Follow
Sze Yiu Chau
Title
Cited by
Cited by
Year
SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X. 509 Certificate Validation Implementations
SY Chau, O Chowdhury, E Hoque, H Ge, A Kate, C Nita-Rotaru, N Li
Security and Privacy (SP), 2017 IEEE Symposium on, 503-520, 2017
692017
Analyzing operational behavior of stateful protocol implementations for detecting semantic bugs
E Hoque, O Chowdhury, SY Chau, C Nita-Rotaru, N Li
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
262017
Analyzing semantic correctness with symbolic execution: A case study on pkcs# 1 v1. 5 signature verification
SY Chau, M Yahyazadeh, O Chowdhury, A Kate, N Li
Network and Distributed Systems Security (NDSS) Symposium 2019, 2019
162019
Koinonia: verifiable e-voting with long-term privacy
H Ge, SY Chau, VE Gonsalves, H Li, T Wang, X Zou, N Li
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
112019
On Re-engineering the X. 509 PKI with Executable Specification for Better Implementation Guarantees
J Debnath, SY Chau, O Chowdhury
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
62021
All your Credentials are Belong to Us: On Insecure WPA2-Enterprise Configurations
MH Hue, J Debnath, KM Leung, L Li, M Minaei, MH Mazhar, K Xian, ...
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
62021
Adaptive Deterrence of DNS Cache Poisoning
SY Chau, O Chowdhury, V Gonsalves, H Ge, W Yang, S Fahmy, N Li
Security and Privacy in Communication Networks: 14th International …, 2018
52018
Why Johnny Can't Make Money With His Contents: Pitfalls of Designing and Implementing Content Delivery Apps
SY Chau, B Wang, J Wang, O Chowdhury, A Kate, N Li
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
42018
When tls meets proxy on mobile
J Debnath, SY Chau, O Chowdhury
Applied Cryptography and Network Security: 18th International Conference …, 2020
32020
A Decade After Bleichenbacher’06, RSA Signature Forgery Still Works
SY Chau
Black Hat USA, 2019
22019
Morpheus: Bringing The (PKCS) One To Meet the Oracle
M Yahyazadeh, SY Chau, L Li, MH Hue, J Debnath, SC Ip, CN Li, ...
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
12021
MoNet: Impressionism As A Defense Against Adversarial Examples
H Ge, SY Chau, N Li
2020 Second IEEE International Conference on Trust, Privacy and Security in …, 2020
12020
Random Spiking and Systematic Evaluation of Defenses Against Adversarial Examples
H Ge, SY Chau, B Ribeiro, N Li
Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020
12020
Towards Precise Reporting of Cryptographic Misuses
Y Chen, Y Liu, KL Wu, DV Le, SY Chau
The Network and Distributed System Security (NDSS) Symposium, 2024
2024
TouchKey: Touch to Generate Symmetric Keys by Skin Electric Potentials Induced by Powerline Radiation
Y Miao, C Gu, Z Yan, SY Chau, R Tan, Q Lin, W Hu, S He, J Chen
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2023
2023
The Devil is in the Details: Hidden Problems of Client-Side Enterprise Wi-Fi Configurators
KL Wu, MH Hue, KF Tang, SY Chau
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless …, 2023
2023
Back to School: On the (In) Security of Academic VPNs
KL Wu, MH Hue, NM Poon, KM Leung, WY Po, KT Wong, SH Hui, ...
32nd USENIX Security Symposium (USENIX Security 23), 5737-5754, 2023
2023
Systematic Evaluations Of Security Mechanism Deployments
SY Chau
Purdue University Graduate School, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–18