Jaeger 2015 IEEE 7th International Conference on Cloud Computing Technology and …, 2015 | 125 | 2015 |
Audroid: Preventing attacks on audio channels in mobile devices G Petracca, Y Sun, T Jaeger, A Atamli Proceedings of the 31st Annual Computer Security Applications Conference …, 2015 | 79 | 2015 |
Systems and Methods for Monitoring Virtual Networks S Nanda, Y Sun US Patent US20160191545 A1, 2016 | 64 | 2016 |
Learning context-aware policies from multiple smart homes via federated multi-task learning T Yu, T Li, Y Sun, S Nanda, V Smith, V Sekar, S Seshan 2020 IEEE/ACM Fifth International Conference on Internet-of-Things Design …, 2020 | 52 | 2020 |
Looking from the Mirror: Evaluating IoT Device Security through Mobile Companion Apps X Wang, Y Sun, S Nanda, XF Wang 28th USENIX Security Symposium (USENIX Security 19), 1151-1167, 2019 | 48 | 2019 |
Security Namespace: Making Linux Security Frameworks Available to Containers Y Sun, D Safford, M Zohar, D Pendarakis, Z Gu, T Jaeger 27th USENIX Security Symposium (USENIX Security 18), 2018 | 48 | 2018 |
Cloud verifier: Verifiable auditing service for IaaS clouds J Schiffman, Y Sun, H Vijayakumar, T Jaeger 2013 IEEE Ninth World Congress on Services, 239-246, 2013 | 45 | 2013 |
AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings. G Petracca, A Atamli-Reineh, Y Sun, J Grossklags, T Jaeger USENIX Security Symposium, 379-396, 2017 | 37 | 2017 |
Pileus: Protecting user resources from vulnerable cloud services Y Sun, G Petracca, X Ge, T Jaeger Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016 | 17 | 2016 |
Sketchlib: Enabling efficient sketch-based monitoring on programmable switches H Namkung, Z Liu, D Kim, V Sekar, P Steenkiste, G Liu, A Li, C Canel, ... 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2022 | 13 | 2022 |
Inevitable failure: The flawed trust assumption in the cloud Y Sun, G Petracca, T Jaeger Proceedings of the 6th edition of the ACM Workshop on Cloud Computing …, 2014 | 13 | 2014 |
Cloud armor: Protecting cloud commands from compromised cloud services Y Sun, G Petracca, T Jaeger, H Vijayakumar, J Schiffman 2015 IEEE 8th International Conference on Cloud Computing, 253-260, 2015 | 12 | 2015 |
EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs G Petracca, Y Sun, AA Reineh, P McDaniel, J Grossklags, T Jaeger 28th USENIX Security Symposium (USENIX Security 19), 567-584, 2019 | 8 | 2019 |
Aware: Controlling app access to I/O devices on mobile platforms G Petracca, A Atamli, Y Sun, J Grossklags, T Jaeger arXiv preprint arXiv:1604.02171, 2016 | 7 | 2016 |
改进的直接匿名认证方案 宋成, 孙宇琼, 彭维平, 罗守山, 辛阳, 胡正名 北京邮电大学学报 34 (3), 62-65, 2011 | 7 | 2011 |
Decrypting network traffic on a middlebox device using a trusted execution environment Y Sun, D Marino, SK Nanda, S Shintre, BT Witten, RA Frederick, Q Li US Patent 10,447,663, 2019 | 6 | 2019 |
Improved direct anonymous attestation scheme S Cheng, XUN Yu-Qiong, P Wei-Beng, LUO Shou-Shan, XIN Yang Journal of Beijing University of Posts and Telecommunications 34 (3), 62, 2011 | 4 | 2011 |
RADAR: A robust behavioral anomaly detection for IoT devices in enterprise networks T Yu, Y Sun, S Nanda, V Sekar, S Seshan Technical Report CMU-CyLab-19-003, Carnegie Mellon University, 2019 | 3 | 2019 |
可信虚拟平台中的双AIK签名机制 孙宇琼, 宋成, 辛阳, 蒋辉柏, 杨义先 计算机工程 37 (16), 114-116, 2011 | 3 | 2011 |
Dual AIK signing mechanism on trusted virtualization platform YQ Sun, C Song, Y Xin, HB Jiang, YX Yang Jisuanji Gongcheng/ Computer Engineering 37 (16), 2011 | 3 | 2011 |