|
|
Lianying
Zhao Home | Research
| Teaching
| Students
|
|||
Research Group
Carleton Computer Security Lab (CCSL) Publications
·
Is Hardware More Secure than
Software? L. Zhao, D.
Lie. IEEE Security & Privacy 2020 (author's copy), see the published version here. ·
Position Paper: Using Inputs and
Context to Verify User Intentions in Internet Services. H. Shuang, W. Huang P. Bettadpur, L. Zhao, I. Pustogarov, D.
Lie. 10th ACM SIGOPS Asia-Pacific Workshop on
Systems (APSys'19), Aug. 19-20, 2019. Hangzhou, China. ·
TEE-aided
Write Protection Against Privileged Data Tampering. L. Zhao, M. Mannan. Network and Distributed System Security
Symposium (NDSS'19), Feb. 24-27, 2019, San Diego, CA, USA. ·
One-Time
Programs Made Practical. L. Zhao, J. Choi, D. Demirag, K. Butler, M. Mannan, E.
Ayday, J. Clark. Financial
Cryptography and Data Security 2019 (FC'19), Feb. 18-22, 2019, St. Kitts. ·
Hypnoguard: Protecting
Secrets across Sleep-wake Cycles. Extended
version L. Zhao, M. Mannan. ACM Conference on Computer and
Communications Security (CCS'16), Oct. 24-28, 2016, Vienna, Austria. ·
Deceptive Deletion Triggers under Coercion. L. Zhao, M. Mannan. IEEE Transactions on Information Forensics
and Security (TIFS 2016). ·
Gracewipe: Secure and
Verifiable Deletion under Coercion. L. Zhao, M. Mannan. Network and Distributed System Security
Symposium (NDSS'15), Feb. 8-11, 2015, San Diego, CA, USA. ·
Explicit Authentication Response
Considered Harmful. (Post-proceedings version: October 26, 2013). L. Zhao, M. Mannan. New Security Paradigms Workshop 2013
(NSPW'13), Sept. 9-12, 2013, Banff, Canada. ·
Design
of Hardware and Control Software with Wavecom
Communication Module Q2406B. K.
Li, X. Zhu, L. Zhao. Electronic Measurement Technology,
issue 4, pp 95-97, 2006. |
|||||
|
|
||||
|
|
1125 Colonel By Drive Ottawa, ON K1S 5B6 |
|||
|
|
||||
|
|
+1 (613) 520-2600 x2435 |
|||
|
|
||||
|
|
firstname.lastname@scs.carleton.ca |
|||
|
|
||||
|
|
HP5129 |
|||
|
|
|