What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Peng Ning
Google Scholar
59
publications in security and cryptology related venues
Year
Venue
Title
2017
conf/ccs
SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android.
Ruowen Wang
Ahmed M. Azab
William Enck
Ninghui Li
Peng Ning
Xun Chen
Wenbo Shen
Yueqiang Cheng
2017
conf/ccs
PrivWatcher: Non-bypassable Monitoring and Protection of Process Credentials from Memory Corruption Attacks.
Quan Chen
Ahmed M. Azab
Guruprasad Ganesh
Peng Ning
2016
journals/tifs
Mimicry Attacks Against Wireless Link Signature and New Defense Using Time-Synched Link Signature.
Song Fang
Yao Liu
Peng Ning
2016
conf/ndss
SKEE: A lightweight Secure Kernel-level Execution Environment for ARM.
Ahmed M. Azab
Kirk Swidowski
Rohan Bhutkar
Jia Ma
Wenbo Shen
Ruowen Wang
Peng Ning
2015
conf/uss
EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning.
Ruowen Wang
William Enck
Douglas S. Reeves
Xinwen Zhang
Peng Ning
Dingbang Xu
Wu Zhou
Ahmed M. Azab
2014
journals/tifs
Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps.
Yuan Zhang
Min Yang
Zhemin Yang
Guofei Gu
Peng Ning
Binyu Zang
2014
conf/ccs
Samsung KNOX and Enterprise Mobile Security.
Peng Ning
2014
conf/ccs
Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World.
Ahmed M. Azab
Peng Ning
Jitesh Shah
Quan Chen
Rohan Bhutkar
Guruprasad Ganesh
Jia Ma
Wenbo Shen
2014
conf/uss
DACSA: A Decoupled Architecture for Cloud Security Analysis.
Jason Gionta
Ahmed M. Azab
William Enck
Peng Ning
Xiaolan Zhang
2014
conf/cns
The security of link signature: A view from channel models.
Xiaofan He
Huaiyu Dai
Yufan Huang
Dong Wang
Wenbo Shen
Peng Ning
2014
conf/cns
MCR Decoding: A MIMO approach for defending against wireless jamming attacks.
Wenbo Shen
Peng Ning
Xiaofan He
Huaiyu Dai
Yao Liu
2014
conf/acsac
SEER: practical memory virus scanning as a service.
Jason Gionta
Ahmed M. Azab
William Enck
Peng Ning
Xiaolan Zhang
2013
conf/ccs
Vetting undesirable behaviors in android apps with permission use analysis.
Yuan Zhang
Min Yang
Bingquan Xu
Zhemin Yang
Guofei Gu
Peng Ning
Xiaoyang Sean Wang
Binyu Zang
2013
conf/ccs
AppIntent: analyzing sensitive data transmission in android for privacy leakage detection.
Zhemin Yang
Min Yang
Yuan Zhang
Guofei Gu
Peng Ning
Xiaoyang Sean Wang
2013
conf/uss
MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis.
Ruowen Wang
Peng Ning
Tao Xie
Quan Chen
2013
conf/sp
Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time.
Wenbo Shen
Peng Ning
Xiaofan He
Huaiyu Dai
2013
conf/cns
Dynamic adaptive anti-jamming via controlled mobility.
Xiaofan He
Huaiyu Dai
Peng Ning
2013
conf/ndss
Program Chair's Message.
Peng Ning
2012
journals/tifs
Jamming-Resistant Collaborative Broadcast Using Uncoordinated Frequency Hopping.
Liang Xiao
Huaiyu Dai
Peng Ning
2012
conf/fc
Efficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit Logging.
Attila Altay Yavuz
Peng Ning
Michael K. Reiter
2012
conf/acns
iHTTP: Efficient Authentication of Non-confidential HTTP Traffic.
Jason Gionta
Peng Ning
Xiaolan Zhang
2011
conf/ccs
Poster: mimicry attacks against wireless link signature.
Yao Liu
Peng Ning
2011
conf/ccs
SICE: a hardware-level strongly isolated computing environment for x86 multi-core platforms.
Ahmed M. Azab
Peng Ning
Xiaolan Zhang
2010
conf/ccs
HyperSentry: enabling stealthy in-context measurement of hypervisor integrity.
Ahmed M. Azab
Peng Ning
Zhi Wang
Xuxian Jiang
Xiaolan Zhang
Nathan C. Skalsky
2010
conf/sp
Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures.
Yao Liu
Peng Ning
Huaiyu Dai
2010
conf/acsac
Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure.
An Liu
Peng Ning
Huaiyu Dai
Yao Liu
Cliff Wang
2010
conf/acsac
Always up-to-date: scalable offline patching of VM images in a compute cloud.
Wu Zhou
Peng Ning
Xiaolan Zhang
Glenn Ammons
Ruowen Wang
Vasanth Bala
2009
conf/ccs
Countering kernel rootkits with lightweight hook protection.
Zhi Wang
Xuxian Jiang
Weidong Cui
Peng Ning
2009
conf/ccs
False data injection attacks against state estimation in electric power grids.
Yao Liu
Michael K. Reiter
Peng Ning
2009
conf/ccs
Managing security of virtual machine images in a cloud environment.
Jinpeng Wei
Xiaolan Zhang
Glenn Ammons
Vasanth Bala
Peng Ning
2009
conf/dsn
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence.
Chongkyung Kil
Emre Can Sezer
Ahmed M. Azab
Peng Ning
Xiaolan Zhang
2009
conf/acsac
HIMA: A Hypervisor-Based Integrity Measurement Agent.
Ahmed M. Azab
Peng Ning
Emre Can Sezer
Xiaolan Zhang
2009
conf/acsac
BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems.
Attila Altay Yavuz
Peng Ning
2009
conf/wisec
Securing network access in wireless sensor networks.
Kun Sun
An Liu
Roger Xu
Peng Ning
W. Douglas Maughan
2008
conf/wisec
Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks.
Qi Dong
Donggang Liu
Peng Ning
2007
conf/ccs
-anonymous communication protocol for overlay networks.
Pan Wang
Peng Ning
Douglas S. Reeves
2007
conf/ccs
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities.
Emre Can Sezer
Peng Ning
Chongkyung Kil
Jun Xu
2007
conf/ccs
Analyzing network traffic to detect self-decrypting exploit code.
Qinghua Zhang
Douglas S. Reeves
Peng Ning
S. Purushothaman Iyer
2007
conf/acsac
Automated Security Debugging Using Program Structural Constraints.
Chongkyung Kil
Emre Can Sezer
Peng Ning
Xiaolan Zhang
2006
conf/ccs
TinySeRSync: secure and resilient time synchronization in wireless sensor networks.
Kun Sun
Peng Ning
Cliff Wang
2006
conf/sp
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques.
Pai Peng
Peng Ning
Douglas S. Reeves
2006
conf/acsac
Secure Distributed Cluster Formation in Wireless Sensor Networks.
Kun Sun
Pai Peng
Peng Ning
Cliff Wang
2006
conf/acsac
Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software.
Chongkyung Kil
Jinsuk Jun
Christopher Bookholt
Jun Xu
Peng Ning
2005
conf/ccs
Automatic diagnosis and response to memory corruption vulnerabilities.
Jun Xu
Peng Ning
Chongkyung Kil
Yan Zhai
Christopher Bookholt
2005
conf/icics
Network Access Control for Mobile Ad-Hoc Networks.
Pan Wang
Peng Ning
Douglas S. Reeves
2005
conf/acsac
Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach.
Dingbang Xu
Peng Ning
2004
conf/sp
An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks.
Sencun Zhu
Sanjeev Setia
Sushil Jajodia
Peng Ning
2004
conf/ndss
Building Attack Scenarios through Integration of Complementary Alert Correlation Method.
Peng Ning
Dingbang Xu
Christopher G. Healey
Robert St. Amant
2004
conf/ctrsa
Improving Robustness of PGP Keyrings by Conflict Detection.
Qinglin Jiang
Douglas S. Reeves
Peng Ning
2004
conf/acsac
Reasoning About Complementary Intrusion Evidence.
Yan Zhai
Peng Ning
Purush Iyer
Douglas S. Reeves
2004
conf/acsac
Alert Correlation through Triggering Events and Common Resources.
Dingbang Xu
Peng Ning
2003
conf/ccs
Establishing pairwise keys in distributed sensor networks.
Donggang Liu
Peng Ning
2003
conf/ccs
Learning attack strategies from intrusion alerts.
Peng Ning
Dingbang Xu
2003
conf/ccs
Efficient self-healing group key distribution with revocation capability.
Donggang Liu
Peng Ning
Kun Sun
2003
conf/ndss
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks.
Donggang Liu
Peng Ning
2002
conf/ccs
Constructing attack scenarios through correlation of intrusion alerts.
Peng Ning
Yun Cui
Douglas S. Reeves
2001
conf/icics
Efficient Software Implementation for Finite Field Multiplication in Normal Basis.
Peng Ning
Yiqun Lisa Yin
2000
conf/sec
CARDS: A Distributed System for Detecting Coordinated Attacks.
Jiahai Yang
Peng Ning
Xiaoyang Sean Wang
Sushil Jajodia
2000
conf/dsn
Avoiding Loss of Fairness Owing to Process Crashes in Fair Data Exchange Protocols.
Peng Liu
Peng Ning
Sushil Jajodia
Coauthors
Ahmed M. Azab
(11)
An Liu
(2)
Attila Altay Yavuz
(2)
Bingquan Xu
(1)
Binyu Zang
(2)
Chongkyung Kil
(5)
Christopher Bookholt
(2)
Christopher G. Healey
(1)
Cliff Wang
(3)
Dingbang Xu
(5)
Dong Wang
(1)
Donggang Liu
(4)
Douglas S. Reeves
(8)
Emre Can Sezer
(4)
Glenn Ammons
(2)
Guofei Gu
(3)
Guruprasad Ganesh
(2)
Huaiyu Dai
(7)
Jason Gionta
(3)
Jia Ma
(2)
Jiahai Yang
(1)
Jinpeng Wei
(1)
Jinsuk Jun
(1)
Jitesh Shah
(1)
Jun Xu
(3)
Kirk Swidowski
(1)
Kun Sun
(4)
Liang Xiao
(1)
Michael K. Reiter
(2)
Min Yang
(3)
Nathan C. Skalsky
(1)
Ninghui Li
(1)
Pai Peng
(2)
Pan Wang
(2)
Peng Liu
(1)
Peng Ning
(59)
Purush Iyer
(1)
Qi Dong
(1)
Qinghua Zhang
(1)
Qinglin Jiang
(1)
Quan Chen
(3)
Robert St. Amant
(1)
Roger Xu
(1)
Rohan Bhutkar
(2)
Ruowen Wang
(5)
S. Purushothaman Iyer
(1)
Sanjeev Setia
(1)
Sencun Zhu
(1)
Song Fang
(1)
Sushil Jajodia
(3)
Tao Xie
(1)
Vasanth Bala
(2)
W. Douglas Maughan
(1)
Weidong Cui
(1)
Wenbo Shen
(6)
William Enck
(4)
Wu Zhou
(2)
Xiaofan He
(4)
Xiaolan Zhang
(10)
Xiaoyang Sean Wang
(3)
Xinwen Zhang
(1)
Xun Chen
(1)
Xuxian Jiang
(2)
Yan Zhai
(2)
Yao Liu
(6)
Yiqun Lisa Yin
(1)
Yuan Zhang
(3)
Yueqiang Cheng
(1)
Yufan Huang
(1)
Yun Cui
(1)
Zhemin Yang
(3)
Zhi Wang
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to