| SW Security                                                Cross-checking Semantic Correctness: The Case of Finding File System Bugs, ACM Symposium on Operating Systems Principles (SOSP), Oct 2015 | 
                            
                    | SW Security                                                Type Casting Verification: Stopping an Emerging Attack Vector, Usenix Security Symposium (Security), August 2015 | 
                            
                    | SW Security                                                Understanding Malvertising Through Ad-Injecting Browser Extensions, International Conference on World Wide Web (WWW), May 2015 | 
                            
                    | SW Security                                                Preventing Use-after-free with Dangling Pointers Nullification, Network and Distributed System Security Symposium (NDSS), Feb 2015 | 
                            
                    | SW Security                                                From Zygote to Morula: Fortifying weakened ASLR on Android, IEEE Symposium on Security and Privacy (Oakland), May 2014 | 
                            
                    | SW Security                                                Protecting Location Privacy Using Location Semantics, ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), August 2011 | 
                            
                    | SW Security                                                binOb+: A Framework for Potent and Stealthy Binary Obfuscation, ACM Symposium on Information, Computer and Communications Security (ASIACCS), April  2010 | 
                            
                    | HW Security                                                Hypernel: A Hardware-Assisted Framework for Kernel Protection without Nested Paging, Annual Design Automation Conference (DAC), Jun 2018 | 
                            
                    | AI Security                                                An SoC Architecture for Learning-Based Online Anomaly Detection on ARM, Design Automation Conference WIP, Jun 2018 | 
                            
                    | HW Security                                                A Dynamic Per-context Verification of Kernel Address Integrity from External Monitors, Computers & Security, August 2018 | 
                            
                    | AI Security                                                DADE: a fast data anomaly detection engine for kernel integrity monitoring, The Journal of Supercomputing, Aug 2019 | 
                            
                    | HW Security                                                Architectural Supports to Protect OS Kernels from Code-Injection Attacks and Their Applications, ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, Oct 2017 | 
                            
                    | SW Security                                                Instruction-Level Data Isolation for the Kernel on ARM, Annual Design Automation Conference (DAC), Jun 2017 | 
                            
                    | HW Security                                                Hardware-assisted Efficient Long Branch Tracing for Control Flow Integrity on x86 Processors, Design Automation Conference WIP, Jun 2017 | 
                            
                    | HW Security                                                Using CoreSight PTM to Integrate CRA Monitoring IPs in an ARM-Based SoC, ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, May 2017 | 
                            
                    | HW Security                                                Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping, IEEE Transactions on Dependable and Secure Computing, Apr 2017 | 
                            
                    | HW Security                                                KI-Mon ARM: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object, IEEE Transactions on Dependable and Secure Computing, Mar 2019 | 
                            
                    | SW Security                                                Dynamic Virtual Address Range Adjustment for Intra-Level Privilege Separation on ARM, Network and Distributed System Security Symposium (NDSS), Feb 2017 (Acceptance rate: 16%) | 
                            
                    | Mobile Cloud Computing                                                An Effective Cloud Solution to Ensure the Integrity of Mobile Application via Execution Offloading, The 4th International Conference on Network, Communication and Computing (ICNCC), published in International Journal of Engineering and Technology (IJET), Feb 2017 | 
                            
                    | Mobile Cloud Computing                                                An Effective Cloud Solution to Ensure the Integrity of Mobile Application via Execution Offloading, International Journal of Engineering and Technology 9 (1), Feb 2017 |