Projects per year
Fingerprint
Dive into the research topics where Chen Cao is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
- 1 Similar Profiles
Collaborations and top research areas from the last five years
Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
Projects
- 1 Active
-
CRII: CSR: Understanding and Enhancing Unsafe Rust Code in Resource-constrained Systems
6/1/23 → 5/31/25
Project: Research project
-
Commercial hypervisor-based task sandboxing mechanisms are unsecured? But we can fix it!
Huo, D., Cao, C., Liu, P., Wang, Y., Li, M. & Xu, Z., Jun 2021, In: Journal of Systems Architecture. 116, 102114.Research output: Contribution to journal › Article › peer-review
2 Scopus citations -
Reviewing IoT Security via Logic Bugs in IoT Platforms and Systems
Zhou, W., Cao, C., Huo, D., Cheng, K., Zhang, L., Guan, L., Liu, T., Jia, Y., Zheng, Y., Zhang, Y., Sun, L., Wang, Y. & Liu, P., Jul 15 2021, In: IEEE Internet of Things Journal. 8, 14, p. 11621-11639 19 p., 9354860.Research output: Contribution to journal › Review article › peer-review
Open Access10 Scopus citations -
Device-agnostic Firmware Execution is Possible: A Concolic Execution Approach for Peripheral Emulation
Cao, C., Guan, L., Ming, J. & Liu, P., Dec 7 2020, Proceedings - 36th Annual Computer Security Applications Conference, ACSAC 2020. Association for Computing Machinery, p. 746-759 14 p. 3427280. (ACM International Conference Proceeding Series).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
29 Scopus citations -
Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation
Luo, L., Zeng, Q., Cao, C., Chen, K., Liu, J., Liu, L., Gao, N., Yang, M., Xing, X. & Liu, P., Dec 1 2020, In: IEEE Transactions on Mobile Computing. 19, 12, p. 2946-2964 19 p., 8807272.Research output: Contribution to journal › Article › peer-review
Open Access10 Scopus citations -
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM
Guan, L., Cao, C., Liu, P., Xing, X., Ge, X., Zhang, S., Yu, M. & Jaeger, T., May 1 2019, In: IEEE Transactions on Dependable and Secure Computing. 16, 3, p. 438-453 16 p., 8423674.Research output: Contribution to journal › Article › peer-review
10 Scopus citations