Loop: Logic-oriented opaque predicate detection in obfuscated binary code J Ming, D Xu, L Wang, D Wu Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015 | 111 | 2015 |
Software protection on the go: A large-scale empirical study on mobile app obfuscation P Wang, Q Bao, L Wang, S Wang, Z Chen, T Wei, D Wu Proceedings of the 40th International Conference on Software Engineering, 26-36, 2018 | 36 | 2018 |
Moving target defense against network reconnaissance with software defined networking L Wang, D Wu Information Security: 19th International Conference, ISC 2016, Honolulu, HI …, 2016 | 34 | 2016 |
V2G-Auth: Lightweight Authentication and Key Agreement Protocol for V2G Environment leveraging Physically Unclonable Functions AG Reddy, PR Babu, V Odelu, L Wang, SAP Kumar IEEE Transactions on Industrial Cyber-Physical Systems, 2023 | 14 | 2023 |
MetaHunt: Towards taming malware mutation via studying the evolution of metamorphic virus L Wang, D Xu, J Ming, Y Fu, D Wu Proceedings of the 3rd ACM Workshop on Software Protection, 15-26, 2019 | 9 | 2019 |
Bridging the gap between security tools and SDN controllers L Wang, D Wu EAI Endorsed Transactions on Security and Safety, 2018 | 8 | 2018 |
Shoal: A network level moving target defense engine with software defined networking L Wang EAI Endorsed Transactions on Security and Safety 7 (25), e5-e5, 2021 | 5 | 2021 |
Seccontrol: Bridging the gap between security tools and sdn controllers L Wang, D Wu Security and Privacy in Communication Networks: SecureComm 2017 …, 2018 | 5 | 2018 |
Reducing attack surface with vm-based phantom server L Wang, Z Wang, K Sun, S Jajodia MILCOM 2013-2013 IEEE Military Communications Conference, 1429-1435, 2013 | 5 | 2013 |
iCruiser: Protecting Kernel Link-Based Data Structures with Secure Canary W Li, D Wu, P Liu 2016 IEEE International Conference on Software Quality, Reliability and …, 2016 | 4 | 2016 |
Towards a Source-Code Oriented Attestation A Ruan, Q Shen, L Wang, Q Chao, L Gu, Z Chen CHINA COMMUNICATIONS 6 (No.4), 82-87, 2009 | 1 | 2009 |
Towards Network Level Moving Target Defense with Software Defined Networking L Wang The Pennsylvania State University, 2021 | | 2021 |
Trusted Isolation Environment: An Attestation Architecture with Usage Control Model A Ruan, Q Shen, L Gu, L Wang, L Shi, Y Yang, Z Chen The 11th International Conference on Information and Communications Security …, 2009 | | 2009 |