Sun Security Laboratory

“Live as if you were to die tomorrow. Learn as if you were to live forever.” –– Mahatma Gandhi

Read more

About Us

The Sun Security Laboratory (SunLab) was founded by Professor Kun Sun. We are located at George Mason University. Our mission is to conduct basic and applied research in the systems and network security. Our current research areas include trustworthy computing, moving target defence, software security, cloud/container security, AI security, and mobile phone security.
The lab is continuously hiring self-motivated graduate and undergraduate students who have research interests in cyber security, programming languages, operating systems, and computer networks.  


News

  • Three students from Sun Security Lab at George Mason University won the first-place prize of the Cyber Resiliency and Measurement Challengea hosted by Naval Surface Warfare Center Dahlgren Division (NSWCDD) in Oct. 2024.
  • Dr. Xu He successfully defended his PhD and will join Visa Inc. as a research scientist.
  • One paper selected as one of the finalists of CSAW 2024 Applied Research Competition.
  • 2 papers accepted by NDSS 2025.
  • Our paper titled "Eavesdropping on Controller Acoustic Emanation for Keystroke Inference Attack in Virtual Reality" won the Distinguished Paper Award in NDSS 2024.
  • 3 papers accepted by CCS 2024.
  • 2 papers accepted by USENIX Security 2024.
  • 5 papers accepted by NDSS 2024.
  • The PatchDB dataset is now available at here.
Want to know more ... Contact Us

Research

We aim to solve the most challenging problems in cybersecurity.

AI Security

We study both the security problems in current AI/ML solutions and how to use AI/ML on solving existing security problems.

Network Security

Enhance the security of networks in various scenarios.

Software Security

We focus on automatically discovering the vulnerable code, identifying security patches, and generating security patches in the real-world open-source and proprietary software projects.

Trustworthy Computing

We design and develop new trusted computing systems to protect security sensitive code/data on both X86 and ARM processors using hardware security extensions such as ARM TrustZone, Intel SGX/TXT/SMM.

Moving Target Defense

We develop adaptive virtualized systems that protect a production system through hiding it in a continuously morphing virtual environment and/or serve disinformation via believable deceptive decoys.

Container Security

Based on the observation that different sets of system calls are needed for various execution phases, we implement a temporal-based system call reduction mechanism called SPEAKER that can dramatically reduce the attack surface on system calls.

publication

NDSS 2025
An Empirical Study on Remote DoS Attacks against NAT Networks
Xuewei Feng, Yuxiang Yang, Qi Li, Xingxiang Zhan, Kun Sun, Ziqiang Wang, Ao Wang,Ganqiu Du, and Ke Xu.
To appear in the Network and Distributed System Security Symposium (NDSS).
San Diego, CA, February 23 - February 28, 2025.
NDSS 2025
Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack
Ziqiang Wang, Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, Mengyuan Li, Ganqiu Du, Ke Xu, and Jianping Wu.
To appear in the Network and Distributed System Security Symposium (NDSS).
San Diego, CA, February 23 - February 28, 2025.
CCS 2024
Dye4AI: Assuring Data Boundary on Generative AI Services
Shu Wang, Kun Sun, and Yan Zhai.
To appear in the Proceedings of ACM Conference on Computer and Communications Security (CCS).
Salt Lake City, UT, October 14-18, 2024.
CCS 2024
BlueSWAT: A Lightweight State-Aware Security Framework for Bluetooth Low Energy
Xijia Che, Yi He, Xuewei Feng, Kun Sun, Ke Xu, and Qi Li.
To appear in the Proceedings of ACM Conference on Computer and Communications Security (CCS).
Salt Lake City, UT, October 14-18, 2024.
CCS 2024
Towards Fine-Grained Webpage Fingerprinting at Scale
Xiyuan Zhao, Xinhao Deng, Qi Li, Yunpeng Liu, Zhuotao Liu, Kun Sun, and Ke Xu.
To appear in the Proceedings of ACM Conference on Computer and Communications Security (CCS).
Salt Lake City, UT, October 14-18, 2024.
DSN 2024
Bridging the Gap: A Study of AI-based Vulnerability Management between Industry and Academia
Shengye Wan, Joshua Saxe, Craig Gomes, Sahana Chennabasappa, Avilash Rath, Kun Sun, and Xinda Wang.
The 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
Brisbane, Australia, June 24-27, 2024.
IWQOS 2024
Enhancing Fraud Transaction Detection via Unlabeled Suspicious Records
Ye Wang, Yunpeng Liu, Ningtao Wang, Peiyang Li, Jiahao Hu, Xing Fu, Weiqiang Wang, Kun Sun, Qi Li, and Ke Xu.
To appear in the IEEE/ACM International Symposium on Quality of Service (IWQOS).
Guangzhou, China, 19–21 June 2024.
ASIACCS 2024
BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning
Xu He, Shu Wang, Pengbin Feng, Xinda Wang, Shiyu Sun, Qi Li, and Kun Sun.
To appear in the 19th ACM ASIA Conference on Computer and Communications Security (ASIACCS).
Singapore, 1-5 July, 2024.
EICS 2024
Having Difficulty Understanding Manuals? Automatically Converting User Manuals into Instructional Videos
Songsong Liu, Shu Wang, and Kun Sun.
To appear in the 16th ACM SIGCHI Symposium on Engineering Interactive Computing Systems (EICS).
Cagliari, Italy, 24-28 June 2024.
USENIX Security 2024
What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check
Yunlong Xing, Shu Wang, Shiyu Sun, Xu He, Kun Sun and Qi Li.
To appear in the 33rd USENIX Security Symposium (USENIX Security'24).
Philadelphia, PA, August 14–16, 2024.
USENIX Security 2024
Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities
Yuhao Wu, Jinwen Wang, Yujie Wang, Shixuan Zhai, Zihan Li, Yi He, Kun Sun, Qi Li, and Ning Zhang.
To appear in the 33rd USENIX Security Symposium (USENIX Security'24).
Philadelphia, PA, August 14–16, 2024.
MTD 2024
BlueShift: Probing Adaptive Frequency Hopping in Bluetooth
Tommy Chin, Noah Korzak, and Kun Sun.
To appear in the Proceedings of the 10th ACM Workshop on Moving Target Defense (MTD), in conjunction with the ACM Conference on Computer and Communications Security (ACM CCS 2023).
Copenhagen, Denmark, November 26, 2023.
NDSS 2024
Compensating Removed Frequency Components: Thwarting Voice Spectrum Reduction Attacks
Shu Wang, Kun Sun, and Qi Li.
To appear in the Network and Distributed System Security Symposium (NDSS).
San Diego, California, February 26-March 1, 2024.
NDSS 2024
Eavesdropping on Controller Acoustic Emanation for Keystroke Inference Attack in Virtual Reality
Shiqing Luo, Anh Nguyen, Hafsa Farooq, Kun Sun, and Zhisheng Yan.
To appear in the Network and Distributed System Security Symposium (NDSS).
San Diego, California, February 26-March 1, 2024.
NDSS 2024
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices
Yue Xiao, Yi He, Xiaoli Zhang, Qian Wang, Renjie Xie, Kun Sun, Ke Xu, and Qi Li.
To appear in the Network and Distributed System Security Symposium (NDSS).
San Diego, California, February 26-March 1, 2024.
NDSS 2024
Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks
Yuxiang Yang, Xuewei Feng, Qi Li, Kun Sun, Ziqiang Wang, and Ke Xu.
To appear in the Network and Distributed System Security Symposium (NDSS).
San Diego, California, February 26-March 1, 2024.
NDSS 2024
RAPIER: A Robust Framework for Detecting Encrypted Malicious Network Traffic with Low-Quality Training Data
Yuqi Qing, Qilei Yin, Xinhao Deng, Yihao Chen, Zhuotao Liu, Kun Sun, Ke Xu, Jia Zhang, and Qi Li.
To appear in the Network and Distributed System Security Symposium (NDSS).
San Diego, California, February 26-March 1, 2024.
TIFS 2024
Condo: Enhancing Container Isolation through Kernel Permission Data Protection
Shouyin Xu, Yuewu Wang, Lingguang Lei, Kun Sun, Jiwu Jing, Siyuan Ma, Jie Wang, and Heqing Huang.
To appear in the IEEE Transactions on Information Forensics and Security (TIFS), 2024.
CS 2024
FAMCF: A few-shot Android malware family classification framework
Fan Zhou, Dongxia Wang, Yanhai Xiong, Kun Sun, and Wenhai Wang.
To appear in Computers & Security, 2024.
TDSC 2023
A Hybrid System Call Profiling Approach for Container Protection
Yunlong Xing, Xinda Wang, Sadegh Torabi, Zeyu Zhang, Lingguang Lei, and Kun Sun.
To appear in the Transactions on Dependable and Secure Computing (TDSC), 2023.
TDSC 2023
CacheIEE: Cacheassisted Isolated Execution Environment on ARM Multi-Core Platforms
Jie Wang, Kun Sun, Lingguang Lei, Yuewu Wang, Jiwu Jing, Shengye Wan, and Qi Li.
To appear in the Transactions on Dependable and Secure Computing (TDSC), 2023.
TON 2023
Interface-Based Side Channel in TEE-Assisted Networked Services
Xiaohan Zhang, Jinwen Wang, Yueqiang Cheng, Qi Li, Kun Sun, Yao Zheng, Ning Zhang, and Xinghua Li.
To appear in IEEE/ACM Transactions on Networking (TON), 2023.
DSN 2023
Enhancing Honeypot Fidelity with Real-Time User Behavior Emulation
Songsong Liu, Shu Wang, and Kun Sun.
To appear in the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Track of Disruptive Idea
Porto, Portugal, June 27-30, 2023.
USENIX Security 2023
Cross Container Attacks: The Bewildered eBPF on Clouds
Yi He, Roland Guo, Yunlong Xing, Xijia Che, Kun Sun, Zhuotao Liu, Ke Xu, and Qi Li.
To appear in 32nd USENIX Security Symposium (USENIX Security'23).
ANAHEIM, CA, USA, August 9–11, 2023.
USENIX Security 2023
Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation
Renjie Xie, Jiahao Cao, Enhuan Dong, Mingwei Xu, Kun Sun, Qi Li, Licheng Shen, and Menghao Zhang.
To appear in 32nd USENIX Security Symposium (USENIX Security'23)
ANAHEIM, CA, USA, August 9–11, 2023.
S&P 2023
GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics
Shu Wang, Xinda Wang, Kun Sun, Sushil Jajodia, Haining Wang, and Qi Li.
To appear in the 44th IEEE Symposium on Security and Privacy (IEEE S&P)
SAN FRANCISCO, CA, MAY 22-26, 2023.
S&P 2023
Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects
Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, and Ke Xu.
To appear in the 44th IEEE Symposium on Security and Privacy (IEEE S&P)
SAN FRANCISCO, CA, MAY 22-26, 2023.
ICSME 2023
Exploring Security Commits in Python
Shiyu Sun, Shu Wang, Xinda Wang, Yunlong Xing, Elisa Zhang, and Kun Sun.
To appear in the 39th IEEE International Conference on Software Maintenance and Evolution (ICSME)
Bogotá, Colombia, October 1-6, 2023.
CNS 2022
SysCap: Profiling and Crosschecking Syscall and Capability Configurations for Docker Images
Yunlong Xing, Jiahao Cao, Xinda Wang, Sadegh Torabi, Kun Sun, Fei Yan, and Qi Li.
In IEEE Conference on Communications and Network Security (CNS)
Austin, TX and virtually on October 3-5, 2022.
CCS 2022
Ready Raider One: Exploring the Misuse of Cloud Gaming Services
Guannan Liu, Daiping Liu, Shuai Hao, Xing Gao, Kun Sun, and Haining Wang.
To appear in the Proceedings of ACM Conference on Computer and Communications Security (CCS)
Los Angeles, CA, November 7-11, 2022.
SRDS 2022
An Investigation on Data Center Cooling Systems Using FPGA-based Temperature Side Channels
Yuan Liang, Xing Gao, Kun Sun, Wenjie Xiong, and Haining Wang.
To appear in the 41st International Symposium on Reliable Distributed Systems (SRDS)
Vienna, Austria, September 19-22, 2022.
RAID 2022
BinProv: Binary Code Provenance Identification without Disassembly
Xu He, Shu Wang, Yunlong Xing, Pengbin Feng, Haining Wang, Qi Li, Songqing Chen, and Kun Sun.
To appear in the 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2022)
Limassol, Cyprus on 26-28 October, 2022.
DIMVA 2022
Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots
Songsong Liu, Pengbin Feng, Jiahao Cao, Xu He, Tommy Chin, Kun Sun, and Qi Li.
To appear in the 19th Conference on Detection of Intrusions and Malware \& Vulnerability Assessment (DIMVA)
Cagliari, Italy June 29 – July 1, 2022.
TON 2022
The LOFT Attack: Overflowing SDN Flow Tables at a Low Rate
Jiahao Cao, Mingwei Xu, Qi Li, Kun Sun, and Yuan Yang.
To appear in IEEE/ACM Transactions on Networking (TON), 2022.
FGCS 2022
The devil is in the detail: Generating system call whitelist for Linux seccomp
Yunlong Xing, Jiahao Cao, Kun Sun, Fei Yan, and Shengye Wan.
Future Generation Computer Systems (FGCS), 2022.
IFIP 2022
EZPath: Expediting Container Network Traffic via Programmable Switches
Zili Zha, An Wang, Yang Guo, Qun Li, Kun Sun, and Songqing Chen.
To appear in the IFIP Networking Conference.
Catania Italy, June 13-16, 2022.
USENIX Security 2022
Off-Path Network Traffic Manipulation via Revitalizing ICMP Redirect Attacks
Xuewei Feng, Qi Li, Kun Sun, Zhiyun Qian, Chuanpu Fu, Gang Zhao, Xiaohui Kuang, and Ke Xu.
To appear in 31st USENIX Security Symposium (USENIX Security'22)
BOSTON, MA, USA, August 10–12, 2022.
USENIX Security 2022
RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices
Yi He, Zhenhua Zou, Kun Sun, Zhuotao Liu, Ke Xu, Qian Wang, Chao Shen, Zhi Wang, and Qi Li.
To appear in 31st USENIX Security Symposium (USENIX Security'22)
BOSTON, MA, USA, August 10–12, 2022.
USENIX Security 2022
Exploring the Unchartered Space of Container Registry Typosquatting
Guannan Liu, Xing Gao, Haining Wang, and Kun Sun
To appear in 31st USENIX Security Symposium (USENIX Security'22)
BOSTON, MA, USA, August 10–12, 2022.
NDSS 2022
PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP
Xuewei Feng, Qi Li, Kun Sun, Ke Xu, Baojun Liu, Xiaofeng Zheng, Qiushi Yang, Haixin Duan, and Zhiyun Qian.
To appear in the Network and Distributed System Security Symposium (NDSS)
San Diego, CA, February 27- March 3, 2022.
WWW 2022
Understanding the Practice of Security Patch Management across Multiple Branches in OSS Projects
Xin Tan, Yuan Zhang, Jiajun Cao, Kun Sun, Mi Zhang and Min Yang
To appear in the Proceedings of 31st ACM Web Conference (WWW)
Virtual Event, Lyon, France, April 25–29, 2022.
INFOCOM 2022
Auter: Automatically Tuning Multi-layer Network Buffers in Long-Distance Shadowsocks Networks
Xu He, Jiahao Cao, Shu Wang, Kun Sun, Lisong Xu, and Qi Li.
To appear in IEEE International Conference on Computer Communications (INFOCOM)
London, United Kingdom, May 2-5, 2022. Virtual Conference.
CS 2022
Enhancing Malware Analysis Sandboxes with Emulated User Behavior
Songsong Liu, Pengbin Feng, Shu Wang, Kun Sun, and Jiahao Cao
To appear in Computers & Security, 2022
TIFS 2022
Good Learning, Bad Performance: A Novel Attack against RL-based Congestion Control Systems
Zijie Yang, Jiahao Cao, Zhuotao Liu, Kun Sun, and Qi Li
To appear in the IEEE Transactions on Information Forensics and Security (TIFS), 2022
TDSC 2022
A Systematic Study of Android Non-SDK (Hidden) Service API Security
Yi He,Yacong Gu, Purui Su, Kun Sun, Zhi Wang, Yajin Zhou, and Qi Li
To appear in the Transactions on Dependable and Secure Computing (TDSC), 2022
TNET 2022
Disrupting the SDN Control Channel via Shared Links: Attacks and Countermeasures
Renjie Xie, Jiahao Cao, Qi Li, Kun Sun, Guofei Gu, Mingwei Xu, and Yuan Yang
To appear in IEEE/ACM Transactionson Networking (TNET), 2022.
ToN 2021
Off-Path TCP Hijacking Attacks via the Side Channel of Downgraded IPID
Feng, Xuewei; Li, Qi; Sun, Kun; Fu, Chuanpu; Xu, Ke
To appear in IEEE/ACM Transactions on Networking, 2021
MILCOM 2021
PatchRNN: A Deep Learning-Based System for Security Patch Identification
Xinda Wang, Shu Wang, Pengbin Feng, Kun Sun, Sushil Jajodia, Sanae Benchaaboun, and Frank Geck
Military Communications Conference (MILCOM)
San Diego, CA, USA, 29 November–2 December 2021.
CNS 2021
HoneyBog: A Hybrid Webshell Honeypot Framework against Com-mand Injection
Songsong Liu, Pengbin Feng, and Kun Sun
In IEEE Conference on Communications and Network Security (CNS)
Virtual Conference, October 4-6, 2021
ACSAC 2021
Try before You Buy: Privacy-preserving Data Evaluation on Cloud-based Machine Learning Data Marketplace
Qiyang Song, Jiahao Cao, Kun Sun, Qi Li, and Ke Xu
To appear in Annual Computer Security Applications Conference (ACSAC)
Virtual Conference, December 6-10, 2021
CCS 2021
A Hard Label Black-box Adver-sarial Attack Against Graph Neural Networks
Jiaming Mu, Binghui Wang, Qi Li,Kun Sun, Mingwei Xu, and Zhuotao Liu
To appear in ACM Conference on Computer and Communications Security (CCS)
Seoul, South Korea, November 14-19, 2021.
CCS 2021
Locating the Security Patches for Disclosed OSS Vulnerabilities with Vulnerability-Commit Correlation Ranking
Xin Tan, Yuan Zhang, Chenyuan Mi, Jiajun Cao, Kun Sun, Yifan Lin, and Min Yang
To appear in ACM Conference on Computer and Communications Security (CCS)
Seoul, South Korea, November 14-19, 2021.
WiSec 2021
Remotely Controlling TrustZone Applications? A Study on Securely and Resiliently Receiving Remote Commands
Shengye Wan, Kun Sun, Ning Zhang, and Yue Li
To appear in 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec)
Virtual Event, November 14-19, 2021.
DSN 2021
PatchDB: A Large-Scale Security Patch Dataset
Xinda Wang, Shu Wang, Pengbin Feng, Kun Sun, and Sushil Jajodia
To appear in the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks(DSN)
Taibei, Taiwan, June 21-24, 2021.
[Paper]
CODASPY 2021
UTrack: Enterprise User Tracking Based on OS-Level Audit Logs
Yue Li, Zhenyu Wu, Haining Wang, Kun Sun, Zhichun Li, Kangkook Jee, Junghwan Rhee, and Haifeng Chen
To appear in the 11th ACM Conference on Data and Application Security and Privacy (CODASPY)
April 26 - 28, 2021. Taking place virtually.
[Paper]
INFOCOM 2021
Detecting Localized Adversarial Examples: A Generic Approach using Critical Region Analysis
Fengting Li, Xuankai Liu, Xiaoli Zhang, Qi Li, Kun Sun, and Kang Li
To appear in the IEEE International Conference on Computer Communications (INFOCOM)
10-13 May 2021. Virtual Conference.
[Paper]
ASIACCS 2021
See through Walls: Detecting Malware in SGX Enclaves with SGX-Bouncer
Zeyu Zhang, Xiaoli Zhang, Qi Li, Kun Sun, Yinqian Zhang, SongSong Liu, Yukun Liu, and Xiaoning Li
To appear in The ACM Asia Conference on Computer and Communications Security (ACM ASIACCS)
Hong Kong, China, June 7-11, 2021
Acceptance ratio: 18.47%=29/157
[Paper]
SenSys 2020
TrustICT: An Efficient Trusted Interaction Interface between Isolated Execution Domains on ARM Multi-core Processors
Jie Wang, Yuewu Wang, Lingguang Lei, Kun Sun, Jiwu Jing, and Quan Zhou
To appear in the 18th ACM Conference on Embedded Networked Sensor Systems (SenSys)
Yokohama, Japan November 16-19, 2020
[Paper]
ACSAC 2020
RusTEE: Developing Memory-Safe ARM TrustZone Applications
Shengye Wan, Mingshen Sun, Kun Sun, Ning Zhang, and Xu He
To appear in Annual Computer Security Applications Conference (ACSAC)
Austin, Texas, USA, December 7-11, 2020
[Paper]
ISC 2020
Evaluation on the Security of Commercial Cloud Container Services
Yifei Wu, Lingguang Lei, Yuewu Wang, Kun Sun, and Jingzi Meng
To appear in the 23th Information Security Conference (ISC)
Bali, Indonesian, December 16-19, 2020
Acceptance ratio: 25.50%=23/90
[Paper]
CCS 2020
Cache-in-the-Middle (CITM) Attacks : Manipulating Sensitive Data in Isolated Execution Environments
Jie Wang, Kun Sun, Lingguang Lei, Shengye Wan, Yuewu Wang, and Jiwu Jing
To appear in ACM Conference on Computer and Communications Security (CCS)
Orlando, USA, November 9-13, 2020
[Paper]
CCS 2020
Off-Path TCP Exploits of the Mixed IPID Assignment
Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, and Ke Xu
To appear in ACM Conference on Computer and Communications Security (CCS)
Orlando, USA, November 9-13, 2020
[Paper]
CCS 2020
When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition
Shu Wang, Jiahao Cao, Xu He, Kun Sun, and Qi Li
To appear in ACM Conference on Computer and Communications Security (CCS)
Orlando, USA, November 9-13, 2020
[Paper]
SecureComm 2020
SGX-Cube: An SGX-Enhanced Single Sign-On System against Server-side Credential Leakage
Songsong Liu, Qiyang Song, Kun Sun, and Qi Li
To appear in the 16th EAI International Conference on Security and Privacy in Communication Networks (SecureComm)
Washington D.C., USA, October 21-23, 2020
[Paper]
RAID 2020
SIEVE: Secure In-Vehicle Automatic Speech Recognition Systems
Shu Wang, Jiahao Cao, Kun Sun, and Qi Li
To appear in the International Symposium on Research in Attacks, Intrusions and Defenses (RAID)
Donostia/San Sebastian, Spain, October 14-16, 2020
Acceptance ratio: 24.79%=31/121
[Paper]
TDSC 2020
JNI Global References Are Still Vulnerable: Attacks and Defenses
Yi He, Yuan Zhou, Yajin Zhou, Qi Li, Kun Sun, Yacong Gu, and Yong Jiang
To appear in the Transactions on Dependable and Secure Computing (TDSC)
2020
[pdf]
CNS 2020
A Machine Learning Approach to Classify Security Patches into Vulnerability Types
Xinda Wang, Shu Wang, Kun Sun, Archer Batcheller, and Sushil Jajodia
To appear in IEEE Conference on Communications and Network Security (CNS)
Virtual Conference, 29 June – 1 July 2020
[Paper]
CNS 2020
Towards a Believable Decoy System: Replaying Network Activities from Real System
Jianhua Sun, Kun Sun, and Qi Li
To appear in IEEE Conference on Communications and Network Security (CNS)
Virtual Conference, 29 June – 1 July 2020
[Paper]
TDSC 2020
Understanding Account Recovery in the Wild and Its Security Implications
Yue Li, Zeyu Chen, Haining Wang, Kun Sun, and Sushil Jajodia
To appear in the Transactions on Dependable and Secure Computing (TDSC)
2020
[pdf]
NDSS 2020
When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN
Jiahao Cao, Renjie Xie, Kun Sun, Qi Li, Guofei Gu, and Mingwei Xu
To appear in the Network and Distributed System Security Symposium (NDSS)
San Diego, CA, February 23-26, 2020
[Paper]
ICICS 2019
UBER: Combating Sandbox Evasion via User Behavior Emulators
Pengbin Feng, Jianhua Sun, Songsong Liu, and Kun Sun
Proceedings of the 21st International Conference on Information and Communications Security (ICICS)
Beijing, China, December 15-17, 2019
Acceptance ratio: 23.6%=47/199
[Paper]
DSC 2019
Federated-Cloud Based Deep Neural Networks with Privacy-Preserving Image Filtering Techniques
Isabelle Choi, Qiyang Song, and Kun Sun
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing (DSC)
Hangzhou, China, November 18-20, 2019.
MTD 2019
A Scalable High Fidelity Decoy Framework against Sophisticated Cyber Attacks
Jianhua Sun, Songsong Liu, and Kun Sun
Proceedings of the 6th ACM Workshop on Moving Target Defense (MTD) in conjunction with the 26th ACM Conference on Computer and Communications Security (ACM CCS)
London, UK, November 11, 2019
[Paper]
TDSC 2019
Vulnerable Service Invocation and Countermeasures
Huan Chang, Lingguang Lei, Kun Sun, Yuewu Wang, Jiwu Jing, Yi He, and Pingjian Wang
To appear in IEEE Transactions on Dependable and Secure Computing (TDSC)
ESORICS 2019
OCRAM-assisted Sensitive Data Protection on ARM-based Platform
Dawei Chu, Yuewu Wang, Lingguang Lei, Yanchu Li, Jiwu Jing, and Kun Sun
In the European Symposium on Research in Computer Security (ESORICS)
Luxembourg, September 23-27, 2019
Acceptance ratio: 19.5%=67/344
[Paper]
SecureComm 2019
Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts
Jiahao Cao, Kun Sun, Qi Li, Mingwei Xu, Zijie Yang, Kyung Joon Kwak, and Jason Li
In the 15th International Conference on Security and Privacy in Communication Networks (SecureComm)
Orlando, FL, USA, October 23-25, 2019
[Paper]
SecureComm 2019
Automated IoT Device Fingerprinting Through Encrypted Stream Classification
Jianhua Sun, Kun Sun, and Chris Shenefiel
In the 15th International Conference on Security and Privacy in Communication Networks (SecureComm)
Orlando, FL, USA, October 23-25, 2019
[Paper]
RAID 2019
Fingerprinting SDN Applications via Encrypted Control Traffic
Jiahao Cao, Zijie Yang, Kun Sun, Qi Li, Mingwei Xu, and Peiyi Han
In the 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID)
September 23-25, 2019
Acceptance ratio: 22.28%=37/166
[Paper]
DSN 2019
SATIN: A Secure and Trustworthy Asynchronous Introspection onMulti-Core ARM Processors
Shengye Wan, Jianhua Sun, Kun Sun, Ning Zhang, and Qi Li
In the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
Portland, Oregon, June 24-27, 2019
Acceptance ratio: 21.40%=54/252
[Paper]
DSN 2019
Detecting "0-Day" Vulnerability: An Empirical Study of Secret Security Patch in OSS (short paper)
Xinda Wang, Kun Sun, Archer Batcheller, and Sushil Jajodia
In the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
Portland, Oregon, June 24-27, 2019
Acceptance ratio: 21.40%=54/252
[Paper]
USENIX  Security 2019
The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links
Jiahao Cao, Qi Li, Renjie Xie, Kun Sun, Guofei Gu, Mingwei Xu, and Yuan Yang
In 28th USENIX Security Symposium (USENIX Security)
Santa Clara, CA, August 14-16, 2019
First round acceptance ratio: 9.8%=25/254
[Paper]
CyberSecurity 2019
PathMarker: Protecting Web Contents against Inside Crawlers
Shengye Wan, Yue Li, and Kun Sun
In CyberSecurity, Volume 2, number 1, February 20, 2019
ACSAC 2018
A Measurement Study on Linux Container Security: Attacks and Countermeasures
Xin Lin, Yuewu Wang, Lingguang Lei, Jiwu Jing, Kun Sun, and Quan Zhou
In 2018 Annual Computer Security Applications Conference (ACSAC)
San Juan, Puerto Rico, December 3-7, 2018
Acceptance ratio: 20.1%=60/299
[Paper]
ICDCS 2018
CADET: Investigating a Collaborative and Distributed Entropy Transfer Protocol
Kyle Wallace, Gang Zhou, and Kun Sun
In the 38th IEEE International Conference on Distributed Computing Systems (ICDCS)
Vienna, Austria, July 2-5, 2018
[Paper]
TIFS 2018
Memory Forensic Challenges Under Misused Architectural Features
Ning Zhang, Ruide Zhang, Kun Sun, Wenjing Lou, Tom Hou, and Sushil Jajodia
In IEEE Transactions on Information Forensics and Security (TIFS), vol 13, no 9, pp 2345-2358
September 2018
INFOCOM 2018
TruSense: Information Leakage from TrustZone
Ning Zhang, Kun Sun, Deborah Shands, Wenjing Lou, and Thomas Hou
In IEEE International Conference on Computer Communications (INFOCOM)
Honolulu, HI, April 15-19, 2018
Acceptance ratio: 19.2%=309/1,606
[Paper]
INFOCOM 2018
Email as a Master Key: Analyzing Account Recovery in the Wild
Yue Li, Haining Wang, and Kun Sun
In IEEE International Conference on Computer Communications (INFOCOM)
Honolulu, HI, April 15-19, 2018
Acceptance ratio: 19.2%=309/1,606
[Paper]
CCS 2017
Vulnerable Implicit Service: A Revisit
Lingguang Lei, Yi He, Kun Sun, Jiwu Jing, Yuewu Wang, Qi Li, and Jian Weng
In the 24th ACM Conference on Computer and Communications Security (CCS)
Dallas, Texas, October 30-November 3, 2017
Acceptance ratio: 18%=151/836
[Paper]
SecureComm 2017
BluePass: A Secure Hand-free Password Manager
Yue Li, Haining Wang, and Kun Sun
In the International Conference on Security and Privacy in Communication Networks (SECURECOMM)
Niagara Falls, CANADA, October 22-25, 2017
Acceptance ratio (full paper): 29.5%=31/105
[Paper]
SecureComm 2017
LinkFlow: Efficient Large-Scale Inter-App Privacy Leakage Detection
Yi He, Qi Li, and Kun Sun
in the International Conference on Security and Privacy in Communication Networks (SECURECOMM)
Niagara Falls, CANADA, October 22-25, 2017
Acceptance ratio (full paper): 29.5%=31/105
[Paper]
SecureComm 2017
Disrupting SDN via the Data Plane: A Low-Rate Flow Table Overflow Attack
Jiahao Cao, Mingwei Xu, Qi Li, Kun Sun, Yuan Yang, and Jing Zheng
In the International Conference on Security and Privacy in Communication Networks (SECURECOMM)
Niagara Falls, CANADA, October 22-25, 2017
Acceptance ratio (full paper): 29.5%=31/105
[Paper]
CNS 2017
CyberMoat: Camouflaging Critical Server Infrastructures with Large Scale Decoy Farms
Jianhua Sun, Kun Sun, and Qi Li
In IEEE Conference on Communications and Network Security (CNS)
Las Vegas, NV,October 9-11, 2017
Acceptance ratio: 29.99%=41/137
[Paper]
TIFS 2017
Personal Information in Passwords and Its Security Implications
Yue Li, Haining Wang, and Kun Sun
In IEEE Transactions on Information Forensics and Security (TIFS) page 2320-2333, Vol 12, Issue 10
October 2017
DIMVA 2017
SPEAKER: Split-Phase Execution of Application Containers
Lingguang Lei, Jianhua Sun, Kun Sun, Chris Shenefiel, Rui Ma, Yuewu Wang, and Qi Li
In the 14th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)
Bonn, Germany, July 6-7 2017
Acceptance ratio: 26.86%=18/67
[Paper]
DSN 2017
JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android
Yacong Gu, Kun Sun, Purui Su, Qi Li, Yemian Lu, Lingyun Ying, and Denguo Feng
In the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
Denver, CO, June 26-29, 2017
Acceptance ratio: 22.27%=49/220
[Paper]
ICC 2017
Protecting Web Contents against Persistent Distributed Crawlers
Shengye Wan, Yue Li, and Kun Sun
In the IEEE ICC 2017, Communication and Information Systems Security Symposium
Paris, France, 2017
[Paper]
ICC 2017
A Measurement Study on Amazon Wishlist and Its Privacy Exposure
Yue Li, Nan Zheng, Haining Wang, Kun Sun, and Hui Fang
In the IEEE ICC 2017, Communication and Information Systems Security Symposium
Paris, France, 2017
[Paper]
CC 2017
FEC-Seluge: Efficient, Reliable, and Secure Large Data Dissemination using Erasure Codes
Gangwon Hyun, Kun Sun, and Peng Ning
In Computer Communications, 104, 191-203
May 2017
IoT 2016
Toward Sensor-Based Random Number Generation for Mobile and IoT Devices
Kyle Wallace, Kevin Moran, Ed Novak, Gang Zhou, and Kun Sun
In the IEEE Internet of Things Journal, vol 3, no 6, pp 1189-1201
December 2016.
ICDCS 2016
Amnesia: A Bilateral Generative Password Manager
Luren Wang, Yue Li, and Kun Sun
in the 36th IEEE International Conference on Distributed Computing Systems (ICDCS)
Nara, Japan, June 27-30, 2016
Acceptance ratio: 17.62%=68/386
[Paper]
S&P 2016
CaSE: Cache-Assisted Secure Execution on ARM Processors
Ning Zhang, Kun Sun, Wenjing Lou, and Tom Hou
in the 37th IEEE Symposium on Security and Privacy (S&P)
San Jose, CA, USA, MAY 23-25, 2016
Acceptance ratio: 13.75%=55/400
[Paper]
ASIACCS 2016
Privacy Breach by Exploiting postMessage in HTML5: Identification, Evaluation, and Countermeasure
Chong Guan, Kun Sun, Zhan Wang, and Wen Tao Zhu
in the 11th ACM Symposium on Information, Compute rand Communications Security (ASIACCS)
Xi'an, China, May 30 June 3, 2016
Acceptance ratio: 20.9%=73/350 (full paper)
[Paper]
INFOCOM 2016
A Study of Personal Information in Human-chosen Passwords and Its Security Implications
Yue Li, Haining Wang, and Kun Sun
in IEEE International Conference on Computer Communications (INFOCOM)
San Francisco, CA, April 10-15, 2016
Acceptance ratio: 18.25%=300/1,644
[Paper]
INFOCOM 2016
DESIR: Decoy-Enhanced Seamless IP Randomization
Jianhua Sun and Kun Sun
In IEEE International Conference on Computer Communications (INFOCOM)
San Francisco, CA, April 10-15, 2016
Acceptance ratio: 18.25%=300/1,644
[Paper]
EuroS&P 2016
CacheKit: Evading Memory Introspection Using Cache Incoherence
Ning Zhang, He Sun, Kun Sun, Wenjing Lou, and Thomas Hou
In the 1st IEEE European Symposium on Security and Privacy (EuroS&P)
Saarbrücken, GERMANY, March 21-24, 2016
Acceptance ratio: 17.26%=29/168
[Paper]
GameSec 2015
A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense
Andrew Clark, Kun Sun, Linda Bushnell, and Radha Poovendran
in the Sixth Conference on Decision and Game Theory for Security (GameSec)
London, UK, on November 4-5, 2015
Acceptance ratio: 43.24%=16/37 (full papers)
[Paper]
TIFS 2015
Reliable and Trustworthy Memory Acquisition on Smartphones
He Sun, Kun Sun, Yuewu Wang, and Jiwu Jing
In Information Forensics and Security, IEEE Transactions on (TIFS), vol.10, no.12, pp.2547-2561
December 2015
CCS 2015
TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens
He Sun, Kun Sun, Yuewu Wang, and Jiwu Jing
In the 22nd ACM Conference on Computer and Communications Security (CCS)
Denver, Colorado, October 12-16, 2015
Acceptance ratio: 19.81%=128/646
[Paper]
SRDS 2015
PmDroid: Permission Supervision for Android Advertising
Xing Gao, Dachuan Liu, Haining Wang, and Kun Sun
In the 34th Symposium on Reliable Distributed Systems (SRDS)
Montreal, Canada, September 28 - October 01, 2015
Acceptance ratio: 29.63%=24/81 (regular papers)
[Paper]
DSN 2015
TrustICE: Hardware-assisted Isolated Computing Environments on Mobile Devices
He Sun, Kun Sun, Yuewu Wang, Jiwu Jing, and Haining Wang
In the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
Rio de Janeiro, Brazil, June 22-25, 2015
Acceptance ratio: 21.83%=50/229
[Paper]
S&P 2015
Using Hardware Features for Increased Debugging Transparency
Fengwei Zhang, Kevin Leach, Angelos Stavrou, HainingWang, and Kun Sun
In the 36th IEEE Symposium on Security and Privacy (S&P)
Fairmont, San Jose, CA, May 18-20, 2015
Acceptance ratio:13.51%=55/407
[Paper]
ASIACCS 2015
Now You See Me: Hide and Seek in Physical Address Space
Ning Zhang, Kun Sun,Wenjing Lou, Y Thomas Hou, and Sushil Jajodia
In the 10th ACM Symposium on Information, Compute rand Communications Security (ASIACCS)
Singapore, April 14-17, 2015
Acceptance ratio: 17.84%=48/269 (full paper)
[Paper]
NDSS 2015
DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices
Xueqiang Wang, Kun Sun, Yuewu Wang, and Jiwu Jing
In the 22nd Annual Network & Distributed System Security Symposium (NDSS)
San Diego, California, February 2015
Acceptance ratio: 16.88%=51/302
[Paper]
ESORICS 2014
TrustDump: Reliable memory acquisition on smartphones
He Sun, Kun Sun, Yuewu Wang, Jiwi Jing, and Sushil Jajodia
In the Proceedings of 18th European Symposium on Research in Computer Security (ESORICS)
Wroclaw, Poland, September 7-11, 2014
Acceptance ratio: 24.78%=58/234
[Paper]
ASIACCS 2014
Remotely Wiping Sensitive Data on Stolen Smartphones
Xingjie Yu, Zhan Wang, Kun Sun, Wen Tao Zhu, Neng Gao, and Jiwu Jing
In the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS)
Kyoto, Japan, June 4-6, 2014
Acceptance ratio: 19.60%=50/255 (short paper)
[Paper]
TDSC 2014
HyperCheck: A Hardware-Assisted Integrity Monitor
Fengwei Zhang, Jiang Wang, Kun Sun, and Angelos Stavrou
in IEEE Transactions on Dependable and Secure Computing (TDSC), vol.11, no.4, pp.332,344
July-Aug 2014
[Paper]
PASSAT 2013
A Security Analysis of Two Commercial Browser and Cloud Based Password Managers
Rui Zhao, Chuan Yue, and Kun Sun
In Proceedings of the 5th ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT)
Alexandria, VA, September 2013
[Paper]
CDC 2013
Effectiveness of IP Address Randomization in Decoy-Based Moving Target Defense
Andrew W Clark, Kun Sun, and Radha Poovendran
In the 52nd IEEE Conference on Decision and Control (CDC)
Florence, Italy, December 10-13, 2013
[Paper]
CNS 2013
A Moving Target Defense Mechanism for MANETs Based on Identity Virtualization
Massimiliano Albanese, Alessandra De Benedictisy, Sushil Jajodia, and Kun Sun
In the First IEEE Conference on Communications and Network Security (CNS)
Washington D.C., USA, October 14-16, 2013
Acceptance ratio: 28.36%=40/141
[Paper]
DBSEC 2013
TerraCheck: Verification of Dedicated Cloud Storage
Zhan Wang, Kun Sun, Sushil Jajodia, and Jiwu Jing
In the 27th IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC)
Rutgers University, Newark, NJ, USA, July 15-17, 2013
Acceptance ratio: 35.55%=16/45 (full paper)
[Paper]
ICCCN 2013
MOTAG: Moving Target Defense Against Internet Denial of Service Attacks
Quan Jia, Kun Sun, and Angelos Stavrou
In the International Conference on Computer Communications and Networks (ICCCN)
Nassau, Bahamas, 2013
Acceptance ratio: 28.66%=86/300 (regular paper)
[Paper]
DSN 2013
Spectre: A Dependable Introspection Framework via System Management Mode
Fengwei Zhang, Kevin Leach, Kun Sun, and Angelos Stavrou
In the 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) Budapest, June 2013
Acceptance ratio: 20.90%=46/220
[Paper]
IPDPS 2013
On Feasibility of Fingerprinting Wireless Sensor Nodes Using Physical Properties
Xiaowei Mei, Donggang Liu, Kun Sun, and Dingbang Xu
In the 27th IEEE International Parallel & Distributed Processing Symposium (IPDPS>)
Boston, Massachusetts, May 2013
Acceptance ratio: 21.45%=106/494
[Paper]
DIMVA 2012
NetGator: Malware Detection Using Program Interactive Challenges
Brian Schulte, Haris Andrianakis, Kun Sun ,and Angelos Stavrou
In the 9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)
Heraklion, Crete, Greece, July 26-27th, 2012
Acceptance ratio: 31.81%=14/44
[Paper]
DSN 2012
A Dependability Analysis of Hardware-Assisted Polling Integrity Checking Systems
Jiang Wang, Kun Sun, and Angelos Stavrou
In the Proceedings of the 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
Boston, Massachusetts, June 2012
Acceptance ratio: 21.61%=51/236
[Paper]
NDSS 2012
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes
Kun Sun, Jiang Wang, Fengwei Zhang, and Angelos Stavrou
In the Proceedings of the 19th Annual Network & Distributed System Security Symposium (NDSS)
San Diego, California, 5-8 February 2012
Acceptance ratio: 17.82%=46/258
[Paper]

Team

Dr. Kun Sun

Director

Xu He

PhD Candidate

Tommy Chin

PhD Student

Shiyu Sun

PhD Student

Yunlong Xing

PhD Student

Hung-mao (Rafael) Chen

PhD Student

Di Wu

PhD Student

Noah J Korzak

Master Student

Samuel Lee Best

Undergraduate Student

Alumni

Shu Wang, PhD, 2023
Xinda Wang, PhD, 2023
Songsong Liu, PhD, 2022
Sadegh Torabi, Postdoc, 2021-2022
Pengbin Feng, Postdoc, 2019-2021
Jie Wang, PhD, 2021
Shengye Wan, PhD, 2020
Jianhua Sun, PhD, 2019
Yue Li, PhD, 2019
Kyle Wallace, PhD, 2018
Lingguang Lei, Postdoc, 2015-2017
Xianchen Meng, M.S., 2017

Bennett Summers, M.S., 2016

Sponsors