2024
|
Josh Dafoe, Niusen Chen, Bo Chen, and Zhenlin Wang. Enabling Per-file Data Recovery from Ransomware Attacks via File System Forensics and Flash Translation Layer Data Extraction. Cybersecurity, 2024 (accepted).
|
Josh Dafoe, Job Siy, Niusen Chen, and Bo Chen. Hardware-assisted Runtime In-vehicle ECU Firmware Self-attestation and Self-repair. 2024 EAI International Conference on Security and Privacy in Cyber-Physical Systems and Smart Vehicles (SmartSP '24), New Orleans, LA, November 2024 (Best Paper Award).
|
Bo Chen, Caleb Rother, and Josh Dafoe. Poster: A Full-stack Secure Deletion Framework for Modern Computing Devices. 2024 ACM Conference on Computer and Communications Security (CCS '24) Posters, Salt Lake City, UT, October 2024.
|
Caleb Rother, and Bo Chen. Reversing File Access Control Using Disk Forensics on Low-Level Flash Memory. J. Cybersecur. Priv. 2024, 4(4), 805-822; https://doi.org/10.3390/jcp4040038.
|
Niusen Chen, Bo Chen, and Weisong Shi. An Application-layer Plausibly Deniable Encryption System for Wearable Devices. Discov Internet Things 4, 9 (2024). https://doi.org/10.1007/s43926-024-00061-w.
|
Lichen Xia, Jinghui Liao, Niusen Chen, Bo Chen, and Weisong Shi. A Simple Mobile Plausibly Deniable System Using Image Steganography and Secure Hardware. 2024 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaT-CPS '24, in conjunction with CODASPY '24), Porto, Portugal, June 2024.
|
Jinghui Liao, Niusen Chen, Lichen Xia, Bo Chen, and Weisong Shi. FSPDE: A Full Stack Plausibly Deniable Encryption System for Mobile Devices. 14th ACM Conference on Data and Application Security and Privacy (CODASPY '24), Porto, Portugal, June 2024 (Acceptance rate: 21.3%).
|
Yu Chen, Chung-Wei Lin, Bo Chen, and Qi Zhu. Security and Privacy in Cyber-Physical Systems and Smart Vehicles (LNICST 552). Springer, ISBN 978-3-031-51629-0, 2024 (book). |
2023
|
Niusen Chen, and Bo Chen. HiPDS: A Storage Hardware-independent Plausibly Deniable Storage System. IEEE Transactions on Information Forensics & Security (TIFS), 2023.
|
Josh Dafoe, Harsh Singh, Niusen Chen, and Bo Chen. Enabling Real-Time Restoration of Compromised ECU Firmware in Connected and Autonomous Vehicles. 2023 EAI International Conference on Security and Privacy in Cyber-Physical Systems and Smart Vehicles (SmartSP '23), Chicago, IL, October 2023.
|
Josh Dafoe, Niusen Chen, and Bo Chen. Poster: A Self-auditing Protocol for Decentralized Cloud Storage via Trusted Hardware Components. 2023 IEEE Symposium on Security and Privacy (S&P '23) Poster Session, San Francisco, CA, May 2023.
|
Caleb Rother, and Bo Chen. Your Access Control List Is Recoverable Even if Your OS Is Compromised. 2023 IEEE Symposium on Security and Privacy (S&P '23) Poster Session, San Francisco, CA, May 2023.
|
2022
|
Niusen Chen, Josh Dafoe, and Bo Chen. Poster: Data Recovery from Ransomware Attacks via File System Forensics and Flash Translation Layer Data Extraction. 2022 ACM Conference on Computer and Communications Security (CCS '22) Posters, Los Angeles, CA, November 2022.
|
Niusen Chen, Bo Chen, and Weisong Shi. A Cross-layer Plausibly Deniable Encryption System for Mobile Devices. 18th EAI International Conference on Security and Privacy in Communication Networks (SecureComm '22), Kansas City, Missouri, October 2022.
|
Wen Xie, Niusen Chen, and Bo Chen. Enabling Accurate Data Recovery for Mobile Devices against Malware Attacks. 18th EAI International Conference on Security and Privacy in Communication Networks (SecureComm '22), Kansas City, Missouri, October 2022.
|
Niusen Chen, and Bo Chen. Duplicates also Matter! Towards Secure Deletion on Flash-based Storage Media by Removing Duplicates. The 17th ACM ASIA Conference on Computer and Communications Security (ASIACCS '22), Nagasaki, Japan, May 30 - June 3, 2012 (Acceptance
rate: 18.4%)
|
Niusen Chen, and Bo Chen. Defending against OS-level Malware in Mobile Devices via Real-time Malware Detection and Storage Restoration. Journal of Cybersecurity and Privacy 2, no. 2 (2022): 311-328.
|
Niusen Chen, Bo Chen, and Weisong Shi. The Block-based Mobile PDE Systems Are Not Secure – Experimental Attacks. 2022 EAI International Conference on Applied Cryptography in Computer and Communications (AC3 '22), Nanjing, China, May 2022 (online).
|
2021
|
Jinghui Liao, Bo Chen, and Weisong Shi. TrustZone Enhanced Plausibly Deniable Encryption System for Mobile Devices. The Fourth ACM/IEEE Workshop on
Security and Privacy in Edge Computing (EdgeSP '21, in conjunction with Sixth ACM/IEEE Symposium on Edge Computing), San Jose, CA, December 2021.
|
Weijing You, and Bo Chen. Protocols for Cloud Security. Book Chapter, in Machine Learning Techniques and Analytics for Cloud Security, Rajdeep Chakraborty, Anupam Ghosh, Jyotsna Kumar Mandal (eds.), John Wiley & Sons, December 2021.
|
Shashank Reddy Danda, Xiaoyong Yuan, and Bo Chen. Towards Stealing Deep Neural Networks on Mobile Devices. International Workshop on Cyber-Physical Systems Strategic and Technical Security (CPS-STS '21, in conjunction with SecureComm '21), Canterbury, Great Britain (online), September 2021.
|
Bo Chen and Xinyi Huang. Applied Cryptography in Computer and Communications (LNICST 386). Springer, ISBN 978-3-030-80850-1, 2021 (book).
|
Niusen Chen, Wen Xie, and Bo Chen. Combating the OS-level Malware in Mobile Devices by Leveraging Isolation and Steganography. The Second ACNS Workshop on Secure Cryptographic Implementation (SCI '21)(in conjunction with ACNS '21), Kamakura, Japan (online), June 2021.
|
Niusen Chen, Bo Chen, and Weisong Shi. MobiWear: A Plausibly Deniable Encryption System for Wearable Mobile Devices. 2021 EAI International Conference on Applied Cryptography in Computer and Communications (AC3 '21), Xiamen, China (online), May 2021 (Best Paper Award).
|
Danye Wu, Zhiwei Xu, Bo Chen, Yujun Zhang, and Zhu Han. Enforcing Access Control in Information-Centric Edge Networking. IEEE Transactions on Communications, vol. 69, no. 1, pp. 353-364, Jan. 2021.
|
2020
|
Shashank Reddy Danda, and Bo Chen. Towards Mitigating Spreading of Coronavirus via Mobile Devices. Special Issue on Smart IoT Solutions for Combating COVID-19 Pandemic, IEEE Internet of Things Magazine, vol. 3, no. 3, pp. 12-16, Sept. 2021 (A demo of our current implementation is available here).
|
Weijing You, and Bo Chen. Proofs of Ownership on Encrypted Cloud Data via Intel SGX. The First ACNS Workshop on Secure Cryptographic Implementation (SCI '20)(in conjunction with ACNS '20), Rome, Italy (online), October 2020.
|
Weijing You, Bo Chen, Limin Liu, and Jiwu Jing. Deduplication-friendly Watermarking for Multimedia Data in Public Clouds. The 25th European Symposium on Research in Computer Security (ESORICS '20), Guildford, United Kingdom (online), September 2020 (Acceptance rate: 19.7%) (pre-view video, live presentation).
|
Bo Chen, and Niusen Chen. A Secure Plausibly Deniable System for Mobile Devices against Multi-snapshot Adversaries. 2020 IEEE Symposium on Security and Privacy (S&P '20) Poster Session, San Francisco, CA (online), May 2020.
|
Wen Xie, Niusen Chen, and Bo Chen. Incorporating Malware Detection into The Flash Translation Layer. 2020 IEEE Symposium on Security and Privacy (S&P '20) Poster Session, San Francisco, CA (online), May 2020.
|
2019
|
Biao Gao, Bo Chen, Shijie Jia, and Luning Xia. eHIFS: An Efficient History Independent File System. The 14th ACM ASIA Conference on Computer and Communications Security (ASIACCS
'19), Auckland, New Zeland, July 2019 (Acceptance rate: 17%).
|
Jiang Guo, Miao Wang, Bo Chen, Shucheng Yu, Hanwen Zhang, and Yujun Zhang. Enabling Blockchain Applications over Named Data Networking. 2019 IEEE International Conference on Communications (ICC '19), Shanghai, China, May 2019.
|
Peiying Wang, Shijie Jia, Bo Chen, Luning Xia and Peng Liu. MimosaFTL: Adding Secure and Practical Ransomware Defense Strategy to Flash Translation Layer. The Ninth ACM Conference on Data and Application Security and Privacy (CODASPY '19), Dallas, TX, USA, March 2019 (Acceptance rate: 23.5%).
|
Xuying Meng, Suhang Wang, Kai
Shu, Jundong Li, Bo Chen,
Huan Liu, and Yujun Zhang. Towards
Privacy Preserving Social
Recommendation under Personalized
Privacy Settings. World Wide Web, 22, no. 6 (2019): 2853-2881.
|
Zhiwei Xu, Bo Chen, and Yujun Zhang. Hierarchical Name-based Route Aggregation Scheme. Journal
of Software (impact factor: 2.658), 2019, 30(2):381-398 (in Chinese).
|
2018
|
Qionglu Zhang, Shijie Jia, Bing Chang,
Bo Chen. Ensuring Data
Confidentiality via Plausibly
Deniable Encryption and Secure
Deletion - A Survey. Cybersecurity (2018) 1: 1. https://doi.org/10.1186/s42400-018-0005-8.
|
Bing Chang, Fengwei Zhang, Bo Chen,
Yingjiu Li, Wen Tao Zhu,
Yangguang Tian, Zhan
Wang, and Albert Ching. MobiCeal: Towards Secure and Practical
Plausibly Deniable Encryption on Mobile
Devices. The 48th IEEE/IFIP
International Conference on
Dependable Systems and Networks
(DSN '18),
June 2018 (Acceptance
rate: 28%).
|
Haitao Xu, Fengyuan Xu, and Bo
Chen. Internet Protocol Cameras with No Password Protection: An
Empirical Investigation. 2018 Passive and Active Measurement Conference (PAM
'18), Berlin, Germany, March 2018.
|
Xuying Meng, Suhang Wang, Kai Shu, Jundong Li, Bo Chen, Huan Liu, and Yujun Zhang. Personalized
Privacy-Preserving Social
Recommendation. The Thirty-Second
AAAI Conference on Artificial
Intelligence (AAAI
'18), New Orleans, Louisiana, USA, February 2018 (Acceptance rate: 25%).
|
Bing Chang, Yao Cheng, Bo Chen,
Fengwei Zhang, Wen Tao Zhu,
Yingjiu Li, and Zhan
Wang. User-Friendly Deniable
Storage for Mobile
Devices. Elsevier Computers &
Security, vol. 72, pp. 163-174,
January 2018.
|
2017
|
Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, Peng Liu, Xinyu Xing, and Luning Xia. Supporting
Transparent Snapshot for
Bare-metal Malware Analysis on
Mobile Devices. 2017 Annual
Computer Security Applications
Conference (ACSAC
'17), Orlando, Florida, USA, December 2017 (Acceptance
rate: 19.7%). (Distinguished Paper Award)
|
Danye Wu, Zhiwei Xu, Bo
Chen, and Yujun Zhang. Towards
Access Control for Network
Coding-based Named Data
Networking. 2017 IEEE Global Communications Conference (GLOBECOM '17), Singapore, December 2017.
|
Zhiwei Xu , Bo Chen, Xuying Meng,
and Limin Liu. Towards Efficient Detection of Sybil Attacks in Location-based Social Networks. The 2017 IEEE Symposium Series on Computational Intelligence (SSCI '17), Hawaii, USA, Nov. 27 - Dec. 1, 2017.
|
Kul Prasad Subedi, Daya Ram Budhathoki, Bo Chen,
and Dipankar Dasgupta. RDS3: Ransomware Defense Strategy by Using Stealthily Spare Space. The 2017 IEEE Symposium Series on Computational Intelligence (SSCI '17), Hawaii, USA, Nov. 27 - Dec. 1, 2017.
|
Shijie Jia, Luning Xia, Bo
Chen, and Peng Liu. DEFTL:
Implementing Plausibly Deniable
Encryption in Flash Translation
Layer. 2017 ACM Conference on
Computer and Communications Security
(CCS
'17), Dallas, Texas,
USA, Oct 30 - Nov 3, 2017 (Acceptance rate: 18%).
|
Luning Xia, Shijie Jia, and Bo
Chen. Solid State Storage:
Principle, Architecture and Data Security.
Book, China
Machine Press, ISBN
978-7-111-58001-0, September 2017 (in Chinese).
|
Bo Chen and Reza Curtmola. Remote
Data Integrity Checking with
Server-Side Repair. Journal of Computer Security, vol. 25, no. 6, pp. 537-584, 2017.
|
Chen Zhong, John Yen, Peng Liu, Robert Erbacher, Christopher Garneau, and Bo Chen. Studying Analysts' Data Triage Operations in Cyber Defense Situational Analysis. Book Chapter, in Theory and Models for Cyber Situation Awareness, Peng Liu, Sushil Jajodia, Cliff Wang (eds.), Springer, July 2017.
|
Bo Chen, Reza Curtmola, and Jun
Dai. Auditable Version Control
Systems in Untrusted Public
Clouds. Book Chapter, in Software
Architectures for Cloud and Big
Data, Ivan Mistrik, Rami Bahsoon,
Nour Ali, Maritta Heisel, Bruce
Maxim (eds.), Elsevier - Morgan
Kaufmann, June 2017.
|
2016
|
Bo Chen, Shijie Jia, Luning Xia, and Peng Liu. Sanitizing Data
is Not Enough! Towards Sanitizing
Structural Artifacts in Flash
Media. 2016 Annual Computer
Security Applications Conference
(ACSAC
'16), Los Angeles, California,
USA, December 2016 (Acceptance rate: 22.8%).
|
Lei Lei, Quanwei Cai, Bo
Chen, and Jingqiang
Lin. Towards Efficient
Re-encryption for Secure
Client-side Deduplication in
Public Clouds. The 18th
International Conference on
Information and Communications
Security (ICICS '16), Singapore, Nov. 29 - Dec. 02, 2016.
|
Kul Prasad Subedi, Dipankar Dasgupta,
and Bo Chen. Security Analysis on
InfiniBand Protocol Implementations. The
2016 IEEE Symposium Series on
Computational Intelligence (SSCI
'16), Athens, Greece, Dec. 2016.
|
Jun Xu, Pinyao Guo, Bo Chen,
Robert Erbacher, Ping Chen, and Peng
Liu. Demo: A Symbolic N-Variant
System. The Third ACM Workshop on Moving
Target Defense (MTD
'16, in conjunction with CCS '16), Vienna, Austria, October 2016.
|
Reza Curtmola and Bo
Chen. Availability, Recovery
And Auditing Across Data
Centers. Book Chapter, in Cloud
Computing Security: Foundations
and Challenges, John Vacca
(editor), CRC Press, August 2016.
|
Reza Curtmola and Bo
Chen. Integrity Assurance For
Data Outsourcing. Book Chapter, in
Cloud Computing Security:
Foundations and Challenges, John
Vacca (editor), CRC Press, August 2016.
|
Weiyu Jiang, Jingqiang Lin,
Zhan Wang, Bo Chen, and Kun
Sun. Cloud Security Key
Management: Cloud User
Controls. Book Chapter, in Cloud
Computing Security: Foundations
and Challenges, John Vacca
(editor), CRC Press, August 2016.
|
Xuying Meng, Zhiwei Xu, Bo Chen, and Yujun Zhang. Privacy-preserving Query Log Sharing Based on Prior N-word Aggregation. The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom '16), Tianjin, China, August 23 - August 26, 2016.
|
Danye Wu, Zhiwei Xu, Bo Chen, and Yujun Zhang. What If Routers Are Malicious? Mitigating Content Poisoning Attack in NDN. The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom '16), Tianjin, China, August 23 - August 26, 2016.
|
Shijie Jia, Luning Xia, Bo
Chen, and Peng Liu. NFPS:
Adding Undetectable Secure
Deletion to Flash Translation
Layer. The 11th ACM Asia
Conference on Computer and
Communications Security (ASIACCS
'16), Xi'an, China, May 30 -
June 3, 2016 (Acceptance rate: 20.9%).
|
Lei Lei, Quanwei Cai,
Jingqiang Lin, Jiwu Jing, Zhan
Wang, and Bo Chen.
Enforcing Access Controls on
Encrypted Cloud Storage with
Policy Hiding. Journal
of Software (impact factor: 2.658), 2016, 27(6)(in Chinese).
|
2015
|
Bing Chang, Zhan Wang, Bo
Chen, and Fengwei Zhang. MobiPluto:
File System Friendly Deniable
Storage for Mobile
Devices. 2015 Annual Computer
Security Applications Conference
(ACSAC
'15), Los Angeles, California,
USA, December 2015 (Acceptance rate: 24.4%).
|
Zhiwei Xu, Bo Chen, Ninghan Wang, Yujun Zhang, and Zhongcheng Li. ELDA: Towards Efficient and Lightweight Detection of Cache Pollution Attacks in NDN. The 40th Annual IEEE Conference on Local Computer Networks (LCN '15), Clearwater Beach, Florida, USA, October 2015.
|
Bo Chen, Anil Kumar Ammula, and
Reza Curtmola. Towards
Server-side Repair for Erasure
Coding-based Distributed Storage
Systems. The Fifth ACM Conference on
Data and Application Security and Privacy
(CODASPY
'15), San Antonio, TX, USA, March 2015 (short paper).
|
2014
|
Xingjie Yu, Bo Chen,
Zhan Wang, Bing Chang, Wen Tao
Zhu, and Jiwu Jing. MobiHydra:
Pragmatic and Multi-Level
Plausibly Deniable Encryption
Storage for Mobile
Devices. The 17th Information
Security Conference (ISC
'14), Hong Kong, China,
Oct. 2014 (short paper).
|
Bo Chen and Reza Curtmola. Auditable
Version Control Systems. The 21th
Annual Network and Distributed System
Security Symposium (NDSS
'14), San Diego, CA, USA, Feb. 2014 (Acceptance rate: 18.6%).
|
2013
|
Bo Chen and Reza Curtmola. Towards
Self-Repairing Replication-Based Storage
Systems Using Untrusted Clouds. The
Third ACM Conference on Data and
Application Security and Privacy (CODASPY
'13), San Antonio, TX, USA,
Feb. 2013 (Acceptance rate: 22.4%). (Outstanding Paper Award)
|
2012
|
Bo Chen and Reza Curtmola. POSTER: Robust Dynamic Remote Data Checking for Public Clouds. The 19th ACM Conference on Computer and Communications Security (CCS '12), Raleigh, NC, USA, Oct. 2012 (poster paper).
|
Bo Chen and Reza Curtmola. Robust Dynamic Provable Data Possession. The Third International Workshop on Security and Privacy in Cloud Computing (SPCC '12, in conjunction with ICDCS '12), Macau, China, June 2012 (the full version of the paper is available as a Technical Report).
|
2010
|
Bo Chen, Reza Curtmola, Giuseppe Ateniese, and Randal Burns. Remote Data Checking for Network Coding-based Distributed Storage Systems. The Second ACM Cloud Computing Security Workshop (CCSW '10, in conjunction with CCS '10),Chicago, IL, USA, October 2010.
|