Lianying Zhao
Lianying Zhao
Associate Professor, Carleton University, Canada
Verified email at - Homepage
Cited by
Cited by
Password triggered trusted encryption key deletion
M Mannan, L Zhao
US Patent 10,516,533, 2019
Explicit authentication response considered harmful
L Zhao, M Mannan
Proceedings of the 2013 New Security Paradigms Workshop, 77-86, 2013
Emilia: Catching Iago in Legacy Code.
R Cui, L Zhao, D Lie
NDSS, 2021
TEE-aided Write Protection Against Privileged Data Tampering
L Zhao, M Mannan
NDSS, 2019
Gracewipe: Secure and Verifiable Deletion under Coercion.
L Zhao, M Mannan
NDSS, 2015
Hypnoguard: Protecting secrets across sleep-wake cycles
L Zhao, M Mannan
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
Is hardware more secure than software?
L Zhao, D Lie
IEEE Security & Privacy 18 (5), 8-17, 2020
Measuring the leakage and exploitability of authentication secrets in super-apps: The wechat case
S Baskaran, L Zhao, M Mannan, A Youssef
Proceedings of the 26th International Symposium on Research in Attacks …, 2023
Sok: Hardware security support for trustworthy execution
L Zhao, H Shuang, S Xu, W Huang, R Cui, P Bettadpur, D Lie
arXiv preprint arXiv:1910.04957, 2019
One-Time Programs Made Practical
L Zhao, J Choi, D Demirag, K Butler, M Mannan, E Ayday, J Clark
Financial Cryptography and Data Security, 2019
Towards 5G-ready security metrics
L Zhao, MS Oshman, M Zhang, FF Moghaddam, S Chander, M Pourzandi
ICC 2021-IEEE International Conference on Communications, 1-6, 2021
Using Inputs and Context to Verify User Intentions in Internet Services
H Shuang, W Huang, P Bettadpur, L Zhao, I Pustogarov, D Lie
APSys'19, 2019
A Hybrid Decision-making Approach to Security Metrics Aggregation in Cloud Environments
M Lei, L Zhao, M Pourzandi, FF Moghaddam
2022 IEEE International Conference on Cloud Computing Technology and Science …, 2022
Deceptive Deletion Triggers under Coercion
L Zhao, M Mannan
IEEE Transactions on Information Forensics and Security 11 (12), 2763-2776, 2016
A Survey of Hardware Improvements to Secure Program Execution
L Zhao, H Shuang, S Xu, W Huang, R Cui, P Bettadpur, D Lie
ACM Computing Surveys, 2024
VIET: A tool for extracting essential information from vulnerability descriptions for CVSS evaluation
S Zhang, M Zhang, L Zhao
IFIP Annual Conference on Data and Applications Security and Privacy, 386-403, 2023
vWitness: Certifying Web Page Interactions with Computer Vision
H Shuang, L Zhao, D Lie
2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2023
Authentication and Data Protection under Strong Adversarial Model
L Zhao
Concordia University, 2018
Exposed by Default: A Security Analysis of Home Router Default Settings
J Ye, XDC De Carnavalet, L Zhao, M Zhang, L Wu, W Zhang
Proceedings of the 19th ACM Asia Conference on Computer and Communications …, 2024
Detecting command injection vulnerabilities in Linux-based embedded firmware with LLM-based taint analysis of library functions
J Ye, X Fei, XC de Carnavalet, L Zhao, L Wu, M Zhang
Computers & Security, 103971, 2024
The system can't perform the operation now. Try again later.
Articles 1–20