·Paper Publications
- [1] Bin Yuan, Yan Jia, Luyi Xing, Dongfang Zhao, Xiaofeng Wang, Deqing Zou, Hai Jin, Yuqing Zhang. Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation. In the proceedings of the 29th USENIX Security Symposium, pp. 1183 -1200, 2020.
- [2] Yan Jia, Bin Yuan*, Luyi Xing*, Dongfang Zhao, Yifan Zhang, Xiaofeng Wang, Yijing Liu, Kaimin Zheng, Peyton Crnjak, Yuqing Zhang*, Deqing Zou, Hai Jin. Who’s In Control? On Security Risks of Disjointed IoT Device Management Channels. In the Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 1289-1305, 2021.
- [3] Bin Yuan,Yifan Lu,Yilin Fang, Yueming Wu*, Deqing Zou, Zhen Li, Zhi Li, Hai Jin. Enhancing Deep Learning-based Vulnerability Detection by Building Behavior Graph Model. In the Proceedings of the 45th International Conference on Software Engineering, 2023.
- [4] Zhechang Zhang, Bin Yuan*, Kehan Yang, Deqing Zou, Hai Jin. StateDiver: Testing Deep Packet Inspection Systems with State-Discrepancy Guidance. In the Proceedings of the 2022 Annual Computer Security Applications Conference, 2022.
- [5] Bin Yuan, Yuhan Wu, Maogen Yang, Luyi Xing, Xuchang Wang, Deqing Zou*, Hai Jin. SmartPatch: Verifying the Authenticity of the Trigger-Event in the IoT Platform. IEEE Transactions on Dependable and Secure Computing, 2022.
- [6] Bin Yuan, Deqing Zou, Shui Yu, Hai Jin, Weizhong Qiang, Jinan Shen. Defending against Flow Table Overloading Attack in Software-Defined Networks. IEEE Transactions on Services Computing, vol. 12, no. 2, pp. 231-246, 2019.
- [7] Bin Yuan, Fan Zhang, Jun Wan, Huan Zhao, Shui Yu, Deqing Zou*, Qiangsheng Hua, Hai Jin. Resource Investment for DDoS Attack Resistant SDN: A Practical Assessment. Science China Information Sciences, 2022.
- [8] Bin Yuan, Yan Jia, Dongfang Zhao, Luyi Xing. How I Can Unlock Your Smart Door: Security Pitfalls in Cross-Vendor IoT Access Control. BlackHat Asia 2021.
- [9] Yan Jia, Bin Yuan, Luyi Xing. Codema Attack: Controlling Your Smart Home Through Dangling Management Channels. BlackHat Asia 2022.
- [10] Ze Jin, Yiwei Fang, Yan Jia, Bin Yuan, Qixu Liu, Luyi Xing. IoT Manufacturers' New Nightmare: Design Flaws and Deployment Chaos in Cloud-based IoT Access Control Policies. BlackHat Europe 2022.