Sun Security Laboratory

“Live as if you were to die tomorrow. Learn as if you were to live forever.” –– Mahatma Gandhi

Read more

About Us

The Sun Security Laboratory (SunLab) was founded by Professor Kun Sun. We are located at George Mason University. Our mission is to conduct basic and applied research in the systems and network security. Our current research areas include trustworthy computing, moving target defence, software security, cloud/container security, AI security, and mobile phone security. We have one postdoc and multiple PhD openings.  


News

  • 1 paper accepted by DSN 2021. 
  • 1 paper accepted by CODASY 2021.  
  • 1 paper accepted by INFOCOM 2021.
  • Shu Wang received Student Travel Award from CCS 2020.
  • 1 paper accepted by AsiaCCS 2021.
  • 1 paper accepted by ACSAC 2020.
  • Our paper "Off-Path TCP Exploits of the Mixed IPID Assignment" was nominated for CCS 2020 Distinguished Paper award (one among four papers).
  • 3 papers accepted by CCS 2020.
  • Dr. Shengye Wan defends his PhD thesis in July 2020 and joins FB.
  • 1 paper accepted by RAID 2020.
  • 1 paper accepted by NDSS 2020.
Want to know more ... Contact Us

Research

We aim to solve the most challenging problems in cybersecurity.

Trustworthy Computing

We design and develop new trusted computing systems to protect security sensitive code/data on both X86 and ARM processors using hardware security extensions such as ARM TrustZone, Intel SGX/TXT/SMM.

Moving Target Defense

We develop adaptive virtualized systems that protect a production system through hiding it in a continuously morphing virtual environment and/or serve disinformation via believable deceptive decoys.

Software Security

We focus on automatically discovering the vulnerable code, identifying security patches, and generating security patches in the real-world open-source and proprietary software projects.

Container Security

Based on the observation that different sets of system calls are needed for various execution phases, we implement a temporal-based system call reduction mechanism called SPEAKER that can dramatically reduce the attack surface on system calls.

Mobile Phone Security

Enhance the security of mobile phones in various layers including firmware, mobile OS, and mobile apps.

AI Security

We study both the security problems in current AI/ML solutions and how to use AI/ML on solving existing security problems.

publication

CODASPY 2021
UTrack: Enterprise User Tracking Based on OS-Level Audit Logs
Yue Li, Zhenyu Wu, Haining Wang, Kun Sun, Zhichun Li, Kangkook Jee, Junghwan Rhee, and Haifeng Chen
To appear in the 11th ACM Conference on Data and Application Security and Privacy (CODASPY)
April 26 - 28, 2021. Taking place virtually.
[Paper]
INFOCOM 2021
Detecting Localized Adversarial Examples: A Generic Approach using Critical Region Analysis
Fengting Li, Xuankai Liu, Xiaoli Zhang, Qi Li, Kun Sun, and Kang Li
To appear in the IEEE International Conference on Computer Communications (INFOCOM)
10-13 May 2021. Virtual Conference.
[Paper]
ASIACCS 2021
See through Walls: Detecting Malware in SGX Enclaves with SGX-Bouncer
Zeyu Zhang, Xiaoli Zhang, Qi Li, Kun Sun, Yinqian Zhang, SongSong Liu, Yukun Liu, and Xiaoning Li
To appear in The ACM Asia Conference on Computer and Communications Security (ACM ASIACCS)
Hong Kong, China, June 7-11, 2021
Acceptance ratio: 18.47%=29/157
[Paper]
SenSys 2020
TrustICT: An Efficient Trusted Interaction Interface between Isolated Execution Domains on ARM Multi-core Processors
Jie Wang, Yuewu Wang, Lingguang Lei, Kun Sun, Jiwu Jing, and Quan Zhou
To appear in the 18th ACM Conference on Embedded Networked Sensor Systems (SenSys)
Yokohama, Japan November 16-19, 2020
[Paper]
ACSAC 2020
RusTEE: Developing Memory-Safe ARM TrustZone Applications
Shengye Wan, Mingshen Sun, Kun Sun, Ning Zhang, and Xu He
To appear in Annual Computer Security Applications Conference (ACSAC)
Austin, Texas, USA, December 7-11, 2020
[Paper]
ISC 2020
Evaluation on the Security of Commercial Cloud Container Services
Yifei Wu, Lingguang Lei, Yuewu Wang, Kun Sun, and Jingzi Meng
To appear in the 23th Information Security Conference (ISC)
Bali, Indonesian, December 16-19, 2020
Acceptance ratio: 25.50%=23/90
[Paper]
CCS 2020
Cache-in-the-Middle (CITM) Attacks : Manipulating Sensitive Data in Isolated Execution Environments
Jie Wang, Kun Sun, Lingguang Lei, Shengye Wan, Yuewu Wang, and Jiwu Jing
To appear in ACM Conference on Computer and Communications Security (CCS)
Orlando, USA, November 9-13, 2020
[Paper]
CCS 2020
Off-Path TCP Exploits of the Mixed IPID Assignment
Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, and Ke Xu
To appear in ACM Conference on Computer and Communications Security (CCS)
Orlando, USA, November 9-13, 2020
[Paper]
CCS 2020
When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition
Shu Wang, Jiahao Cao, Xu He, Kun Sun, and Qi Li
To appear in ACM Conference on Computer and Communications Security (CCS)
Orlando, USA, November 9-13, 2020
[Paper]
SecureComm 2020
SGX-Cube: An SGX-Enhanced Single Sign-On System against Server-side Credential Leakage
Songsong Liu, Qiyang Song, Kun Sun, and Qi Li
To appear in the 16th EAI International Conference on Security and Privacy in Communication Networks (SecureComm)
Washington D.C., USA, October 21-23, 2020
[Paper]
RAID 2020
SIEVE: Secure In-Vehicle Automatic Speech Recognition Systems
Shu Wang, Jiahao Cao, Kun Sun, and Qi Li
To appear in the International Symposium on Research in Attacks, Intrusions and Defenses (RAID)
Donostia/San Sebastian, Spain, October 14-16, 2020
Acceptance ratio: 24.79%=31/121
[Paper]
TDSC 2020
JNI Global References Are Still Vulnerable: Attacks and Defenses
Yi He, Yuan Zhou, Yajin Zhou, Qi Li, Kun Sun, Yacong Gu, and Yong Jiang
To appear in the Transactions on Dependable and Secure Computing (TDSC)
2020
[pdf]
CNS 2020
A Machine Learning Approach to Classify Security Patches into Vulnerability Types
Xinda Wang, Shu Wang, Kun Sun, Archer Batcheller, and Sushil Jajodia
To appear in IEEE Conference on Communications and Network Security (CNS)
Virtual Conference, 29 June – 1 July 2020
[Paper]
CNS 2020
Towards a Believable Decoy System: Replaying Network Activities from Real System
Jianhua Sun, Kun Sun, and Qi Li
To appear in IEEE Conference on Communications and Network Security (CNS)
Virtual Conference, 29 June – 1 July 2020
[Paper]
TDSC 2020
Understanding Account Recovery in the Wild and Its Security Implications
Yue Li, Zeyu Chen, Haining Wang, Kun Sun, and Sushil Jajodia
To appear in the Transactions on Dependable and Secure Computing (TDSC)
2020
[pdf]
NDSS 2020
When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN
Jiahao Cao, Renjie Xie, Kun Sun, Qi Li, Guofei Gu, and Mingwei Xu
To appear in the Network and Distributed System Security Symposium (NDSS)
San Diego, CA, February 23-26, 2020
[Paper]
ICICS 2019
UBER: Combating Sandbox Evasion via User Behavior Emulators
Pengbin Feng, Jianhua Sun, Songsong Liu, and Kun Sun
Proceedings of the 21st International Conference on Information and Communications Security (ICICS)
Beijing, China, December 15-17, 2019
Acceptance ratio: 23.6%=47/199
[Paper]
DSC 2019
Federated-Cloud Based Deep Neural Networks with Privacy-Preserving Image Filtering Techniques
Isabelle Choi, Qiyang Song, and Kun Sun
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing (DSC)
Hangzhou, China, November 18-20, 2019.
MTD 2019
A Scalable High Fidelity Decoy Framework against Sophisticated Cyber Attacks
Jianhua Sun, Songsong Liu, and Kun Sun
Proceedings of the 6th ACM Workshop on Moving Target Defense (MTD) in conjunction with the 26th ACM Conference on Computer and Communications Security (ACM CCS)
London, UK, November 11, 2019
[Paper]
TDSC 2019
Vulnerable Service Invocation and Countermeasures
Huan Chang, Lingguang Lei, Kun Sun, Yuewu Wang, Jiwu Jing, Yi He, and Pingjian Wang
To appear in IEEE Transactions on Dependable and Secure Computing (TDSC)
ESORICS 2019
OCRAM-assisted Sensitive Data Protection on ARM-based Platform
Dawei Chu, Yuewu Wang, Lingguang Lei, Yanchu Li, Jiwu Jing, and Kun Sun
In the European Symposium on Research in Computer Security (ESORICS)
Luxembourg, September 23-27, 2019
Acceptance ratio: 19.5%=67/344
[Paper]
SecureComm 2019
Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts
Jiahao Cao, Kun Sun, Qi Li, Mingwei Xu, Zijie Yang, Kyung Joon Kwak, and Jason Li
In the 15th International Conference on Security and Privacy in Communication Networks (SecureComm)
Orlando, FL, USA, October 23-25, 2019
[Paper]
SecureComm 2019
Automated IoT Device Fingerprinting Through Encrypted Stream Classification
Jianhua Sun, Kun Sun, and Chris Shenefiel
In the 15th International Conference on Security and Privacy in Communication Networks (SecureComm)
Orlando, FL, USA, October 23-25, 2019
[Paper]
RAID 2019
Fingerprinting SDN Applications via Encrypted Control Traffic
Jiahao Cao, Zijie Yang, Kun Sun, Qi Li, Mingwei Xu, and Peiyi Han
In the 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID)
September 23-25, 2019
Acceptance ratio: 22.28%=37/166
[Paper]
DSN 2019
SATIN: A Secure and Trustworthy Asynchronous Introspection onMulti-Core ARM Processors
Shengye Wan, Jianhua Sun, Kun Sun, Ning Zhang, and Qi Li
In the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
Portland, Oregon, June 24-27, 2019
Acceptance ratio: 21.40%=54/252
[Paper]
DSN 2019
Detecting "0-Day" Vulnerability: An Empirical Study of Secret Security Patch in OSS (short paper)
Xinda Wang, Kun Sun, Archer Batcheller, and Sushil Jajodia
In the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
Portland, Oregon, June 24-27, 2019
Acceptance ratio: 21.40%=54/252
[Paper]
Security 2019
The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links
Jiahao Cao, Qi Li, Renjie Xie, Kun Sun, Guofei Gu, Mingwei Xu, and Yuan Yang
In 28th USENIX Security Symposium (USENIX Security)
Santa Clara, CA, August 14-16, 2019
First round acceptance ratio: 9.8%=25/254
[Paper]
CyberSecurity 2019
PathMarker: Protecting Web Contents against Inside Crawlers
Shengye Wan, Yue Li, and Kun Sun
In CyberSecurity, Volume 2, number 1, February 20, 2019
ACSAC 2018
A Measurement Study on Linux Container Security: Attacks and Countermeasures
Xin Lin, Yuewu Wang, Lingguang Lei, Jiwu Jing, Kun Sun, and Quan Zhou
In 2018 Annual Computer Security Applications Conference (ACSAC)
San Juan, Puerto Rico, December 3-7, 2018
Acceptance ratio: 20.1%=60/299
[Paper]
ICDCS 2018
CADET: Investigating a Collaborative and Distributed Entropy Transfer Protocol
Kyle Wallace, Gang Zhou, and Kun Sun
In the 38th IEEE International Conference on Distributed Computing Systems (ICDCS)
Vienna, Austria, July 2-5, 2018
[Paper]
TIFS 2018
Memory Forensic Challenges Under Misused Architectural Features
Ning Zhang, Ruide Zhang, Kun Sun, Wenjing Lou, Tom Hou, and Sushil Jajodia
In IEEE Transactions on Information Forensics and Security (TIFS), vol 13, no 9, pp 2345-2358
September 2018
INFOCOM 2018
TruSense: Information Leakage from TrustZone
Ning Zhang, Kun Sun, Deborah Shands, Wenjing Lou, and Thomas Hou
In IEEE International Conference on Computer Communications (INFOCOM)
Honolulu, HI, April 15-19, 2018
Acceptance ratio: 19.2%=309/1,606
[Paper]
INFOCOM 2018
Email as a Master Key: Analyzing Account Recovery in the Wild
Yue Li, Haining Wang, and Kun Sun
In IEEE International Conference on Computer Communications (INFOCOM)
Honolulu, HI, April 15-19, 2018
Acceptance ratio: 19.2%=309/1,606
[Paper]
CCS 2017
Vulnerable Implicit Service: A Revisit
Lingguang Lei, Yi He, Kun Sun, Jiwu Jing, Yuewu Wang, Qi Li, and Jian Weng
In the 24th ACM Conference on Computer and Communications Security (CCS)
Dallas, Texas, October 30-November 3, 2017
Acceptance ratio: 18%=151/836
[Paper]
SecureComm 2017
BluePass: A Secure Hand-free Password Manager
Yue Li, Haining Wang, and Kun Sun
In the International Conference on Security and Privacy in Communication Networks (SECURECOMM)
Niagara Falls, CANADA, October 22-25, 2017
Acceptance ratio (full paper): 29.5%=31/105
[Paper]
SecureComm 2017
LinkFlow: Efficient Large-Scale Inter-App Privacy Leakage Detection
Yi He, Qi Li, and Kun Sun
in the International Conference on Security and Privacy in Communication Networks (SECURECOMM)
Niagara Falls, CANADA, October 22-25, 2017
Acceptance ratio (full paper): 29.5%=31/105
[Paper]
SecureComm 2017
Disrupting SDN via the Data Plane: A Low-Rate Flow Table Overflow Attack
Jiahao Cao, Mingwei Xu, Qi Li, Kun Sun, Yuan Yang, and Jing Zheng
In the International Conference on Security and Privacy in Communication Networks (SECURECOMM)
Niagara Falls, CANADA, October 22-25, 2017
Acceptance ratio (full paper): 29.5%=31/105
[Paper]
CNS 2017
CyberMoat: Camouflaging Critical Server Infrastructures with Large Scale Decoy Farms
Jianhua Sun, Kun Sun, and Qi Li
In IEEE Conference on Communications and Network Security (CNS)
Las Vegas, NV,October 9-11, 2017
Acceptance ratio: 29.99%=41/137
[Paper]
TIFS 2017
Personal Information in Passwords and Its Security Implications
Yue Li, Haining Wang, and Kun Sun
In IEEE Transactions on Information Forensics and Security (TIFS) page 2320-2333, Vol 12, Issue 10
October 2017
DIMVA 2017
SPEAKER: Split-Phase Execution of Application Containers
Lingguang Lei, Jianhua Sun, Kun Sun, Chris Shenefiel, Rui Ma, Yuewu Wang, and Qi Li
In the 14th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)
Bonn, Germany, July 6-7 2017
Acceptance ratio: 26.86%=18/67
[Paper]
DSN 2017
JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android
Yacong Gu, Kun Sun, Purui Su, Qi Li, Yemian Lu, Lingyun Ying, and Denguo Feng
In the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
Denver, CO, June 26-29, 2017
Acceptance ratio: 22.27%=49/220
[Paper]
ICC 2017
Protecting Web Contents against Persistent Distributed Crawlers
Shengye Wan, Yue Li, and Kun Sun
In the IEEE ICC 2017, Communication and Information Systems Security Symposium
Paris, France, 2017
[Paper]
ICC 2017
A Measurement Study on Amazon Wishlist and Its Privacy Exposure
Yue Li, Nan Zheng, Haining Wang, Kun Sun, and Hui Fang
In the IEEE ICC 2017, Communication and Information Systems Security Symposium
Paris, France, 2017
[Paper]
CC 2017
FEC-Seluge: Efficient, Reliable, and Secure Large Data Dissemination using Erasure Codes
Gangwon Hyun, Kun Sun, and Peng Ning
In Computer Communications, 104, 191-203
May 2017
IoT 2016
Toward Sensor-Based Random Number Generation for Mobile and IoT Devices
Kyle Wallace, Kevin Moran, Ed Novak, Gang Zhou, and Kun Sun
In the IEEE Internet of Things Journal, vol 3, no 6, pp 1189-1201
December 2016.
ICDCS 2016
Amnesia: A Bilateral Generative Password Manager
Luren Wang, Yue Li, and Kun Sun
in the 36th IEEE International Conference on Distributed Computing Systems (ICDCS)
Nara, Japan, June 27-30, 2016
Acceptance ratio: 17.62%=68/386
[Paper]
S&P 2016
CaSE: Cache-Assisted Secure Execution on ARM Processors
Ning Zhang, Kun Sun, Wenjing Lou, and Tom Hou
in the 37th IEEE Symposium on Security and Privacy (S&P)
San Jose, CA, USA, MAY 23-25, 2016
Acceptance ratio: 13.75%=55/400
[Paper]
ASIACCS 2016
Privacy Breach by Exploiting postMessage in HTML5: Identification, Evaluation, and Countermeasure
Chong Guan, Kun Sun, Zhan Wang, and Wen Tao Zhu
in the 11th ACM Symposium on Information, Compute rand Communications Security (ASIACCS)
Xi'an, China, May 30 June 3, 2016
Acceptance ratio: 20.9%=73/350 (full paper)
[Paper]
INFOCOM 2016
A Study of Personal Information in Human-chosen Passwords and Its Security Implications
Yue Li, Haining Wang, and Kun Sun
in IEEE International Conference on Computer Communications (INFOCOM)
San Francisco, CA, April 10-15, 2016
Acceptance ratio: 18.25%=300/1,644
[Paper]
INFOCOM 2016
DESIR: Decoy-Enhanced Seamless IP Randomization
Jianhua Sun and Kun Sun
In IEEE International Conference on Computer Communications (INFOCOM)
San Francisco, CA, April 10-15, 2016
Acceptance ratio: 18.25%=300/1,644
[Paper]
EuroS&P 2016
CacheKit: Evading Memory Introspection Using Cache Incoherence
Ning Zhang, He Sun, Kun Sun, Wenjing Lou, and Thomas Hou
In the 1st IEEE European Symposium on Security and Privacy (EuroS&P)
Saarbrücken, GERMANY, March 21-24, 2016
Acceptance ratio: 17.26%=29/168
[Paper]
GameSec 2015
A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense
Andrew Clark, Kun Sun, Linda Bushnell, and Radha Poovendran
in the Sixth Conference on Decision and Game Theory for Security (GameSec)
London, UK, on November 4-5, 2015
Acceptance ratio: 43.24%=16/37 (full papers)
[Paper]
TIFS 2015
Reliable and Trustworthy Memory Acquisition on Smartphones
He Sun, Kun Sun, Yuewu Wang, and Jiwu Jing
In Information Forensics and Security, IEEE Transactions on (TIFS), vol.10, no.12, pp.2547-2561
December 2015
CCS 2015
TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens
He Sun, Kun Sun, Yuewu Wang, and Jiwu Jing
In the 22nd ACM Conference on Computer and Communications Security (CCS)
Denver, Colorado, October 12-16, 2015
Acceptance ratio: 19.81%=128/646
[Paper]
SRDS 2015
PmDroid: Permission Supervision for Android Advertising
Xing Gao, Dachuan Liu, Haining Wang, and Kun Sun
In the 34th Symposium on Reliable Distributed Systems (SRDS)
Montreal, Canada, September 28 - October 01, 2015
Acceptance ratio: 29.63%=24/81 (regular papers)
[Paper]
DSN 2015
TrustICE: Hardware-assisted Isolated Computing Environments on Mobile Devices
He Sun, Kun Sun, Yuewu Wang, Jiwu Jing, and Haining Wang
In the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
Rio de Janeiro, Brazil, June 22-25, 2015
Acceptance ratio: 21.83%=50/229
[Paper]
S&P 2015
Using Hardware Features for Increased Debugging Transparency
Fengwei Zhang, Kevin Leach, Angelos Stavrou, HainingWang, and Kun Sun
In the 36th IEEE Symposium on Security and Privacy (S&P)
Fairmont, San Jose, CA, May 18-20, 2015
Acceptance ratio:13.51%=55/407
[Paper]
ASIACCS 2015
Now You See Me: Hide and Seek in Physical Address Space
Ning Zhang, Kun Sun,Wenjing Lou, Y Thomas Hou, and Sushil Jajodia
In the 10th ACM Symposium on Information, Compute rand Communications Security (ASIACCS)
Singapore, April 14-17, 2015
Acceptance ratio: 17.84%=48/269 (full paper)
[Paper]
NDSS 2015
DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices
Xueqiang Wang, Kun Sun, Yuewu Wang, and Jiwu Jing
In the 22nd Annual Network & Distributed System Security Symposium (NDSS)
San Diego, California, February 2015
Acceptance ratio: 16.88%=51/302
[Paper]
ESORICS 2014
TrustDump: Reliable memory acquisition on smartphones
He Sun, Kun Sun, Yuewu Wang, Jiwi Jing, and Sushil Jajodia
In the Proceedings of 18th European Symposium on Research in Computer Security (ESORICS)
Wroclaw, Poland, September 7-11, 2014
Acceptance ratio: 24.78%=58/234
[Paper]
ASIACCS 2014
Remotely Wiping Sensitive Data on Stolen Smartphones
Xingjie Yu, Zhan Wang, Kun Sun, Wen Tao Zhu, Neng Gao, and Jiwu Jing
In the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS)
Kyoto, Japan, June 4-6, 2014
Acceptance ratio: 19.60%=50/255 (short paper)
[Paper]
TDSC 2014
HyperCheck: A Hardware-Assisted Integrity Monitor
Fengwei Zhang, Jiang Wang, Kun Sun, and Angelos Stavrou
in IEEE Transactions on Dependable and Secure Computing (TDSC), vol.11, no.4, pp.332,344
July-Aug 2014
[Paper]
PASSAT 2013
A Security Analysis of Two Commercial Browser and Cloud Based Password Managers
Rui Zhao, Chuan Yue, and Kun Sun
In Proceedings of the 5th ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT)
Alexandria, VA, September 2013
[Paper]
CDC 2013
Effectiveness of IP Address Randomization in Decoy-Based Moving Target Defense
Andrew W Clark, Kun Sun, and Radha Poovendran
In the 52nd IEEE Conference on Decision and Control (CDC)
Florence, Italy, December 10-13, 2013
[Paper]
CNS 2013
A Moving Target Defense Mechanism for MANETs Based on Identity Virtualization
Massimiliano Albanese, Alessandra De Benedictisy, Sushil Jajodia, and Kun Sun
In the First IEEE Conference on Communications and Network Security (CNS)
Washington D.C., USA, October 14-16, 2013
Acceptance ratio: 28.36%=40/141
[Paper]
DBSEC 2013
TerraCheck: Verification of Dedicated Cloud Storage
Zhan Wang, Kun Sun, Sushil Jajodia, and Jiwu Jing
In the 27th IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC)
Rutgers University, Newark, NJ, USA, July 15-17, 2013
Acceptance ratio: 35.55%=16/45 (full paper)
[Paper]
ICCCN 2013
MOTAG: Moving Target Defense Against Internet Denial of Service Attacks
Quan Jia, Kun Sun, and Angelos Stavrou
In the International Conference on Computer Communications and Networks (ICCCN)
Nassau, Bahamas, 2013
Acceptance ratio: 28.66%=86/300 (regular paper)
[Paper]
DSN 2013
Spectre: A Dependable Introspection Framework via System Management Mode
Fengwei Zhang, Kevin Leach, Kun Sun, and Angelos Stavrou
In the 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) Budapest, June 2013
Acceptance ratio: 20.90%=46/220
[Paper]
IPDPS 2013
On Feasibility of Fingerprinting Wireless Sensor Nodes Using Physical Properties
Xiaowei Mei, Donggang Liu, Kun Sun, and Dingbang Xu
In the 27th IEEE International Parallel & Distributed Processing Symposium (IPDPS>)
Boston, Massachusetts, May 2013
Acceptance ratio: 21.45%=106/494
[Paper]
DIMVA 2012
NetGator: Malware Detection Using Program Interactive Challenges
Brian Schulte, Haris Andrianakis, Kun Sun ,and Angelos Stavrou
In the 9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)
Heraklion, Crete, Greece, July 26-27th, 2012
Acceptance ratio: 31.81%=14/44
[Paper]
DSN 2012
A Dependability Analysis of Hardware-Assisted Polling Integrity Checking Systems
Jiang Wang, Kun Sun, and Angelos Stavrou
In the Proceedings of the 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
Boston, Massachusetts, June 2012
Acceptance ratio: 21.61%=51/236
[Paper]
NDSS 2012
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes
Kun Sun, Jiang Wang, Fengwei Zhang, and Angelos Stavrou
In the Proceedings of the 19th Annual Network & Distributed System Security Symposium (NDSS)
San Diego, California, 5-8 February 2012
Acceptance ratio: 17.82%=46/258
[Paper]

Team

Dr. Kun Sun

Director

Dr. Pengbin Feng

Postdoc

Songsong Liu

PhD Candidate

Xinda Wang

PhD Student

Shu Wang

PhD Student

Xu He

PhD Student

Jie Wang

PhD Candidate

Tommy Chin

PhD Student

Alumni

Shengye Wan, PhD, 2020, Facebook
Jiahao Cao, visiting PhD student, 2019-2020
Jianhua Sun, PhD, 2019, Facebook
Yue Li, PhD, 2019, Facebook
Kyle Wallace, PhD, 2018, MITRE
Lingguang Lei, Postdoc, 2015-2017, CAS
He Sun, visiting PhD student, 2014-2015, Ant Finacial
Chong Guan, visiting PhD student, 2016-2017 

Zeyu Zhang, visiting Master student, 2019-2020 

Qiyang Song, visiting Master student, 2019-2020

Yunlong Xing, visiting Master student, 2018-2020
Bennett Summers, Master, 2016

Sponsors