|
|
Publications
2009
- Juan Caballero, Zhenkai Liang, Pongsin Poosankam, and Dawn Song Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration 12th International Symposium on Recent Advances in Intrusion Detection (RAID), Saint-Malo, France, September 2009.
- Dawei Qi, Abhik Roychoudhury, Zhenkai Liang, Kapil Vaswani, DARWIN: An Approach for Debugging Evolving Programs ESEC and ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE), ESEC-FSE, Amsterdam, the Netherlands, August 2009.
- Zhenkai Liang, Weiqing Sun, R.Sekar, and V.N. Venkatakrishnan, Alcatraz: An Isolated Environment for Experimenting with Untrusted Software In ACM Transactions on Information and System Security (TISSEC), Volume 12, Issue 3, January 2009.
- Felix Halim, Panagiotis Karras, Roland H. C. Yap Fast and effective histogram construction CIKM 2009: 1167-1176
- Geraldine Kwang, Roland H. C. Yap, Terence Sim, Rajiv Ramnath An Usability Study of Continuous Biometrics Authentication CB 2009: 828-837
- Jie Yu, Chengfang Fang, Jia Xu, Ee-Chien Chang and Zhoujun Li ID Repetition in Kad International Conference on Peer-to-Peer Computing (P2P'09), 2009
- Ee-Chien Chang, Chee Liang Lim and Xu Jia Short Redactable Signatures Using Random Trees CT-RSA, 2009
- Hang Yu, Ee-Chien Chang, Wei Tsang Ooi, Mun Choon Chan and Wei Chang Integrated Optimization of Video Server Resource and Streaming Quality over Best-effort Network IEEE trans. on Circuits and Systems for Video Technology, page 374-385, March 2009
- Suman Nath, Haifeng Yu, and Haowen Cha Secure Outsourced Aggregation via One-way ChainsProceedings of the ACM SIGMOD Conference (SIGMOD'09) , June 2009
- Haifeng Yu, Chenwei Shi, Michael Kaminsky, Phillip B. Gibbons, and Feng Xiao DSybil: Optimal Sybil-Resistance for Recommendation Systems Proceedings of the IEEE Symposium on Security and Privacy (Oakland'09), May 2009
- Haifeng Yu, Secure and Highly-Available Aggregation Queries in Large-Scale Sensor Networks via Set Sampling Proceedings of the 8th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN'09), April 2009
- Haifeng Yu and Phillip B. Gibbons Optimal Inter-Object Correlation When Replicating for Availability Distributed Computing, Volume 21, Number 5, February, 2009
2008
- Dawn Song, David Brumley, Heng Yin, Juan Caballero, Ivan Jager, Min Gyung Kang, Zhenkai Liang, James Newsome, Pongsin Poosankam, and Prateek Saxena, BitBlaze: A New Approach to Computer Security via Binary Analysis. , 4th International Conference on Information Systems Security (ICISS), Hyderabad, India, December 2008.
- Weiqing Sun, R. Sekar, Zhenkai Liang, and V.N. Venkatakrishnan, Expanding Malware Defense by Securing Software Installations , In Detection of Intrusions, Malware and Vulnerability Analysis (DIMVA), Paris, France, July 2008.
- Zhuowei. Li, Xiaofeng. Wang, Zhenkai Liang and Mike. K. Reiter, AGIS: Automatic Generation of Infection Signatures. 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Anchorage, AK, June 2008.
- Heng Yin, Zhenkai Liang, and Dawn Song, HookFinder: Identifying and Understanding Malware Hooking Behaviors 15th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2008.
- Chavalit Likitvivatanavong, Roland H. C. Yap A Refutation Approach to Neighborhood Interchangeability in CSPs Australasian Conference on Artificial Intelligence 2008: 93-103
- Kenil C. K. Cheng, Roland H. C. Yap Maintaining Generalized Arc Consistency on Ad Hoc r-Ary Constraints CP 2008: 509-523
- Yuanlin Zhang, Roland H. C. Yap, Chendong Li, Satyanarayana Marisetti An Elimination Algorithm for Functional Constraints CP 2008: 545-549
- Kenil C. K. Cheng, Roland H. C. Yap Search Space Reduction for Constraint Optimization Problems CP 2008: 635-639
- Steven Halim, Roland H. C. Yap, Felix Halim Engineering Stochastic Local Search for the Low Autocorrelation Binary Sequence Problem CP 2008: 640-645
- Yuanlin Zhang, Roland H. C. Yap, Chendong Li, Satyanarayana Marisetti Efficient Algorithms for Functional Constraints ICLP 2008: 606-620
- Felix Halim, Yongzheng Wu, Roland H. C. Yap Security Issues in Small World Network Routing SASO 2008: 493-494
- Felix Halim, Yongzheng Wu, Roland H. C. Yap Small World Networks as (Semi)-Structured Overlay Networks SASO Workshops 2008: 214-218
- Ee-Chien Chang and Xu Jia Remote Integrity Check with Dishonest Storage Server 13th European Symposium on Research in Computer Security (ESORICS), 2008
- Qiming Li, Muchuan Guo and Ee-Chien Chang Fuzzy Extractors for Asymmetric Biometric Representation IEEE Workshop on Biometrics (In association with CVPR), 2008
- Chengfang Fang and Ee-Chien Chang Information Leakage in Optimal Anonymized and Diversified Data Information Hiding 2008
- Nicholas Ho and Ee-Chien Chang Residual Information of Redacted Images Hidden in the Compression Artifacts Information Hiding 2008
- Liming Lu, Mun Choon Chan and Ee-Chien Chang A General Model of Probabilistic Packet Marking for IP traceback ACM Sym on Information, Computer and Communication Security (ASIACCS), 2008.
- Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham Flaxman SybilGuard: Defending Against Sybil Attacks via Social Networks. EEE/ACM Transactions on Networking (ToN), Volume 16, Issue 3, pp. 576-589, June 2008
- Haifeng Yu Defending Against Sybil Attacks via Social Networks One-hour talk I gave on SybilLimit and SybilGuard in May 2008
- Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, and Feng Xiao SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks Proceedings of the IEEE Symposium on Security and Privacy
2007
-
Woon, I.M.Y., and
A. Kankanhalli (2007), Investigation of IS Professionals'
Intention to Practise Secure Development of Applications,
International Journal of Human Computer Studies, 65(1), pp. 29-41,
Jan 2007 <http://www.comp.nus.edu.sg/~atreyi/papers/SDA.pdf>".
-
A. C-F. Chan and C. Castelluccia, On the Privacy of Concealed
Data
Aggregation, in the Proceeding of ESORICS 2007, LNCS vol. 4734,
pp. 390-405, September 2007.
-
Ee-Chien Chang and Sujoy Roy, Robust Extraction of Secrets Bits
from Minutiae, International Conference on Biometrics (ICB),
2007.
-
Ratna Dutta, Ee-Chien Chang and Sourav Mukhopadhyay, Efficient
Self-Healing Key Distribution with Revocation for Wireless Sensor
Networks using One Way Key Chains, Applied Cryptography and
Netwrok Security (ACNS), 2007.
2006
- Haifeng Yu, Michael Kaminsky, Phillip
B. Gibbons, and Abraham Flaxman,
SybilGuard: Defending Against Sybil Attacks via Social Networks,
in the Proceedings of ACM SIGCOMM Conference, September 2006.
- Mun Choon Chan, Ee-Chien Chang, Liming Lu and
Sam Ng, Effect of Malicious Synchronization, 4th
International Conference on Applied Cryptography and Network
Security (ACNS), Jun 2006.
- Scott Garriss, Michael Kaminsky,
Michael Freedman, Brad Karp, David
Mazieres, and Haifeng Yu, RE: Reliable Email, in the
Proceedings of the
Symposium on Networked Systems Design and Implementation (NSDI'06),
May 2006.
- Ee-Chien Chang, Qiming Li, Hiding Secret
Points Amidst Chaff, EUROCRYPT, 2006.
- Ee-Chien Chang, Ren Shen, and Francis Weijian
Teo, Finding the Original Point Set Hidden among Chaff, ACM
Sym on Information, Computer and Communications Security (ASIACCS),
2006.
- Rajiv Ramnath, Sufatrio, Roland H. C.
Yap, Wu Yongzheng, "WinResMon: A Tool for Discovering Software
Dependencies, Configuration, and Requirements in Microsoft Windows",
in the Proceedings of the 20th USENIX Large Installation System
Administration (LISA '06), Washington, DC, pp. 175-186, USENIX,
2006.
- M. Chan, I. M. Y. Woon, and A. Kankanhalli,
Perceptions of Information Security at the Workplace: Linking
Information Security Climate to Compliant Behavior, Journal of
Information Privacy and Security.
- W. Cheng, H. Pang, K. L. Tan,
Authenticating Multi-Dimensional Query Results in Data Publishing,
Proceedings of the 20th Annual IFIP WG 11.3 Working Conference
on Data and Applications Security (DBSec'2006), Sophia Antipolis,
France, July/August 2006.
2005
- I. Woon and A. Kankanhalli, Trust, Controls, and Information
Systems Security, in Readings and Cases in the Management of
Information Security, M.E. Whitman & H.J. Mattord (Eds.), Course
Technology, Thomson Learning, 2005.
- Sufatrio and Roland H. C. Yap, Improving Host-based IDS with
Argument Abstraction to Prevent Mimicry Attacks, 8th
International Symposium on Recent Advances in Intrusion Detection
(RAID 2005), LNCS Vol. 3858, September 2005.
- Yongzheng Wu and Roland H. C. Yap, A User-level Framework for
Auditing and Monitoring, 21st Annual Computer Security
Applications Conference (ACSAC'05), 2005.
- Sujoy Roy, Ee-Chien Chang, A Unified
Framework for Resolving Ambiguity in Copy Detection, 13th ACM
Multimedia (MM 2005), 2005.
- Hui Huang Lee, Ee-Chien Chang and Mun Choon
Chan, Pervasive Random Beacon in the Internet for Covert
Coordination, 7th International Workshop on Information Hiding
(IH 2005), 2005.
- Qiming Li, Ee-Chien Chang and Mun Choon Chan,
On the Effectiveness of DDoS Attacks on Statistical Filtering,
IEEE INFOCOM 2005.
- H. Pang, A. Jain, K. Ramamritham, K.
L. Tan, Verifying Completeness of Relational Query Results in
Data Publishing, Proceedings of the 2005 International
Conference on Management of Data (SIGMOD'2005), pp. 407-418,
Baltimore, Maryland, June 2005.
- I. M. Y Woon, R. T. Low and G. W. Tan,
A Protection
Motivation Theory Approach to Home Wireless Security,
International Conference on Information Systems, Las Vegas, Dec
2005.
- T. Chen, I. M. Y. Woon and A. Kankanhalli, Impact of
Security Measures on the Usefulness of Knowledge Management Systems,
Pacific Asia Conference on Information Systems, Bangkok, 2005.
2004
- Sujoy Roy and Ee-Chien Chang,
Watermarking Color Histogram, IEEE International Conference on
Image Processing, 2004.
- Qiming Li, Ee-Chien Chang, On the
Possibility of Non-Invertible Watermarking Schemes, 6th
International Workshop on Information Hiding (IH 2004), 2004.
- Sujoy Roy and Ee-Chien Chang,
Watermarking with Retrieval Systems, ACM Multimedia Systems,
volume 9, number 5, pp 433-440, March 2004.
- Sufatrio, Roland H. C. Yap, and Liming Zhong, A
Machine-Oriented Vulnerability Database for Automated Vulnerability
Detection and Processing, USENIX 18th Large Installation System
Administration (LISA'04), 2004.
- I. M. Y Woon and L. G. Pee, Behavioral factors Affecting
Internet Abuse in the Workplace, Proc. HCI Research in MIS,
Washington, D.C., Dec 2004.
- H. Pang, K. L. Tan, Authenticating
Query Results in Edge Computing, Proceedings of the 20th
International Conference on Data Engineering (ICDE'2004), pp.
560-571, Boston, MA, March/April 2004.
2003
- Qiming Li and Ee-Chien Chang, Public
Watermark Detection using Multiple Proxies and Secret Sharing,
2nd International Workshop on Digital Watermarking (IWDW2003), pp.
558-569, 2003.
- Sujoy Roy and Ee-Chien Chang,
Watermarking with knowledge of images database, IEEE
International Conference on Image Processing, 2003.
- Ee-Chien Chang, Mohan S. Kankanhalli, Xin
Guan, Zhiyong Huang and Yinghui Wu, Image authentication using
content based compression, ACM Multimedia Systems, August 2003,
page 121-130.
- A. Kankanhalli, H. H. Teo, B. C. Y. Tan and K. K. Wei, An
Integrative Study of Information Systems Security Effectiveness,
International Journal of Information Management, 23(2), 139-154,
2003.
- I. Woon and A. Kankanhalli, Measures for Maximizing
Information Systems Security in Organizations, Proc. Workshop on
Information Technology and Systems, Seattle, 2003.
2002
- Qiming Li, Ee-Chien Chang, Security of
public watermarking schemes for binary sequences, 5th
International Workshop on Information Hiding 2002, (IH 2002), pp
119-128.
|
|