Folgen
Sze Yiu Chau
Sze Yiu Chau
Bestätigte E-Mail-Adresse bei ie.cuhk.edu.hk - Startseite
Titel
Zitiert von
Zitiert von
Jahr
SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X. 509 Certificate Validation Implementations
SY Chau, O Chowdhury, E Hoque, H Ge, A Kate, C Nita-Rotaru, N Li
Security and Privacy (SP), 2017 IEEE Symposium on, 503-520, 2017
702017
Analyzing operational behavior of stateful protocol implementations for detecting semantic bugs
E Hoque, O Chowdhury, SY Chau, C Nita-Rotaru, N Li
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
262017
Analyzing semantic correctness with symbolic execution: A case study on pkcs# 1 v1. 5 signature verification
SY Chau, M Yahyazadeh, O Chowdhury, A Kate, N Li
Network and Distributed Systems Security (NDSS) Symposium 2019, 2019
162019
All your Credentials are Belong to Us: On Insecure WPA2-Enterprise Configurations
MH Hue, J Debnath, KM Leung, L Li, M Minaei, MH Mazhar, K Xian, ...
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
13*2021
Koinonia: verifiable e-voting with long-term privacy
H Ge, SY Chau, VE Gonsalves, H Li, T Wang, X Zou, N Li
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
122019
On Re-engineering the X. 509 PKI with Executable Specification for Better Implementation Guarantees
J Debnath, SY Chau, O Chowdhury
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
62021
Adaptive Deterrence of DNS Cache Poisoning
SY Chau, O Chowdhury, V Gonsalves, H Ge, W Yang, S Fahmy, N Li
Security and Privacy in Communication Networks: 14th International …, 2018
52018
Why Johnny Can't Make Money With His Contents: Pitfalls of Designing and Implementing Content Delivery Apps
SY Chau, B Wang, J Wang, O Chowdhury, A Kate, N Li
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
42018
When tls meets proxy on mobile
J Debnath, SY Chau, O Chowdhury
Applied Cryptography and Network Security: 18th International Conference …, 2020
32020
Morpheus: Bringing The (PKCS) One To Meet the Oracle
M Yahyazadeh, SY Chau, L Li, MH Hue, J Debnath, SC Ip, CN Li, ...
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
22021
A Decade After Bleichenbacher’06, RSA Signature Forgery Still Works
SY Chau
Black Hat USA, 2019
22019
MoNet: Impressionism As A Defense Against Adversarial Examples
H Ge, SY Chau, N Li
2020 Second IEEE International Conference on Trust, Privacy and Security in …, 2020
12020
Random Spiking and Systematic Evaluation of Defenses Against Adversarial Examples
H Ge, SY Chau, B Ribeiro, N Li
Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020
12020
Towards Precise Reporting of Cryptographic Misuses
Y Chen, Y Liu, KL Wu, DV Le, SY Chau
The Network and Distributed System Security (NDSS) Symposium, 2024
2024
TouchKey: Touch to Generate Symmetric Keys by Skin Electric Potentials Induced by Powerline Radiation
Y Miao, C Gu, Z Yan, SY Chau, R Tan, Q Lin, W Hu, S He, J Chen
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2023
2023
The Devil is in the Details: Hidden Problems of Client-Side Enterprise Wi-Fi Configurators
KL Wu, MH Hue, KF Tang, SY Chau
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless …, 2023
2023
Back to School: On the (In) Security of Academic VPNs
KL Wu, MH Hue, NM Poon, KM Leung, WY Po, KT Wong, SH Hui, ...
32nd USENIX Security Symposium (USENIX Security 23), 5737-5754, 2023
2023
Systematic Evaluations Of Security Mechanism Deployments
SY Chau
Purdue University Graduate School, 2019
2019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–18