• Publications
  • Influence
On Limitations of Designing Leakage-Resilient Password Systems: Attacks, Principals and Usability
TLDR
The design of leakage-resilient password systems (LRPSes) in the absence of trusted devices remains a challenging problem. Expand
  • 31
  • 4
  • PDF
Comparing Mobile Privacy Protection through Cross-Platform Applications
TLDR
We investigate applications that run on both Android and iOS and examine the difference in the usage of their security sensitive APIs (SS-APIs). Expand
  • 42
  • 3
  • PDF
Designing leakage-resilient password entry on touchscreen mobile devices
TLDR
CoverPad improves leakage resilience of password entry on touchscreen mobile devices by safely delivering hidden messages, which break the correlation between the underlying password and the interaction information observable to an adversary. Expand
  • 53
  • 3
  • PDF
Launching Generic Attacks on iOS with Approved Third-Party Applications
TLDR
In this paper, we propose a generic attack vector that enables third-party applications to launch attacks on non-jailbroken iOS devices. Expand
  • 28
  • 3
  • PDF
Security Concerns in Popular Cloud Storage Services
TLDR
The authors provide a systematic security analysis on the sharing methods of three major cloud storage and synchronization services: Dropbox, Google Drive, and Microsoft SkyDrive. Expand
  • 77
  • 2
A Significance-Driven Framework for Characterizing and Finding Evolving Patterns of News Networks
TLDR
A significance-driven framework is proposed to characterize the evolution of local topology and find dynamic patterns with evidently statistical significance for temporally varying news report networks. Expand
  • 3
  • 2
Leakage-resilient password entry: Challenges, design, and evaluation
TLDR
We focus on designing leakage-resilient password entry (LRPE) schemes in this study that not only improves leakage resilience but also retains most usability benefits of legacy passwords. Expand
  • 19
  • 1
On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities
TLDR
In this paper, we analyze vulnerabilities published in 2007 to evaluate the extent to which this assumption is valid. Expand
  • 18
  • 1
  • PDF
Mechanism of mine water-inrush through a fault from the floor
Abstract The mechanism of mine water inrushes in coal mines in China differs considerably from that in other countries. In China, most water inrushes occur from floor strata, where the water-inrushExpand
  • 22
  • 1
Prediction Reliability of Water Inrush Through the Coal Mine Floor
Inrush of Ordovician limestone karst water through the mine floor occurs frequently in the Carboniferous-Permian coalfield in northern China. A probability index method was proposed to predict waterExpand
  • 14
  • 1
...
1
2
3
4
5
...