North Carolina State University

General Info

Rank: #38 Worldwide
#27 in US
Papers: 70
Number of Researchers: 71
APA
(average papers per authors):
1.0
Country: USA

Activity Map

Contributors

  • Peng Ning (22 papers)
  • William Enck (14 papers)
  • Xuxian Jiang (13 papers)
  • Alexandros Kapravelos (9 papers)
  • Yajin Zhou (7 papers)
  • Bradley Reaves (7 papers)
  • Zhi Wang (6 papers)
  • Quan Chen (5 papers)
  • Douglas S. Reeves (4 papers)
  • Donggang Liu (3 papers)
  • Chiachih Wu (3 papers)
  • Alessandra Scafuro (3 papers)
  • Chongkyung Kil (3 papers)
  • Adwait Nadkarni (3 papers)
  • Samin Yaseer Mahmud (3 papers)
  • Dingbang Xu (2 papers)
  • Michael Grace (2 papers)
  • Yao Liu (2 papers)
  • Huaiyu Dai (2 papers)
  • Wenbo Shen (2 papers)
  • Luke Deshotels (2 papers)
  • Varun Madathil (2 papers)
  • Kun Sun (2 papers)
  • Keith Irwin (2 papers)
  • Ting Yu (2 papers)
  • Jun Xu (2 papers)
  • Emre Can Sezer (2 papers)
  • Ahmed Azab (2 papers)
  • Ruowen Wang (2 papers)
  • Tao Xie (2 papers)
  • Benjamin Andow (2 papers)
  • Justin Whitaker (2 papers)
  • Gregory T. Byrd (1 papers)
  • Christopher G. Healey (1 papers)
  • Robert St. Amant (1 papers)
  • Wu Zhou (1 papers)
  • Kunal Patel (1 papers)
  • Michael Meli (1 papers)
  • Matthew McNiece (1 papers)
  • Sheel Jayesh Shah (1 papers)
  • Anupam Das (1 papers)
  • Kyle Martin (1 papers)
  • Wenke Lee (1 papers)
  • Dong Xiang (1 papers)
  • Pai Peng (1 papers)
  • Xiaofan He (1 papers)
  • Jordan Beichler (1 papers)
  • Shaown Sarker (1 papers)
  • Yun Cui (1 papers)
  • Xinyuan Wang (1 papers)
  • Yan Zhai (1 papers)
  • Chris Bookholt (1 papers)
  • An Liu (1 papers)
  • Yuzheng Zhou (1 papers)
  • Andrew Meneely (1 papers)
  • Laurie Williams (1 papers)
  • Deepa Srinivasan (1 papers)
  • Lei Wu (1 papers)
  • Nikolaos Pantelaios (1 papers)
  • Rahul Pandita (1 papers)
  • Xusheng Xiao (1 papers)
  • Wei Yang (1 papers)
  • Sathvik Prasad (1 papers)
  • Elijah Bouma-Sims (1 papers)
  • Athishay Kiran Mylappan (1 papers)
  • Akhil Acharya (1 papers)
  • Sigmund Albert Gorski III (1 papers)
  • Seaver Thorn (1 papers)
  • Isaac Polinsky (1 papers)
  • Igibek Koishybayev (1 papers)
  • Aleksandr Nahapetyan (1 papers)

Papers

"Practical Experiences with ATM Encryption"

Gregory T. Byrd, ... -- NDSS 2001

"Information-Theoretic Measures for Anomaly Detection"

Wenke Lee, Dong Xiang, ... -- Oakland 2001

"Constructing attack scenarios through correlation of intrusion alerts"

Peng Ning, Yun Cui, Douglas S. Reeves, ... -- CCS 2002

"Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks"

Donggang Liu, Peng Ning, ... -- NDSS 2003

"Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays"

Xinyuan Wang, Douglas S. Reeves, ... -- CCS 2003

"Establishing pairwise keys in distributed sensor networks"

Donggang Liu, Peng Ning, ... -- CCS 2003

"Learning attack strategies from intrusion alerts"

Peng Ning, Dingbang Xu, ... -- CCS 2003

"Efficient self-healing group key distribution with revocation capability"

Donggang Liu, Peng Ning, Kun Sun, ... -- CCS 2003

"Building Attack Scenarios through Integration of Complementary Alert Correlation Method"

Peng Ning, Dingbang Xu, Christopher G. Healey, Robert St. Amant, ... -- NDSS 2004

"An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data Injection in Sensor Networks"

Peng Ning, ... -- Oakland 2004

"Prevent Attribute Information Leakage in Automated Trust Negotiation"

Keith Irwin, Ting Yu, ... -- CCS 2005

"Automatic Diagnosis and Response to Memory Corruption Vulnerabilities?"

Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris Bookholt, ... -- CCS 2005

"Non-Control-Data Attacks Are Realistic Threats"

Jun Xu, Emre Can Sezer, ... -- Usenix 2005

"On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques"

Pai Peng, Peng Ning, Douglas S. Reeves, ... -- Oakland 2006

"Packet Vaccine: Black-box Exploit Detection and Signature Generation"

Chongkyung Kil, ... -- CCS 2006

"TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks"

Kun Sun, Peng Ning, An Liu, Yuzheng Zhou, ... -- CCS 2006

"On the Modeling and Analysis of Obligations"

Keith Irwin, Ting Yu, ... -- CCS 2006

"MemSherlock: An Automated Debugger for Unknown Memory Corruption Vulnerabilities"

Emre Can Sezer, Peng Ning, Chongkyung Kil, ... -- CCS 2007

"False data injection attacks against state estimation in electric power grids"

Yao Liu, Peng Ning, ... -- CCS 2009

"Secure open source collaboration: an empirical study of linus' law"

Andrew Meneely, Laurie Williams, ... -- CCS 2009

"Countering kernel rootkits with lightweight hook protection"

Zhi Wang, Xuxian Jiang, Peng Ning, ... -- CCS 2009

"Mapping kernel objects to enable systematic integrity checking"

Xuxian Jiang, ... -- CCS 2009

"Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures"

Yao Liu, Peng Ning, Huaiyu Dai, ... -- Oakland 2010

"HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity"

Zhi Wang, Xuxian Jiang, ... -- Oakland 2010

"HyperSentry: enabling stealthy in-context measurement of hypervisor integrity"

Ahmed Azab, Peng Ning, Zhi Wang, Xuxian Jiang, ... -- CCS 2010

"SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures"

Xuxian Jiang, ... -- NDSS 2011

"Process Out-Grafting: An Efficient Out-of-VM Approach for Fine-Grained Process Execution Monitoring"

Deepa Srinivasan, Zhi Wang, Xuxian Jiang, ... -- CCS 2011

"SICE: A Hardware-Level Strongly Isolated Computing Environment for x86 Multi-core Platforms"

Ahmed Azab, Peng Ning, ... -- CCS 2011

"Systematic Detection of Capability Leaks in Stock Android Smartphones"

Michael Grace, Yajin Zhou, Zhi Wang, Xuxian Jiang, ... -- NDSS 2012

"Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets"

Yajin Zhou, Zhi Wang, Wu Zhou, Xuxian Jiang, ... -- NDSS 2012

"[SoK] Dissecting Android Malware: Characterization and Evolution"

Yajin Zhou, Xuxian Jiang, ... -- Oakland 2012

"Detecting Passive Content Leaks and Pollution in Android Applications"

Yajin Zhou, Xuxian Jiang, ... -- NDSS 2013

"Taming Hosted Hypervisors with (Mostly) Deprivileged Execution"

Chiachih Wu, Xuxian Jiang, ... -- NDSS 2013

"Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time"

Wenbo Shen, Peng Ning, Xiaofan He, Huaiyu Dai, ... -- Oakland 2013

"AppIntent: Analyzing Sensitive Data Transmission in Android for Privacy Leakage Detection"

Peng Ning, ... -- CCS 2013

"Preventing Accidental Data Disclosure in Modern Operating Systems"

Adwait Nadkarni, William Enck, ... -- CCS 2013

"Vetting Undesirable Behaviors in Android Apps with Permission Use Analysis"

Peng Ning, ... -- CCS 2013

"The Impact of Vendor Customizations on Android Security"

Lei Wu, Michael Grace, Yajin Zhou, Chiachih Wu, Xuxian Jiang, ... -- CCS 2013

"MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis"

Ruowen Wang, Peng Ning, Tao Xie, Quan Chen, ... -- Usenix 2013

"WHYPER: Towards Automating Risk Assessment of Mobile Applications"

Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie, ... -- Usenix 2013

"AirBag: Boosting Smartphone Resistance to Malware Infection"

Chiachih Wu, Yajin Zhou, Kunal Patel, Xuxian Jiang, ... -- NDSS 2014

"ARMlock: Hardware-based Fault Isolation for ARM"

Yajin Zhou, ... -- CCS 2014

"Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World"

Peng Ning, Quan Chen, Wenbo Shen, ... -- CCS 2014

"ASM: A Programmable Interface for Extending Android Security"

Adwait Nadkarni, William Enck, ... -- Usenix 2014

"EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning"

Ruowen Wang, William Enck, Douglas S. Reeves, Peng Ning, ... -- Usenix 2015

"Cloak of Visibility: Detecting When Machines Browse a Different Web"

Alexandros Kapravelos, ... -- Oakland 2016

"SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles"

Luke Deshotels, William Enck, ... -- CCS 2016

"Practical DIFC Enforcement on Android"

Adwait Nadkarni, Benjamin Andow, William Enck, ... -- Usenix 2016

"TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub"

Alessandra Scafuro, ... -- NDSS 2017

"Sonar: Detecting SS7 Redirection Attacks With Audio-Based Distance Bounding"

Bradley Reaves, ... -- Oakland 2018

"Mystique: Uncovering Information Leakage from Browser Extensions"

Quan Chen, Alexandros Kapravelos, ... -- CCS 2018

"How Bad Can It Git? Characterizing Secret Leakage in Public GitHub Repositories"

Michael Meli, Matthew McNiece, Bradley Reaves, ... -- NDSS 2019

"PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play"

Benjamin Andow, Samin Yaseer Mahmud, Justin Whitaker, William Enck, Bradley Reaves, ... -- Usenix 2019

"Everyone is Different: Client-side Diversification for Defending Against Extension Fingerprinting"

Alexandros Kapravelos, ... -- Usenix 2019

"Kobold: Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS"

Luke Deshotels, Jordan Beichler, William Enck, ... -- Oakland 2020

"You’ve Changed: Detecting Malicious Browser Extensions through their Update Deltas"

Nikolaos Pantelaios, Alexandros Kapravelos, ... -- CCS 2020

"Who's Calling? Characterizing Robocalls through Audio and Metadata Analysis"

Sathvik Prasad, Elijah Bouma-Sims, Athishay Kiran Mylappan, Bradley Reaves, ... -- Usenix 2020

"Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck"

Samin Yaseer Mahmud, Justin Whitaker, William Enck, Bradley Reaves, ... -- Usenix 2020

"Cardpliance: PCI DSS Compliance of Android Applications"

Samin Yaseer Mahmud, Akhil Acharya, William Enck, Bradley Reaves, ... -- Usenix 2020

"Hey Alexa, is this Skill Safe?: Taking a Closer Look at the Alexa Skill Ecosystem"

Sheel Jayesh Shah, Anupam Das, William Enck, ... -- NDSS 2021

"Favocado: Fuzzing Binding Code of JavaScript Engines Using Semantically Correct Test Cases"

Kyle Martin, Alexandros Kapravelos, ... -- NDSS 2021

"CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing"

Shaown Sarker, Alexandros Kapravelos, ... -- Oakland 2021

"Detecting Filter List Evasion with Event-Loop-Turn Granularity JavaScript Signatures"

Quan Chen, Alexandros Kapravelos, ... -- Oakland 2021

"On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols"

Varun Madathil, Alessandra Scafuro, ... -- Oakland 2021

"Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets"

Quan Chen, Alexandros Kapravelos, ... -- Usenix 2021

"PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems"

William Enck, ... -- Usenix 2021

"FReD: Identifying File Re-Delegation in Android System Services"

Sigmund Albert Gorski III, Seaver Thorn, William Enck, ... -- Usenix 2022

"ALASTOR: Reconstructing the Provenance of Serverless Intrusions"

Isaac Polinsky, William Enck, ... -- Usenix 2022

"Private Signaling"

Varun Madathil, Alessandra Scafuro, ... -- Usenix 2022

"Characterizing the Security of Github CI Workflows"

Igibek Koishybayev, Aleksandr Nahapetyan, Bradley Reaves, Alexandros Kapravelos, ... -- Usenix 2022