| SW Security                                                A Survey and Design of a Scalable Mobile Edge Cloud Platform for the Smart IoT Devices and It’s Applications, International Conference on Computer Science and its Applications, 694-698, Nov 2016 | 
                            
                    | SW Security                                                Instant OS Updates via Userspace Checkpoint-and-Restart, USENIX Annual Technical Conference (ATC),  June 2016 | 
                            
                    | SW Security                                                Hardware-Assisted On-Demand Hypervisor Activation for Efficient Security Critical Code Execution on Mobile Devices, USENIX Annual Technical Conference(ATC), Jun 2016 (Acceptance rate: 19%) | 
                            
                    | SW Security                                                TrackMeOrNot: Enabling Flexible Control on Web Tracking, International Conference on World Wide Web (WWW), April 2016 | 
                            
                    | SW Security                                                Enforcing Kernel Security Invariants with Data Flow Integrity, Network and Distributed System Security Symposium (NDSS), Feb 2016 | 
                            
                    | SW Security                                                ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks, ACM Conference on Computer and Communications Security (CCS), Oct 2015 | 
                            
                    | SW Security                                                Cross-checking Semantic Correctness: The Case of Finding File System Bugs, ACM Symposium on Operating Systems Principles (SOSP), Oct 2015 | 
                            
                    | SW Security                                                Type Casting Verification: Stopping an Emerging Attack Vector, Usenix Security Symposium (Security), August 2015 | 
                            
                    | SW Security                                                Understanding Malvertising Through Ad-Injecting Browser Extensions, International Conference on World Wide Web (WWW), May 2015 | 
                            
                    | SW Security                                                Preventing Use-after-free with Dangling Pointers Nullification, Network and Distributed System Security Symposium (NDSS), Feb 2015 | 
                            
                    | SW Security                                                From Zygote to Morula: Fortifying weakened ASLR on Android, IEEE Symposium on Security and Privacy (Oakland), May 2014 | 
                            
                    | SW Security                                                Protecting Location Privacy Using Location Semantics, ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), August 2011 | 
                            
                    | SW Security                                                binOb+: A Framework for Potent and Stealthy Binary Obfuscation, ACM Symposium on Information, Computer and Communications Security (ASIACCS), April  2010 |