Ziming Zhao
Ziming Zhao
2019 Submissions
Journal Paper
Hu, Hongxin, et al. "Towards a Reliable Firewall for Software-Defined Networks." Computers & Security (COSE). (2019) Print. *
Chen, Jing, et al. "Semantics-Aware Privacy Risk Assessment Using Self-Learning Weight Assignment for Mobile Apps." IEEE Transactions on Dependable and Secure Computing (TDSC). (2019) Print. *
Published Conference Proceedings
Kokulu, Faris Bugra, et al. "Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues." Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS). London, UK: n.p., 2019. Print. «
Tu, Huahong, et al. "Users Really Do Answer Telephone Scams." Proceedings of the USENIX Security Symposium (SECURITY). San Jose, CA: n.p., 2019. Print. «
Sun, Zhibo, et al. "Understanding and Predicting Private Interactions in Underground Forums." Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY). n.p., 2019. Print. «
Medrano, Carlos Rubio, et al. "Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies." Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT). n.p., 2019. Print. «
Zhang, Penghui, et al. "iCORE: Continuous and Proactive Extrospection on Multi-core IoT Devices." Proceedings of the ACM/SIGAPP Symposium On Applied Computing (SAC). n.p., 2019. Print. «
Lamp, Josephine, et al. "ExSol: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems." Proceedings of the IEEE Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES). Ed. N/A. N/A, N/A: n.p., 2019. Print. «
2018 Submissions
Journal Paper
Chen, Jing, et al. "Uncovering the Face of Android Ransomware: Characterization and Real-time Detection." IEEE Transactions on Information Forensics & Security (TIFS). (2018): 0-0. Print. *
Published Conference Proceedings
Baek, Jaejong, et al. "Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling." Proceedings of the Annual Computer Security Applications Conference (ACSAC). Ed. N/A. N/A, Puerto Rico: n.p., 2018. Print. «
Dixit, Vaibhav Hemant, et al. "AIM-SDN: Attacking Information Mismanagement in SDN-datastores." Proceedings of the ACM Conference on Computer and Communications Security (CCS). Ed. N/A. n.p., 2018. Print. *
Cho, Haehyun, et al. "Prime+Count: Novel Cross-world Covert Channels on ARM TrustZone." Proceedings of the Annual Computer Security Applications Conference (ACSAC). Ed. N/A. n.p., 2018. Print. «
Coughlin, Vu, et al. "EDSGuard: Enforcing Network Security Requirements for Energy Delivery Systems." Proceedings of the IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm). Ed. N/A. N/A, N/A: n.p., 2018. Print. «
Gutierrez, Mauricio, et al. "CacheLight: Defeating the CacheKit Attack." Proceedings of the Workshop on Attacks and Solutions in Hardware Security (Ashes). Ed. N/A. n.p., 2018. Print. «
Mabey, Mike, et al. "Challenges, Opportunities, and a Framework for Web Environment Forensics." Proceedings of the IFIP Working Group 11.9 Digital Forensics (11.9 Digital Forensics). Ed. N/A. n.p., 2018. Print. «
Chandramouli, Sai Prashanth, et al. "Measuring E-Mail Header Injections on the World Wide Web." Proceedings of the ACM/SIGAPP Symposium On Applied Computing (SAC). Ed. N/A. n.p., 2018. Print. «
Lamp, Josephine, et al. "The Danger of Missing Instructions: A Systematic Analysis of Security Requirements for MCPS." Proceedings of the International Workshop on Security, Privacy, and Trustworthiness in Medical Cyber-Physical Systems (MedSPT). Ed. N/A. Washington, DC: n.p., 2018. Print. «
Medrano, Carlos Rubio, Ziming Zhao, and Gail-Joon Ahn. "RiskPol: A Risk Assessment Framework for Preventing Attribute-Forgery Attacks to ABAC Policies." Proceedings of the ACM Workshop on Attribute Based Access Control (ABAC). Ed. N/A. Tempe, AZ: AMC, 2018. Print. «
Dixit, Vaibhav Hemant, et al. "Challenges and Preparedness of SDN-based Firewalls." Proceedings of the ACM Workshop on Security in Software Defined Networks and Network Function Virtualization (SDNNFV). Ed. N/A. Tempe, AZ: n.p., 2018. Print. «
2017 Submissions
Published Conference Proceedings
Sengupta, Sailik, et al. "A Game Theoretic Approach in Strategy Generation for Moving Target Defense in Web Applications." Proceedings of the International Conference on Autonomous Agents and Multiagent Systems. Ed. N/A. N/A, N/A: n.p., 2017. Print. «
Deng, Juan, et al. "On the Safety and Efficiency of Virtual Firewall Elasticity Control." Proceedings of the Network and Distributed System Security Symposium (NDSS), 2017. Ed. N/A. N/A, N/A: n.p., 2017. Print. «
2016 Submissions
Journal Paper
Jing, Yiming, et al. "TRIPLEMON: A Multi-layer Security Framework for Mediating Inter-Process Communication on Android." Journal of Computer Security (JCS). (2016): 0-0. Print. *