Discovering and understanding the security hazards in the interactions between {IoT} devices, mobile apps, and clouds on smart home platforms W Zhou, Y Jia, Y Yao, L Zhu, L Guan, Y Mao, P Liu, Y Zhang 28th USENIX security symposium (USENIX security 19), 1133-1150, 2019 | 198 | 2019 |
Trustshadow: Secure execution of unmodified applications with arm trustzone L Guan, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017 | 172 | 2017 |
Protecting private keys against memory disclosure attacks using hardware transactional memory L Guan, J Lin, B Luo, J Jing, J Wang 2015 IEEE Symposium on Security and Privacy, 3-19, 2015 | 134 | 2015 |
Automatic firmware emulation through invalidity-guided knowledge inference W Zhou, L Guan, P Liu, Y Zhang 30th USENIX Security Symposium (USENIX Security 21), 2007-2024, 2021 | 84 | 2021 |
Cyber–physical security of powertrain systems in modern electric vehicles: Vulnerabilities, challenges, and future visions J Ye, L Guo, B Yang, F Li, L Du, L Guan, W Song IEEE Journal of Emerging and Selected Topics in Power Electronics 9 (4 …, 2020 | 79 | 2020 |
Copker: Computing with Private Keys without RAM. L Guan, J Lin, B Luo, J Jing NDSS, 23-26, 2014 | 72 | 2014 |
Device-agnostic firmware execution is possible: A concolic execution approach for peripheral emulation C Cao, L Guan, J Ming, P Liu Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | 66 | 2020 |
Systematic assessment of cyber-physical security of energy management system for connected and automated electric vehicles L Guo, B Yang, J Ye, H Chen, F Li, W Song, L Du, L Guan IEEE Transactions on Industrial Informatics 17 (5), 3335-3347, 2020 | 55 | 2020 |
μAFL: non-intrusive feedback-driven fuzzing for microcontroller firmware W Li, J Shi, F Li, J Lin, W Wang, L Guan Proceedings of the 44th International Conference on Software Engineering, 1-12, 2022 | 47 | 2022 |
From library portability to para-rehosting: Natively executing microcontroller software on commodity hardware W Li, L Guan, J Lin, J Shi, F Li arXiv preprint arXiv:2107.12867, 2021 | 31 | 2021 |
Reviewing IoT security via logic bugs in IoT platforms and systems W Zhou, C Cao, D Huo, K Cheng, L Zhang, L Guan, T Liu, Y Jia, Y Zheng, ... IEEE Internet of Things Journal 8 (14), 11621-11639, 2021 | 31 | 2021 |
Towards artificial general intelligence (agi) in the internet of things (iot): Opportunities and challenges F Dou, J Ye, G Yuan, Q Lu, W Niu, H Sun, L Guan, G Lu, G Mai, N Liu, ... arXiv preprint arXiv:2309.07438, 2023 | 30 | 2023 |
Supporting transparent snapshot for bare-metal malware analysis on mobile devices L Guan, S Jia, B Chen, F Zhang, B Luo, J Lin, P Liu, X Xing, L Xia Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017 | 25 | 2017 |
From physical to cyber: Escalating protection for personalized auto insurance L Guan, J Xu, S Wang, X Xing, L Lin, H Huang, P Liu, W Lee Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD …, 2016 | 25 | 2016 |
Good motive but bad design: Why ARM MPU has become an outcast in embedded systems W Zhou, L Guan, P Liu, Y Zhang arXiv preprint arXiv:1908.03638, 2019 | 21 | 2019 |
What your firmware tells you is not how you should emulate it: A specification-guided approach for firmware emulation W Zhou, L Zhang, L Guan, P Liu, Y Zhang Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 20 | 2022 |
Building a trustworthy execution environment to defeat exploits from both cyber space and physical space for ARM L Guan, C Cao, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger IEEE Transactions on Dependable and Secure Computing 16 (3), 438-453, 2018 | 20 | 2018 |
Copker: a cryptographic engine against cold-boot attacks L Guan, J Lin, Z Ma, B Luo, L Xia, J Jing IEEE Transactions on Dependable and Secure Computing 15 (5), 742-754, 2016 | 20 | 2016 |
Ics3fuzzer: A framework for discovering protocol implementation bugs in ics supervisory software by fuzzing D Fang, Z Song, L Guan, P Liu, A Peng, K Cheng, Y Zheng, P Liu, H Zhu, ... Proceedings of the 37th Annual Computer Security Applications Conference …, 2021 | 18 | 2021 |
CryptMe: Data leakage prevention for unmodified programs on ARM devices C Cao, L Guan, N Zhang, N Gao, J Lin, B Luo, P Liu, J Xiang, W Lou Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018 | 18 | 2018 |