Follow
Pengfei Sun
Pengfei Sun
Manager of Research Team, F5
Verified email at rutgers.edu - Homepage
Title
Cited by
Cited by
Year
Hybrid firmware analysis for known mobile and iot security vulnerabilities
P Sun, L Garcia, G Salles-Loustau, S Zonouz
2020 50th annual IEEE/IFIP international conference on dependable systems …, 2020
392020
Compromising security of economic dispatch in power system operations
D Shelar, P Sun, S Amin, S Zonouz
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
292017
Tell Me More Than Just Assembly! Reversing Cyber-physical Execution Semantics of Embedded IoT Controller Software Binaries
P Sun, L Garcia, S Zonouz
The 49th IEEE/IFIP International Conference on Dependable Systems and …, 2019
262019
Mini-me, you complete me! data-driven drone security via dnn-based approximate computing
A Ding, P Murthy, L Garcia, P Sun, M Chan, S Zonouz
Proceedings of the 24th International Symposium on Research in Attacks …, 2021
182021
Reliable migration module in trusted cloud based on security level-Design and implementation
Y Chen, Q Shen, P Sun, Y Li, Z Chen, S Qing
2012 IEEE 26th International Parallel and Distributed Processing Symposium …, 2012
162012
Poster: LBMS: Load balancing based on multilateral security in cloud
P Sun, Q Shen, Y Chen, Z Wu, C Zhang, A Ruan, L Gu
Proceedings of the 18th ACM conference on Computer and communications …, 2011
152011
Towards data isolation & collaboration in storage cloud
Q Shen, X Yang, X Yu, P Sun, Y Yang, Z Wu
2011 IEEE Asia-Pacific Services Computing Conference, 139-146, 2011
142011
Reverse engineering and retrofitting robotic aerial vehicle control firmware using dispatch
T Kim, A Ding, S Etigowni, P Sun, J Chen, L Garcia, S Zonouz, D Xu, ...
Proceedings of the 20th Annual International Conference on Mobile Systems …, 2022
122022
A covert channel using core alternation
Y Li, Q Shen, C Zhang, P Sun, Y Chen, S Qing
2012 26th International Conference on Advanced Information Networking and …, 2012
72012
Him of Many Faces: Characterizing Billion-scale Adversarial and Benign Browser Fingerprints on Commercial Websites.
S Wu, P Sun, Y Zhao, Y Cao
NDSS, 2023
62023
Trace-free memory data structure forensics via past inference and future speculations
P Sun, R Han, M Zhang, S Zonouz
Proceedings of the 32nd Annual Conference on computer security applications …, 2016
62016
PLCloud: Comprehensive power grid PLC security monitoring with zero safety disruption
H Senyondo, P Sun, R Berthier, S Zonouz
2015 IEEE International Conference on Smart Grid Communications …, 2015
62015
Dynamic memory protection via Intel SGX-supported heap allocation
S Zonouz, M Zhang, P Sun, L Garcia, X Liu
2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th …, 2018
52018
Multilateral security architecture for virtualization platform in multi-tenancy cloud environment
P Sun, Q Shen, L Gu, Y Li, S Qing, Z Chen
IEEE Conference Anthology, 1-5, 2013
52013
Power grid safety control via fine-grained multi-persona programmable logic controllers
G Salles-Loustau, L Garcia, P Sun, M Dehnavi, S Zonouz
2017 IEEE International Conference on Smart Grid Communications …, 2017
42017
A User-Friendly Two-Factor Authentication Method against Real-Time Phishing Attacks
Y Sun, S Zhu, Y Zhao, P Sun
2022 IEEE Conference on Communications and Network Security (CNS), 91-99, 2022
32022
Poster: Known Vulnerability Detection for WebAssembly Binaries
P Sun, L Garcia, Y Han, S Zonouz, Y Zhao
Poster: Known Vulnerability Detection for WebAssembly Binaries, 2021
22021
Cyber-air-gapped detection of controller attacks through physical interdependencies
S Etigowni, M Cintuglu, M Kazerooni, S Hossain, P Sun, K Davis, ...
2017 IEEE International Conference on Smart Grid Communications …, 2017
22017
Exploring semantic reverse engineering for software binary protection
P Sun
Rutgers University, 2019
12019
Selfie: User-defined Sensitive Memory Protection and Recovery
P Sun, S Zonouz
arXiv preprint arXiv:1909.04213, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20