


Остановите войну!
for scientists:


default search action
Mingshen Sun
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c17]Jincheng Wang, Zhuohua Li, Mingshen Sun, Bin Yuan, John C. S. Lui:
IoT Anomaly Detection Via Device Interaction Graph. DSN 2023: 494-507 - [c16]Hongbo Chen, Haobin Hiroki Chen, Mingshen Sun, Kang Li, Zhaofeng Chen, XiaoFeng Wang:
A Verified Confidential Computing as a Service Framework for Privacy Preservation. USENIX Security Symposium 2023 - 2022
- [j4]Jincheng Wang, Zhuohua Li
, John C. S. Lui, Mingshen Sun:
Topology-theoretic approach to address attribute linkage attacks in differential privacy. Comput. Secur. 113: 102552 (2022) - [j3]Hui Xu, Zhuangbin Chen, Mingshen Sun, Yangfan Zhou, Michael R. Lyu:
Memory-Safety Challenge Considered Solved? An In-Depth Study with All Rust CVEs. ACM Trans. Softw. Eng. Methodol. 31(1): 3:1-3:25 (2022) - [c15]Zhuohua Li
, Jincheng Wang, Mingshen Sun, John C. S. Lui:
Detecting Cross-language Memory Management Issues in Rust. ESORICS (3) 2022: 680-700 - [c14]Jincheng Wang, Zhuohua Li, Mingshen Sun, John C. S. Lui:
Zigbee's Network Rejoin Procedure for IoT Systems: Vulnerabilities and Implications. RAID 2022: 292-307 - 2021
- [c13]Zhuohua Li
, Jincheng Wang, Mingshen Sun, John C. S. Lui:
MirChecker: Detecting Bugs in Rust Programs via Static Analysis. CCS 2021: 2183-2196 - [c12]Jincheng Wang, Zhuohua Li
, John C. S. Lui, Mingshen Sun:
Topology-Theoretic Approach To Address Attribute Linkage Attacks In Differential Privacy. INFOCOM Workshops 2021: 1-6 - 2020
- [j2]Yang Hu, Mingshen Sun, John C. S. Lui:
Exploiting non-uniform program execution time to evade record/replay forensic analysis. Comput. Secur. 88 (2020) - [c11]Shengye Wan, Mingshen Sun, Kun Sun, Ning Zhang, Xu He:
RusTEE: Developing Memory-Safe ARM TrustZone Applications. ACSAC 2020: 442-453 - [c10]Pei Wang, Yu Ding, Mingshen Sun, Huibo Wang, Tongxin Li, Rundong Zhou, Zhaofeng Chen, Yiming Jing:
Building and maintaining a third-party library supply chain for productive and secure SGX enclave development. ICSE (SEIP) 2020: 100-109 - [i5]Hui Xu, Zhuangbin Chen, Mingshen Sun, Yangfan Zhou:
Memory-Safety Challenge Considered Solved? An Empirical Study with All Rust CVEs. CoRR abs/2003.03296 (2020) - [i4]Pei Wang, Yu Ding, Mingshen Sun, Huibo Wang, Tongxin Li, Rundong Zhou, Zhaofeng Chen, Yiming Jing:
Building and Maintaining a Third-Party Library Supply Chain for Productive and Secure SGX Enclave Development. CoRR abs/2005.04367 (2020) - [i3]Huibo Wang, Mingshen Sun, Qian Feng, Pei Wang, Tongxin Li, Yu Ding:
Towards Memory Safe Python Enclave for Security Sensitive Computation. CoRR abs/2005.05996 (2020)
2010 – 2019
- 2019
- [c9]Zhuohua Li
, Jincheng Wang, Mingshen Sun, John C. S. Lui:
Securing the Device Drivers of Your Embedded Systems: Framework and Prototype. ARES 2019: 71:1-71:10 - [c8]Huibo Wang, Pei Wang, Yu Ding, Mingshen Sun, Yiming Jing, Ran Duan, Long Li, Yulong Zhang, Tao Wei, Zhiqiang Lin:
Towards Memory Safe Enclave Programming with Rust-SGX. CCS 2019: 2333-2350 - 2017
- [j1]Mingshen Sun
, Xiaolei Li, John C. S. Lui, Richard T. B. Ma
, Zhenkai Liang
:
Monet: A User-Oriented Behavior-Based Malware Variants Detection System for Android. IEEE Trans. Inf. Forensics Secur. 12(5): 1103-1112 (2017) - 2016
- [c7]Mingshen Sun, Tao Wei, John C. S. Lui:
TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime. CCS 2016: 331-342 - [c6]Mingshen Sun, John C. S. Lui, Yajin Zhou:
Blender: Self-randomizing Address Space Layout for Android Apps. RAID 2016: 457-480 - [i2]Mingshen Sun, Xiaolei Li, John C. S. Lui, Richard T. B. Ma, Zhenkai Liang:
Monet: A User-oriented Behavior-based Malware Variants Detection System for Android. CoRR abs/1612.03312 (2016) - 2015
- [c5]Mingshen Sun, Mengmeng Li, John C. S. Lui:
DroidEagle: seamless detection of visually similar Android apps. WISEC 2015: 9:1-9:12 - 2014
- [c4]Mingshen Sun, Min Zheng, John C. S. Lui, Xuxian Jiang:
Design and implementation of an Android host-based intrusion prevention system. ACSAC 2014: 226-235 - [c3]Min Zheng, Mingshen Sun, John C. S. Lui:
DroidRay: a security evaluation system for customized android firmwares. AsiaCCS 2014: 471-482 - [c2]Min Zheng, Mingshen Sun, John C. S. Lui:
DroidTrace: A ptrace based Android dynamic analysis system with forward execution capability. IWCMC 2014: 128-133 - 2013
- [c1]Min Zheng, Mingshen Sun, John C. S. Lui:
Droid Analytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware. TrustCom/ISPA/IUCC 2013: 163-171 - [i1]Min Zheng, Mingshen Sun, John C. S. Lui:
DroidAnalytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware. CoRR abs/1302.7212 (2013)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-09-27 22:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint