Seguir
Lianying Zhao
Lianying Zhao
Associate Professor, Carleton University, Canada
Dirección de correo verificada de scs.carleton.ca - Página principal
Título
Citado por
Citado por
Año
Password triggered trusted encryption key deletion
M Mannan, L Zhao
US Patent 10,516,533, 2019
872019
Emilia: Catching Iago in Legacy Code.
R Cui, L Zhao, D Lie
NDSS, 2021
232021
Explicit authentication response considered harmful
L Zhao, M Mannan
Proceedings of the 2013 New Security Paradigms Workshop, 77-86, 2013
222013
TEE-aided Write Protection Against Privileged Data Tampering
L Zhao, M Mannan
NDSS, 2019
182019
Measuring the leakage and exploitability of authentication secrets in super-apps: The wechat case
S Baskaran, L Zhao, M Mannan, A Youssef
Proceedings of the 26th International Symposium on Research in Attacks …, 2023
132023
Is hardware more secure than software?
L Zhao, D Lie
IEEE Security & Privacy 18 (5), 8-17, 2020
132020
Gracewipe: Secure and Verifiable Deletion under Coercion.
L Zhao, M Mannan
NDSS, 2015
132015
Hypnoguard: Protecting secrets across sleep-wake cycles
L Zhao, M Mannan
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
122016
One-Time Programs Made Practical
L Zhao, J Choi, D Demirag, K Butler, M Mannan, E Ayday, J Clark
Financial Cryptography and Data Security, 2019
102019
Sok: Hardware security support for trustworthy execution
L Zhao, H Shuang, S Xu, W Huang, R Cui, P Bettadpur, D Lie
arXiv preprint arXiv:1910.04957, 2019
92019
Towards 5G-ready security metrics
L Zhao, MS Oshman, M Zhang, FF Moghaddam, S Chander, M Pourzandi
ICC 2021-IEEE International Conference on Communications, 1-6, 2021
52021
VU Research Portal
J Ye, X Fei, XC de Carnavalet, L Zhao, L Wu, M Zhang
Computers & Security 144, 103971, 2024
32024
The Flaw Within: Identifying CVSS Score Discrepancies in the NVD
S Zhang, M Cai, M Zhang, L Zhao, XC de Carnavalet
2023 IEEE International Conference on Cloud Computing Technology and Science …, 2023
32023
VIET: A tool for extracting essential information from vulnerability descriptions for CVSS evaluation
S Zhang, M Zhang, L Zhao
IFIP Annual Conference on Data and Applications Security and Privacy, 386-403, 2023
32023
Using Inputs and Context to Verify User Intentions in Internet Services
H Shuang, W Huang, P Bettadpur, L Zhao, I Pustogarov, D Lie
APSys'19, 2019
32019
Exposed by default: A security analysis of home router default settings
J Ye, XDC De Carnavalet, L Zhao, M Zhang, L Wu, W Zhang
Proceedings of the 19th ACM Asia Conference on Computer and Communications …, 2024
22024
A Hybrid Decision-making Approach to Security Metrics Aggregation in Cloud Environments
M Lei, L Zhao, M Pourzandi, FF Moghaddam
2022 IEEE International Conference on Cloud Computing Technology and Science …, 2022
22022
Authentication and Data Protection under Strong Adversarial Model
L Zhao
Concordia University, 2018
22018
Deceptive Deletion Triggers under Coercion
L Zhao, M Mannan
IEEE Transactions on Information Forensics and Security 11 (12), 2763-2776, 2016
22016
Detecting command injection vulnerabilities in Linux-based embedded firmware with LLM-based taint analysis of library functions
J Ye, X Fei, XC de Carnavalet, L Zhao, L Wu, M Zhang
Computers & Security 144, 103971, 2024
12024
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20