Yuqiong Sun
TitleCited byYear
Systems and methods for scalable network monitoring in virtual data centers
SK Nanda, Y Sun
US Patent 10,264,020, 2019
2132019
Audroid: Preventing attacks on audio channels in mobile devices
G Petracca, Y Sun, T Jaeger, A Atamli
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
502015
Systems and Methods for Monitoring Virtual Networks
S Nanda, Y Sun
US Patent US20160191545 A1, 2016
492016
Security-as-a-service for microservices-based cloud applications
Y Sun, S Nanda, T Jaeger
2015 IEEE 7th International Conference on Cloud Computing Technology and …, 2015
442015
Cloud verifier: Verifiable auditing service for iaas clouds
J Schiffman, Y Sun, H Vijayakumar, T Jaeger
2013 IEEE Ninth World Congress on Services, 239-246, 2013
372013
Aware: Preventing abuse of privacy-sensitive sensors via operation bindings
G Petracca, AA Reineh, Y Sun, J Grossklags, T Jaeger
26th {USENIX} Security Symposium ({USENIX} Security 17), 379-396, 2017
162017
Inevitable failure: The flawed trust assumption in the cloud
Y Sun, G Petracca, T Jaeger
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing …, 2014
122014
Pileus: protecting user resources from vulnerable cloud services
Y Sun, G Petracca, X Ge, T Jaeger
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
112016
Cloud armor: Protecting cloud commands from compromised cloud services
Y Sun, G Petracca, T Jaeger, H Vijayakumar, J Schiffman
2015 IEEE 8th International Conference on Cloud Computing, 253-260, 2015
102015
Aware: controlling app access to i/o devices on mobile platforms
G Petracca, A Atamli, Y Sun, J Grossklags, T Jaeger
arXiv preprint arXiv:1604.02171, 2016
72016
改进的直接匿名认证方案
宋成, 孙宇琼, 彭维平, 罗守山, 辛阳, 胡正名
北京邮电大学学报 34 (3), 62-65, 2011
72011
Security Namespace: Making Linux Security Frameworks Available to Containers
Y Sun, D Safford, M Zohar, D Pendarakis, Z Gu, T Jaeger
27th USENIX Security Symposium (USENIX Security 18), 2018
62018
可信虚拟平台中的双AIK签名机制
孙宇琼, 宋成, 辛阳, 蒋辉柏, 杨义先
计算机工程 37 (16), 114-116, 2011
32011
Dual AIK signing mechanism on trusted virtualization platform
YQ Sun, C Song, Y Xin, HB Jiang, YX Yang
Jisuanji Gongcheng/ Computer Engineering 37 (16), 2011
32011
Improved direct anonymous attestation scheme
C Song, YQ Sun, WP Peng, SS Luo, Y Xin, ZM Hu
Journal of Beijing University of Posts and Telecommunications 34 (3), 62-65, 2011
22011
EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs
G Petracca, Y Sun, AA Reineh, P McDaniel, J Grossklags, T Jaeger
28th USENIX Security Symposium (USENIX Security 19), 567-584, 2019
12019
Looking from the Mirror: Evaluating IoT Device Security through Mobile Companion Apps
X Wang, Y Sun, S Nanda, XF Wang
28th USENIX Security Symposium (USENIX Security 19), 1151-1167, 2019
12019
Trustchord: chord protocol based on the trust management mechanism
W Zhang, B Sun, Y Sun
IET Digital Library, 2010
12010
Decrypting network traffic on a middlebox device using a trusted execution environment
Y Sun, D Marino, SK Nanda, S Shintre, BT Witten, RA Frederick, Q Li
US Patent 10,447,663, 2019
2019
Systems and methods for scalable network monitoring in virtual data centers
S Nanda, Y Sun
US Patent US10264020B1, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20