| 
     | 
    
    Publications
    
      
        
        
	
	
          2009
	
         - Juan Caballero, Zhenkai Liang, Pongsin Poosankam, and Dawn Song Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration 12th International Symposium on Recent Advances in Intrusion Detection (RAID), Saint-Malo, France, September 2009.   
 
         -  Dawei Qi, Abhik Roychoudhury, Zhenkai Liang, Kapil Vaswani, DARWIN: An Approach for Debugging Evolving Programs  ESEC and ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE), ESEC-FSE, Amsterdam, the Netherlands, August 2009. 
 
         -  Zhenkai Liang, Weiqing Sun, R.Sekar, and V.N. Venkatakrishnan, Alcatraz: An Isolated Environment for Experimenting with Untrusted Software   In ACM Transactions on Information and System Security (TISSEC), Volume 12, Issue 3, January 2009. 
   
	- Felix Halim, Panagiotis Karras, Roland H. C. Yap  Fast and effective histogram construction  CIKM 2009: 1167-1176 
 
 	- Geraldine Kwang, Roland H. C. Yap, Terence Sim, Rajiv Ramnath    An Usability Study of Continuous Biometrics Authentication CB 2009: 828-837 
 
	-  Jie Yu, Chengfang Fang, Jia Xu, Ee-Chien Chang and Zhoujun Li  ID Repetition in Kad   International Conference on Peer-to-Peer Computing (P2P'09), 2009  
 
	-  Ee-Chien Chang, Chee Liang Lim and Xu Jia   Short Redactable Signatures Using Random Trees   CT-RSA, 2009 
 
	-  Hang Yu, Ee-Chien Chang, Wei Tsang Ooi, Mun Choon Chan and Wei Chang  Integrated Optimization of Video Server Resource and Streaming Quality over Best-effort Network    IEEE trans. on Circuits and Systems for Video Technology, page 374-385, March 2009 
 
	- Suman Nath, Haifeng Yu, and Haowen Cha   Secure Outsourced Aggregation via One-way ChainsProceedings of the ACM SIGMOD Conference (SIGMOD'09) , June 2009  
 
	- Haifeng Yu, Chenwei Shi, Michael Kaminsky, Phillip B. Gibbons, and Feng Xiao  DSybil: Optimal Sybil-Resistance for Recommendation Systems   Proceedings of the IEEE Symposium on Security and Privacy (Oakland'09), May 2009  
 
	- Haifeng Yu,   Secure and Highly-Available Aggregation Queries in Large-Scale Sensor Networks via Set Sampling    Proceedings of the 8th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN'09), April 2009  
 
	- Haifeng Yu and Phillip B. Gibbons    Optimal Inter-Object Correlation When Replicating for Availability  Distributed Computing, Volume 21, Number 5, February, 2009  
 
	 
	
          2008
	
         - Dawn Song, David Brumley, Heng Yin, Juan Caballero, Ivan Jager, Min Gyung Kang, Zhenkai Liang, James Newsome, Pongsin Poosankam, and Prateek Saxena,  BitBlaze: A New Approach to Computer Security via Binary Analysis. , 4th International Conference on Information Systems Security (ICISS), Hyderabad, India, December 2008. 
 
	-  Weiqing Sun, R. Sekar, Zhenkai Liang, and V.N. Venkatakrishnan,  Expanding Malware Defense by Securing Software Installations , In Detection of Intrusions, Malware and Vulnerability Analysis (DIMVA), Paris, France, July 2008. 
 
	-  Zhuowei. Li, Xiaofeng. Wang, Zhenkai Liang and Mike. K. Reiter,   AGIS: Automatic Generation of Infection Signatures.   38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Anchorage, AK, June 2008.  
 
        - Heng Yin, Zhenkai Liang, and Dawn Song,     HookFinder: Identifying and Understanding Malware Hooking Behaviors   15th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2008.  
 
	- Chavalit Likitvivatanavong, Roland H. C. Yap  A Refutation Approach to Neighborhood Interchangeability in CSPs  Australasian Conference on Artificial Intelligence 2008: 93-103 
 
        -  Kenil C. K. Cheng, Roland H. C. Yap  Maintaining Generalized Arc Consistency on Ad Hoc r-Ary Constraints   CP 2008: 509-523 
 
        - Yuanlin Zhang, Roland H. C. Yap, Chendong Li, Satyanarayana Marisetti  An Elimination Algorithm for Functional Constraints  CP 2008: 545-549 
 
        - Kenil C. K. Cheng, Roland H. C. Yap Search Space Reduction for Constraint Optimization Problems CP 2008: 635-639 
 
        -  Steven Halim, Roland H. C. Yap, Felix Halim Engineering Stochastic Local Search for the Low Autocorrelation Binary Sequence Problem  CP 2008: 640-645 
 
  	-  Yuanlin Zhang, Roland H. C. Yap, Chendong Li, Satyanarayana Marisetti Efficient Algorithms for Functional Constraints  ICLP 2008: 606-620 
 
	- Felix Halim, Yongzheng Wu, Roland H. C. Yap  Security Issues in Small World Network Routing SASO 2008: 493-494 
 
   	- Felix Halim, Yongzheng Wu, Roland H. C. Yap Small World Networks as (Semi)-Structured Overlay Networks  SASO Workshops 2008: 214-218   
 
	- Ee-Chien Chang and Xu Jia  Remote Integrity Check with Dishonest Storage Server 13th European Symposium on Research in Computer Security (ESORICS), 2008
 
	- Qiming Li, Muchuan Guo and Ee-Chien Chang    Fuzzy Extractors for Asymmetric Biometric Representation  IEEE Workshop on Biometrics (In association with CVPR), 2008 
 
	- Chengfang Fang and Ee-Chien Chang    Information Leakage in Optimal Anonymized and Diversified Data   Information Hiding 2008 
 
	- Nicholas Ho and Ee-Chien Chang   Residual Information of Redacted Images Hidden in the Compression Artifacts Information Hiding 2008  
 
	-  Liming Lu, Mun Choon Chan and Ee-Chien Chang  A General Model of Probabilistic Packet Marking for IP traceback    ACM Sym on Information, Computer and Communication Security (ASIACCS), 2008. 
 
	- Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham Flaxman  SybilGuard: Defending Against Sybil Attacks via Social Networks.   EEE/ACM Transactions on Networking (ToN), Volume 16, Issue 3, pp. 576-589, June 2008   
 
	- Haifeng Yu   Defending Against Sybil Attacks via Social Networks   One-hour talk I gave on SybilLimit and SybilGuard in May 2008   
 
	- Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, and Feng Xiao   SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks   Proceedings of the IEEE Symposium on Security and Privacy   
 
	 
          
          2007
          
            - 
            Woon, I.M.Y., and 
            A. Kankanhalli (2007), Investigation of IS Professionals' 
            Intention to Practise Secure Development of Applications, 
            International Journal of Human Computer Studies, 65(1), pp. 29-41, 
            Jan 2007 <http://www.comp.nus.edu.sg/~atreyi/papers/SDA.pdf>".
 
            - 
            A. C-F. Chan and C. Castelluccia,  On the Privacy of Concealed 
            Data 
 
            Aggregation, in the Proceeding of ESORICS 2007, LNCS vol. 4734,
             
            pp. 390-405, September 2007. 
             
            - 
            Ee-Chien Chang and Sujoy Roy, Robust Extraction of Secrets Bits 
            from Minutiae, International Conference on Biometrics (ICB), 
            2007.
 
            - 
            Ratna Dutta, Ee-Chien Chang and Sourav Mukhopadhyay, Efficient 
            Self-Healing Key Distribution with Revocation for Wireless Sensor 
            Networks using One Way Key Chains, Applied Cryptography and 
            Netwrok Security (ACNS), 2007. 
 
  
           
          
          2006
          
            - Haifeng Yu, Michael Kaminsky, Phillip 
            B. Gibbons, and Abraham Flaxman, 
 
            SybilGuard: Defending Against Sybil Attacks via Social Networks,
             
            in the Proceedings of ACM SIGCOMM Conference, September 2006. 
            - Mun Choon Chan, Ee-Chien Chang, Liming Lu and 
            Sam Ng, Effect of Malicious Synchronization, 4th 
            International Conference on Applied Cryptography and Network 
            Security (ACNS), Jun 2006.  
 
            - Scott Garriss, Michael Kaminsky, 
            Michael Freedman, Brad Karp, David 
 
            Mazieres, and Haifeng Yu, RE: Reliable Email, in the 
            Proceedings of the  
            Symposium on Networked Systems Design and Implementation (NSDI'06), 
            May 2006. 
            - Ee-Chien Chang, Qiming Li, Hiding Secret 
            Points Amidst Chaff, EUROCRYPT, 2006.  
 
            - Ee-Chien Chang, Ren Shen, and Francis Weijian 
            Teo, Finding the Original Point Set Hidden among Chaff, ACM 
            Sym on Information, Computer and Communications Security (ASIACCS), 
            2006.
 
            - Rajiv Ramnath, Sufatrio, Roland H. C. 
            Yap, Wu Yongzheng, "WinResMon: A Tool for Discovering Software 
            Dependencies, Configuration, and Requirements in Microsoft Windows", 
            in the Proceedings of the 20th USENIX Large Installation System 
            Administration (LISA '06), Washington, DC, pp. 175-186, USENIX, 
            2006.
 
            - M. Chan, I. M. Y. Woon, and A. Kankanhalli, 
            Perceptions of Information Security at the Workplace: Linking 
            Information Security Climate to Compliant Behavior, Journal of 
            Information Privacy and Security.
 
            - W. Cheng, H. Pang, K. L. Tan, 
            Authenticating Multi-Dimensional Query Results in Data Publishing,
            Proceedings of the 20th Annual IFIP WG 11.3 Working Conference 
            on Data and Applications Security (DBSec'2006), Sophia Antipolis, 
            France, July/August 2006.
 
  
           
          2005 
          
            - I. Woon and A. Kankanhalli, Trust, Controls, and Information 
            Systems Security, in Readings and Cases in the Management of 
            Information Security, M.E. Whitman & H.J. Mattord (Eds.), Course 
            Technology, Thomson Learning, 2005.
 
            - Sufatrio and Roland H. C. Yap, Improving Host-based IDS with 
            Argument Abstraction to Prevent Mimicry Attacks, 8th 
            International Symposium on Recent Advances in Intrusion Detection 
            (RAID 2005), LNCS Vol. 3858, September 2005.
 
            - Yongzheng Wu and Roland H. C. Yap, A User-level Framework for 
            Auditing and Monitoring, 21st Annual Computer Security 
            Applications Conference (ACSAC'05), 2005.
 
            - Sujoy Roy, Ee-Chien Chang, A Unified 
            Framework for Resolving Ambiguity in Copy Detection, 13th ACM 
            Multimedia (MM 2005), 2005. 
             
            
 
            - Hui Huang Lee, Ee-Chien Chang and Mun Choon 
            Chan, Pervasive Random Beacon in the Internet for Covert 
            Coordination, 7th International Workshop on Information Hiding 
            (IH 2005), 2005.  
 
            - Qiming Li, Ee-Chien Chang and Mun Choon Chan,
            On the Effectiveness of DDoS Attacks on Statistical Filtering,
            IEEE INFOCOM 2005.
 
            - H. Pang, A. Jain, K. Ramamritham, K. 
            L. Tan, Verifying Completeness of Relational Query Results in 
            Data Publishing, Proceedings of the 2005 International 
            Conference on Management of Data (SIGMOD'2005), pp. 407-418, 
            Baltimore, Maryland, June 2005.
 
            - I. M. Y Woon, R. T. Low and G. W. Tan, 
            A Protection 
            Motivation Theory Approach to Home Wireless Security, 
            International Conference on Information Systems, Las Vegas, Dec 
            2005.
 
            - T. Chen, I. M. Y. Woon and A. Kankanhalli, Impact of 
            Security Measures on the Usefulness of Knowledge Management Systems, 
            Pacific Asia Conference on Information Systems, Bangkok, 2005.
 
  
           
          2004 
          
            - Sujoy Roy and Ee-Chien Chang, 
            Watermarking Color Histogram, IEEE International Conference on 
            Image Processing, 2004.  
 
            - Qiming Li, Ee-Chien Chang, On the 
            Possibility of Non-Invertible Watermarking Schemes, 6th 
            International Workshop on Information Hiding (IH 2004), 2004. 
             
            
 
            - Sujoy Roy and Ee-Chien Chang, 
            Watermarking with Retrieval Systems, ACM Multimedia Systems, 
            volume 9, number 5, pp 433-440, March 2004.  
 
            - Sufatrio, Roland H. C. Yap, and Liming Zhong, A 
            Machine-Oriented Vulnerability Database for Automated Vulnerability 
            Detection and Processing, USENIX 18th Large Installation System 
            Administration (LISA'04), 2004.
 
            - I. M. Y Woon and L. G. Pee, Behavioral factors Affecting 
            Internet Abuse in the Workplace, Proc. HCI Research in MIS, 
            Washington, D.C., Dec 2004.
 
            - H. Pang, K. L. Tan, Authenticating 
            Query Results in Edge Computing, Proceedings of the 20th 
            International Conference on Data Engineering (ICDE'2004), pp. 
            560-571, Boston, MA, March/April 2004.
 
             
  
           
          2003 
          
            - Qiming Li and Ee-Chien Chang, Public 
            Watermark Detection using Multiple Proxies and Secret Sharing, 
            2nd International Workshop on Digital Watermarking (IWDW2003), pp. 
            558-569, 2003.  
 
            - Sujoy Roy and Ee-Chien Chang, 
            Watermarking with knowledge of images database, IEEE 
            International Conference on Image Processing, 2003.  
 
            - Ee-Chien Chang, Mohan S. Kankanhalli, Xin 
            Guan, Zhiyong Huang and Yinghui Wu, Image authentication using 
            content based compression, ACM Multimedia Systems, August 2003, 
            page 121-130.
 
            - A. Kankanhalli, H. H. Teo, B. C. Y. Tan and K. K. Wei, An 
            Integrative Study of Information Systems Security Effectiveness, 
            International Journal of Information Management, 23(2), 139-154, 
            2003.
 
            - I. Woon and A. Kankanhalli, Measures for Maximizing 
            Information Systems Security in Organizations, Proc. Workshop on 
            Information Technology and Systems, Seattle, 2003.
 
           
            
          2002 
          
            - Qiming Li, Ee-Chien Chang, Security of 
            public watermarking schemes for binary sequences, 5th 
            International Workshop on Information Hiding 2002, (IH 2002), pp 
            119-128.
 
           
         
         | 
       
     
     |