Site-wide links

Scholarly Works

Ziming Zhao
Assistant Professor

2018 Submissions

Journal Paper

Chen, Jing, et al. "Uncovering the Face of Android Ransomware: Characterization and Real-time Detection." IEEE Transactions on Information Forensics & Security (TIFS). (2018): 0-0. Print. *

Published Conference Proceedings

Baek, Jaejong, et al. "Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling." Proceedings of the Annual Computer Security Applications Conference (ACSAC). Ed. N/A. N/A, Puerto Rico: n.p., 2018. Print. «

Dixit, Vaibhav Hemant, et al. "AIM-SDN: Attacking Information Mismanagement in SDN-datastores." Proceedings of the ACM Conference on Computer and Communications Security (CCS). Ed. N/A. n.p., 2018. Print. *

Cho, Haehyun, et al. "Prime+Count: Novel Cross-world Covert Channels on ARM TrustZone." Proceedings of the Annual Computer Security Applications Conference (ACSAC). Ed. N/A. n.p., 2018. Print. «

Coughlin, Vu, et al. "EDSGuard: Enforcing Network Security Requirements for Energy Delivery Systems." Proceedings of the IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm). Ed. N/A. N/A, N/A: n.p., 2018. Print. «

Gutierrez, Mauricio, et al. "CacheLight: Defeating the CacheKit Attack." Proceedings of the Workshop on Attacks and Solutions in Hardware Security (Ashes). Ed. N/A. n.p., 2018. Print. «

Mabey, Mike, et al. "Challenges, Opportunities, and a Framework for Web Environment Forensics." Proceedings of the IFIP Working Group 11.9 Digital Forensics (11.9 Digital Forensics). Ed. N/A. n.p., 2018. Print. «

Chandramouli, Sai Prashanth, et al. "Measuring E-Mail Header Injections on the World Wide Web." Proceedings of the ACM/SIGAPP Symposium On Applied Computing (SAC). Ed. N/A. n.p., 2018. Print. «

Lamp, Josephine, et al. "The Danger of Missing Instructions: A Systematic Analysis of Security Requirements for MCPS." Proceedings of the International Workshop on Security, Privacy, and Trustworthiness in Medical Cyber-Physical Systems (MedSPT). Ed. N/A. Washington, DC: n.p., 2018. Print. «

Medrano, Carlos Rubio, Ziming Zhao, and Gail-Joon Ahn. "RiskPol: A Risk Assessment Framework for Preventing Attribute-Forgery Attacks to ABAC Policies." Proceedings of the ACM Workshop on Attribute Based Access Control (ABAC). Ed. N/A. Tempe, AZ: AMC, 2018. Print. «

Dixit, Vaibhav Hemant, et al. "Challenges and Preparedness of SDN-based Firewalls." Proceedings of the ACM Workshop on Security in Software Defined Networks and Network Function Virtualization (SDNNFV). Ed. N/A. Tempe, AZ: n.p., 2018. Print. «

2017 Submissions

Published Conference Proceedings

Sengupta, Sailik, et al. "A Game Theoretic Approach in Strategy Generation for Moving Target Defense in Web Applications." Proceedings of the International Conference on Autonomous Agents and Multiagent Systems. Ed. N/A. N/A, N/A: n.p., 2017. Print. «

Deng, Juan, et al. "On the Safety and Efficiency of Virtual Firewall Elasticity Control." Proceedings of the Network and Distributed System Security Symposium (NDSS), 2017. Ed. N/A. N/A, N/A: n.p., 2017. Print. «

2016 Submissions

Journal Paper

Jing, Yiming, et al. "TRIPLEMON: A Multi-layer Security Framework for Mediating Inter-Process Communication on Android." Journal of Computer Security (JCS). (2016): 0-0. Print. *