Password triggered trusted encryption key deletion M Mannan, L Zhao US Patent 10,516,533, 2019 | 70 | 2019 |
Explicit authentication response considered harmful L Zhao, M Mannan Proceedings of the 2013 New Security Paradigms Workshop, 77-86, 2013 | 21 | 2013 |
Emilia: Catching Iago in Legacy Code. R Cui, L Zhao, D Lie NDSS, 2021 | 18 | 2021 |
TEE-aided Write Protection Against Privileged Data Tampering L Zhao, M Mannan NDSS, 2019 | 17 | 2019 |
Gracewipe: Secure and Verifiable Deletion under Coercion. L Zhao, M Mannan NDSS, 2015 | 13 | 2015 |
Hypnoguard: Protecting secrets across sleep-wake cycles L Zhao, M Mannan Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 12 | 2016 |
Is hardware more secure than software? L Zhao, D Lie IEEE Security & Privacy 18 (5), 8-17, 2020 | 10 | 2020 |
Sok: Hardware security support for trustworthy execution L Zhao, H Shuang, S Xu, W Huang, R Cui, P Bettadpur, D Lie arXiv preprint arXiv:1910.04957, 2019 | 8 | 2019 |
One-Time Programs Made Practical L Zhao, J Choi, D Demirag, K Butler, M Mannan, E Ayday, J Clark Financial Cryptography and Data Security, 2019 | 8 | 2019 |
Measuring the leakage and exploitability of authentication secrets in super-apps: The wechat case S Baskaran, L Zhao, M Mannan, A Youssef Proceedings of the 26th International Symposium on Research in Attacks …, 2023 | 6 | 2023 |
Towards 5G-ready security metrics L Zhao, MS Oshman, M Zhang, FF Moghaddam, S Chander, M Pourzandi ICC 2021-IEEE International Conference on Communications, 1-6, 2021 | 5 | 2021 |
Using Inputs and Context to Verify User Intentions in Internet Services H Shuang, W Huang, P Bettadpur, L Zhao, I Pustogarov, D Lie APSys'19, 2019 | 3 | 2019 |
A Hybrid Decision-making Approach to Security Metrics Aggregation in Cloud Environments M Lei, L Zhao, M Pourzandi, FF Moghaddam 2022 IEEE International Conference on Cloud Computing Technology and Science …, 2022 | 2 | 2022 |
Deceptive Deletion Triggers under Coercion L Zhao, M Mannan IEEE Transactions on Information Forensics and Security 11 (12), 2763-2776, 2016 | 2 | 2016 |
VIET: A Tool for Extracting Essential Information from Vulnerability Descriptions for CVSS Evaluation S Zhang, M Zhang, L Zhao IFIP Annual Conference on Data and Applications Security and Privacy, 386-403, 2023 | 1 | 2023 |
vWitness: Certifying Web Page Interactions with Computer Vision H Shuang, L Zhao, D Lie 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2023 | 1 | 2023 |
Authentication and Data Protection under Strong Adversarial Model L Zhao Concordia University, 2018 | 1 | 2018 |
Dumviri: Detecting Trackers and Mixed Trackers with a Breakage Detector H Shuang, L Zhao, D Lie arXiv preprint arXiv:2402.08031, 2024 | | 2024 |
The Flaw Within: Identifying CVSS Score Discrepancies in the NVD S Zhang, M Cai, M Zhang, L Zhao, XC de Carnavalet 2023 IEEE International Conference on Cloud Computing Technology and Science …, 2023 | | 2023 |
Protection system and method against unauthorized data alteration M Mannan, L Zhao US Patent 10,977,381, 2021 | | 2021 |