Password triggered trusted encryption key deletion M Mannan, L Zhao US Patent 10,516,533, 2019 | 87 | 2019 |
Emilia: Catching Iago in Legacy Code. R Cui, L Zhao, D Lie NDSS, 2021 | 23 | 2021 |
Explicit authentication response considered harmful L Zhao, M Mannan Proceedings of the 2013 New Security Paradigms Workshop, 77-86, 2013 | 22 | 2013 |
TEE-aided Write Protection Against Privileged Data Tampering L Zhao, M Mannan NDSS, 2019 | 18 | 2019 |
Measuring the leakage and exploitability of authentication secrets in super-apps: The wechat case S Baskaran, L Zhao, M Mannan, A Youssef Proceedings of the 26th International Symposium on Research in Attacks …, 2023 | 13 | 2023 |
Is hardware more secure than software? L Zhao, D Lie IEEE Security & Privacy 18 (5), 8-17, 2020 | 13 | 2020 |
Gracewipe: Secure and Verifiable Deletion under Coercion. L Zhao, M Mannan NDSS, 2015 | 13 | 2015 |
Hypnoguard: Protecting secrets across sleep-wake cycles L Zhao, M Mannan Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 12 | 2016 |
One-Time Programs Made Practical L Zhao, J Choi, D Demirag, K Butler, M Mannan, E Ayday, J Clark Financial Cryptography and Data Security, 2019 | 10 | 2019 |
Sok: Hardware security support for trustworthy execution L Zhao, H Shuang, S Xu, W Huang, R Cui, P Bettadpur, D Lie arXiv preprint arXiv:1910.04957, 2019 | 9 | 2019 |
Towards 5G-ready security metrics L Zhao, MS Oshman, M Zhang, FF Moghaddam, S Chander, M Pourzandi ICC 2021-IEEE International Conference on Communications, 1-6, 2021 | 5 | 2021 |
VU Research Portal J Ye, X Fei, XC de Carnavalet, L Zhao, L Wu, M Zhang Computers & Security 144, 103971, 2024 | 3 | 2024 |
The Flaw Within: Identifying CVSS Score Discrepancies in the NVD S Zhang, M Cai, M Zhang, L Zhao, XC de Carnavalet 2023 IEEE International Conference on Cloud Computing Technology and Science …, 2023 | 3 | 2023 |
VIET: A tool for extracting essential information from vulnerability descriptions for CVSS evaluation S Zhang, M Zhang, L Zhao IFIP Annual Conference on Data and Applications Security and Privacy, 386-403, 2023 | 3 | 2023 |
Using Inputs and Context to Verify User Intentions in Internet Services H Shuang, W Huang, P Bettadpur, L Zhao, I Pustogarov, D Lie APSys'19, 2019 | 3 | 2019 |
Exposed by default: A security analysis of home router default settings J Ye, XDC De Carnavalet, L Zhao, M Zhang, L Wu, W Zhang Proceedings of the 19th ACM Asia Conference on Computer and Communications …, 2024 | 2 | 2024 |
A Hybrid Decision-making Approach to Security Metrics Aggregation in Cloud Environments M Lei, L Zhao, M Pourzandi, FF Moghaddam 2022 IEEE International Conference on Cloud Computing Technology and Science …, 2022 | 2 | 2022 |
Authentication and Data Protection under Strong Adversarial Model L Zhao Concordia University, 2018 | 2 | 2018 |
Deceptive Deletion Triggers under Coercion L Zhao, M Mannan IEEE Transactions on Information Forensics and Security 11 (12), 2763-2776, 2016 | 2 | 2016 |
Detecting command injection vulnerabilities in Linux-based embedded firmware with LLM-based taint analysis of library functions J Ye, X Fei, XC de Carnavalet, L Zhao, L Wu, M Zhang Computers & Security 144, 103971, 2024 | 1 | 2024 |