Dr. Peng Ning

NCSU-CoE-CS

Home

Teaching
Research
Grants
My Group
Publications
Software
Curriculum Vitae
My Academic Lineage
My Erdös Number

 

 

 

Publications

Copyright Note: The electronic versions of the published papers are made available to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and conditions invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

[By Year] [By Area] [By Type]

My Google Scholar Author Profile
My ACM author profile

Books

  1. Donggang Liu, Peng Ning. Security for Wireless Sensor Networks. Springer. ISBN: 0387327231. December 2006.

  2. Peng Ning, Sushil Jajodia, X.Sean Wang. Intrusion Detection in Distributed Systems: An Abstraction-Based Approach.  Kluwer Academic Publisher (now Springer). ISBN 1-4020-7624-X. October 2003.

Edited Proceedings

  1. David Basin, Peng Liu, and Peng Ning (Eds), Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10). The ACM Press. April 13--16, 2010. Beijing, China.

  2. Michael Backes and Peng Ning (Eds), Computer Security -- ESORICS 2009
    Proceedings of 14th European Symposium on Research in Computer Security, Lecture Notes in Computer Science Vol. 5789
    . Springer. September 21-23, 2009. Saint-Malo, France.

  3. Peng Ning, Sihan Qing, Ninghui Li (Eds), Proceedings of the 2006 International Conference on Information and Communications Security (ICICS 2006). Lecture Notes in Computer Science Vol. 4307. Springer. December 2006. Raleigh, North Carolina, USA.

  4. Vijay Atluri, Pierangela Samarati, Peng Ning, & Wenliang Du (Eds), Proceedings of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks. November 2005. Alexandria, Virginia, USA.

Book Chapters

  1. Sangwon Hyun and Peng Ning, “Secure Code Dissemination in Wireless Sensor Networks,” in Henk van Tilborg and Sushil Jajodia (Eds.), Encyclopedia of Cryptography and Security, 2nd Edition, pages 1099 – 1102, Springer, 2011.

  2. Kun Sun and Peng Ning. “Secure Time Synchronization,” in Henk van Tilborg and Sushil Jajodia (Eds.), Encyclopedia of Cryptography and Security, 2nd Edition, pages 1139 – 1140, Springer, 2011.

  3. Chongkyung Kil, Emre Sezer, Peng Ning, "Automated Software Vulnerability Analysis," in Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang eds. Cyber Situational Awareness, Springer, 2009.

  4. Peng Ning, Dingbang Xu, "Toward Automated Intrusion Alert Analysis," in S. Huang, D. Du, and D. MacCallum (Eds.), Network Security, ISBN 978-0-387-73820-8, Springer, 2010.

  5. Dingbang Xu, Peng Ning, "Correlation Analysis of Intrusion Alerts," in Roberto Di Pietro, Luigi V.Mancini eds. Intrusion Detection Systems, Advances in Information Security, Vol. 38, pages 65—92, ISBN 978-0-387-77265-3, Springer, 2008.

  6. Peng Ning, Donggang Liu, Wenliang Du, “Secure and Resilient Location Discovery in Wireless Sensor Networks,” in Cliff Wang, Radha Poovendran, Sumit Roy (Eds), Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, Springer, 2006.

  7. Kun Sun, Cliff Wang, Peng Ning, “Secure and Resilient Clock Synchronization in Wireless Sensor Networks,” in Cliff Wang, Radha Poovendran, Sumit Roy (Eds), Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, Springer, 2006.

  8. Wenliang Du, Lei Fang, Peng Ning, “Beaconless Location Discovery in Wireless Sensor Networks,” in Cliff Wang, Radha Poovendran, Sumit Roy (Eds), Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, Springer, 2006.

  9. Peng Ning, Sushil Jajodia, “Intrusion Detection Basics,” in H. Bidgoli (Ed.) Handbook of Computer Networks. John Wiley & Sons. 2006.

  10. Peng Ning, Donggang Liu, "Broadcast Authentication and Key Management for Secure Sensor Networks," in Ivan Stojmenovic (Ed.), Sensor Networks, John Wiley & Sons. ISBN: 13-978-0-471-68472-5. 2005.

  11. Peng Ning, Sushil Jajodia, "Intrusion Detection Systems Basics," in Hossein Bidgoli (Ed), Handbook of Information Security, John Wiley & Sons. ISBN: 0-471-64833-7. December 2005.

  12. Peng Ning, Sushil Jajodia, "Intrusion Detection Techniques," In H. Bidgoli (Ed.), The Internet Encyclopedia. John Wiley & Sons. ISBN: 0-471-22201-1. December 2003.

Journal Papers

  1. Chengzhi Li, Huaiyu Dai, Liang Xiao, Peng Ning, "Communication Efficiency of Anti-jamming Broadcast in Large-scale Multi-Channel Wireless Networks," To appear in IEEE Transactions on Signal Processing, 2012.

  2. Attila Yavuz, Peng Ning, Mike Reiter, “BAF and FI-BAF: Efficient and Publicly Verifiable Cryptographic Schemes for Secure Logging in Resource-Constrained Systems,” To appear in ACM Transactions on Information and Systems Security (TISSEC), 2012.

  3. Attila Yaviz, Peng Ning, “Self-Sustaining, Efficient and Forward-Secure Cryptographic Constructions for Unattended Wireless Sensor Networks,” To appear in Ad Hoc Networks, Elsevier, 2012.

  4. Kaiqi Xiong, Ronghua Wang, Wenliang Du, Peng Ning, "Containing Bogus Packet Insertion Attacks for Broadcast Authentication in Sensor Networks," To appear in ACM Transactions on Sensor Networks (TOSN), 2012.

  5. Liang Xiao, Huaiyu Dai, Peng Ning, "Jamming-Resistant Collaborative Broadcast Using Uncoordinated Frequency Hopping," in IEEE Transactions on Information Forensics and Security (TIFS), Vol. 7, No. 1, pages 297--309, February 2012.

  6. Mihui Kim, Varagur Karthik Sriram Iyer, Peng Ning, "MrFair: Misbehavior-resistant Fair Scheduling in Wireless Mesh Networks," in Ad Hoc Networks, Vol. 10, Issue 3, Pages 299-316. Elsevier. May 2012.

  7. Hairong Qi, Xiaorui Wang, Leon M. Tolbert, Fangxing (Fran) Li, Fang Z. Peng, Peng Ning, Massoud Amin, "A Resilient Real-Time System Design for a Secure and Reconfigurable Power Grid," in IEEE Transactions on Smart Grid, Vol. 2, Issue 3, 2011.

  8. Yao Liu, Peng Ning, Mike Reiter, "False Data Injection Attacks against State Estimation in Electric Power Grids" in ACM Transactions in Information and Systems Security (TISSEC), Vol. 14, No. 1, May 2011.

  9. Tong Zhou, Romit Roy Choudhury, Peng Ning, Krishnendu Chakrabarty, "P2DAP -- Detecting Sybil Attacks in Vehicular Ad Hoc Networks," in IEEE Journal on Selected Areas in Communications, Special Issue on Vehicular Communications and Networks, Vol. 29, No. 3, Pages 582--594, March 2011.

  10. Mihui Kim and Peng Ning, "SeCA: A framework for Secure Channel Assignment in wireless mesh networks," in Computer Communications, Volume 34, Issue 4, Pages 567-576, April 2011.

  11. Ronghua Wang, Wenliang Du, Xiaogang Liu, Peng Ning, "ShortPK: A Short-Term Public Key Scheme for Broadcast Authentication in Sensor Networks," in ACM Transactions on Sensor Networks (TOSN), Vol. 6, No. 1, pages 1--29, December 2009.

  12. Donggang Liu, Peng Ning, An Liu, Cliff Wang, Wenliang Du, "Attack-Resistant Location Estimation in Wireless Sensor Networks," in ACM Transactions in Information and Systems Security (TISSEC), Vol. 11, No. 4, pages 1--39, July 2008.

  13. Qing Zhang, Ting Yu, Peng Ning, "A Framework for Identifying Compromised Nodes in Wireless Sensor Networks," in ACM Transactions in Information and Systems Security (TISSEC), Vol. 11, No. 3, pages 1--37, March 2008.

  14. Donggang Liu, Peng Ning, Wenliang Du, "Group-Based Key Pre-Distribution in Wireless Sensor Networks," in ACM Transactions on Sensor Networks (TOSN), Vol. 4, No. 2, pages 11:1--11:30, March 2008.

  15. Peng Ning, An Liu, Wenliang Du, "Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks," in ACM Transactions on Sensor Networks (TOSN), Vol. 4, No. 1, January 2008.

  16. Sencun Zhu, Sanjeev Setia, Sushil Jajodia, and Peng Ning, “An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks,” in ACM Transactions on Sensor Networks (TOSN), Vol. 3, No. 3, article 14, August 2007.

  17. Wenliang Du, Lei Fang, Peng Ning, "LAD: Localization Anomaly Detection for Wireless Sensor Networks," in Journal of Parallel and Distributed Computing, Vol. 66, No. 7, Pages 874-886, July 2006.

  18. Kun Sun, Peng Ning, Cliff Wang, "Secure and Resilient Clock Synchronization in Wireless Sensor Networks (Invited Paper)," in IEEE Journal on Selected Areas in Communications, Vol. 24, No. 2, Pages 395--408, February 2006.

  19. Donggang Liu, Peng Ning, “Improving Key Pre-Distribution with Deployment Knowledge in Static Sensor Networks,” in ACM Transactions on Sensor Networks (TOSN), Vol. 1, No. 2, pages 204-239, November 2005.

  20. Peng Ning, Kun Sun, "How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols," in Ad Hoc Networks, Vol. 3, No. 6, pages 795--819, November 2005.

  21. Kun Sun, Peng Ning, Cliff Wang, "Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks," in IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 2, No. 3, pages 177--189, July-September 2005.

  22. Donggang Liu, Peng Ning, Rongfang Li, "Establishing Pairwise Keys in Distributed Sensor Networks", in ACM Transactions on Information and System Security, Vol. 8, No.1, pages 41--77, February 2005. (More results than the conference version, including actual implementation and performance results on MICA2 motes.)

  23. Peng Ning, Dingbang Xu, "Hypothesizing and Reasoning about Attacks Missed by Intrusion Detection Systems," ACM Transactions on Information and System Security (TISSEC), Vol. 7, No. 4, pages 591--627, November 2004.

  24. Donggang Liu, Peng Ning, "Multi-Level µTESLA: Broadcast Authentication for Distributed Sensor Networks," ACM Transactions in Embedded Computing Systems (TECS), Vol. 3, No. 4, pages 800--836, November 2004.

  25. Peng Ning, Yun Cui, Douglas Reeves, and Dingbang Xu, "Tools and Techniques for Analyzing Intrusion Alerts," in ACM Transactions on Information and System Security, Vol. 7, No. 2, pages 273--318, May 2004.

  26. Yingjiu Li, Peng Ning, X. Sean Wang, Sushil Jajodia, "Discovering Calendar-based Temporal Association Rules," Data and Knowledge Engineering, 44(2):193-218, Elsevier Science, February 2003.

  27. Peng Ning, Sushil Jajodia, X. Sean Wang, "Design and Implementation of A Decentralized Prototype System for Detecting Distributed Attacks," Computer Communications, Special Issue on Intrusion Detection Systems, 25(15):1374-1391, Elsevier Science, September 2002.

  28. Peng Ning, X. Sean Wang, Sushil Jajodia, "An Algebraic Representation of Calendars,'' Annals of Mathematics and Artificial Intelligence, 36(1-2):5-38, Kluwer Academic, September 2002.

  29. Peng Ning, Sushil Jajodia, X. Sean Wang, "Abstraction-based Intrusion Detection in Distributed Environments,"  ACM Transactions on Information and System Security (TISSEC), 4(4):407-452, November 2001. 

  30. Peng Liu, Peng Ning, Sushil Jajodia, "Avoiding Loss of Fairness Owing to Failures in Fair Data Exchange Systems'', Decision Support Systems, 31(3):337-350, Elsevier Science, 2001.

  31. Peng Ning, X. Sean Wang, Sushil Jajodia, "Modeling Requests among Cooperating Intrusion Detection Systems,'' Computer Communications, 23(17):1702-1715, Elsevier Science, 2000.

  32. Dengguo Feng, Peng Ning, "The Relationship Among Nonlinear Criteria of S-box," (in Chinese), Journal of the China Institute of Communications, 19(4):71-75, 1998.

  33. Junhui Yang, Peng Ning, "Analysis of a Fast Public Key Cryptosystem," (in Chinese) Cryptography & Information, 2(3):1-17, 1996.

Conference Papers

  1. Barry Peddycord III, Peng Ning, Sushil Jajodia, "On the Accurate Identification of Network Service Dependencies in Distributed Systems," To appear in Proceedings of 26th USENIX Large Installation System Administration Conference (LISA '12), December 2012.

  2. Xiaofan He, Huaiyu Dai, and Peng Ning, "A Byzantine Attack Defender: the Conditional Frequency Check," To appear in Proceedings of 2012 IEEE International Symposium on Information Theory (ISIT '12), July 2012.

  3. Jason Gionta, Peng Ning, and Xiaolan Zhang, "iHTTP: Efficient Authentication of Non-confidential HTTP Traffic," To appear in Proceedings of 10th International Conference on Applied Cryptography and Network Security (ACNS '12), June 2012.

  4. Arun Natarajan, Peng Ning, Yao Liu, Sushil Jajodia, and Steve E. Hutchinson, "NSDMiner: Automated Discovery of Network Service Dependencies," in Proceedings of IEEE International Conference on Computer Communications (INFOCOM '12), Orlando, FL, March 2012.

  5. Yao Liu, and Peng Ning, "BitTrickle: Defending against Broadband and High-power Reactive Jamming Attacks," in Proceedings of IEEE International Conference on Computer Communications (INFOCOM '12), Orlando, FL, March 2012.

  6. Yao Liu, and Peng Ning, "Enhanced Wireless Channel Authentication Using Time-Synched Link Signature," in Proceedings of IEEE International Conference on Computer Communications (INFOCOM '12), Mini-Conference, Orlando, FL, March 2012.

  7. Attila A. Yavuz, Peng Ning and Mike Reiter, "Efficient, Compromise Resilient and Append-only Cryptographic Schemes for Secure Audit Logging," To appear in Proceedings of 2012 Financial Cryptography and Data Security (FC 2012), February-March 2012.

  8. Wu Zhou, Yajin Zhou, Xuxian Jiang and Peng Ning, "Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces," To appear in Proceedings of 2nd ACM Conference on Data and Application Security and Privacy (CODASPY 2012), February 2012. (Best Paper Award)

  9. Ahmed Azab, Peng Ning, Xiaolan Zhang, “SICE: A Hardware-Level Strongly Isolated Computing Environment for x86 Multi-core Platforms,” in Proceedings of 18th ACM Conference on Computer and Communications Security (CCS ’11), October 2011.

  10. Qian Wang, Kui Ren, Peng Ning, "Anti-jamming Communication in Cognitive Radio Networks with Unknown Channel Statistics," in Proceedings of The 19th IEEE International Conference on Network Protocols (ICNP 2011), October 2011. (Best paper award)

  11. Liang Xiao, Huaiyu Dai, Peng Ning. "Jamming-Resistant Collaborative Broadcast In Wireless Networks, Part I: Singlehop Networks," in Proceedings of GLOBECOM 2011, December 2011.

  12. Liang Xiao, Huaiyu Dai, Peng Ning. "Jamming-Resistant Collaborative Broadcast In Wireless Networks, Part II: Multihop Networks," in Proceedings of GLOBECOM 2011, December 2011.

  13. Minh Tran, Mark Etheridge, Tyler Bletsch, Xuxian Jiang, Vincent Freeh, Peng Ning, "On the Expressiveness of Return-into-libc Attacks," Proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection (RAID 2011), Menlo Park, California, September 2011.

  14. Wu Zhou, Peng Ning, Xiaolan Zhang, Glenn Ammons, Vasanth Bala, Ruowen Wang, "Always Up-to-date -- Scalable Offline Patching of VM Images in a Compute Cloud," in Proceedings of 26th Annual Computer Security Applications Conference (ACSAC 2010), December 2010.

  15. An Liu, Peng Ning, Huaiyu Dai, Yao Liu, Cliff Wang, "Defending DSSS-based Broadcast Communication against Insider Jammers via Delayed Seed-Disclosure," in Proceedings of 26th Annual Computer Security Applications Conference (ACSAC 2010), December 2010.

  16. Chengzhi Li, Huaiyu Dai, Liang Xiao and Peng Ning, "Analysis and Optimization on Jamming-resistant Collaborative Broadcast in Large-Scale Networks," 2010 Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, November 2010. (Invited paper)

  17. An Liu, Peng Ning, Huaiyu Dai, Yao Liu, "USD-FH: Jamming-resistant Wireless Communication using Frequency Hopping with Uncoordinated Seed Disclosure," in Proceedings of 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS '10), November 2010. (Best Paper Award)

  18. Ahmed M. Azab, Peng Ning, Zhi Wang, Xuxian Jiang, Xiaolan Zhang, Nathan C. Skalsky, "HyperSentry: Enabling Stealthy In-context Measurement of Hypervisor Integrity," in Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS 2010), October 2010, Chicago, Il, USA.

  19. Yao Liu, Peng Ning, Huaiyu Dai, "Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures," in Proceedings of 2010 IEEE Symposium on Security and Privacy (Oakland '10), Oakland, CA, May 2010.

  20. Yao Liu, Peng Ning, Huaiyu Dai, An Liu, "Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication," in Proceedings of IEEE INFOCOM 2010, March 2010, San Diego, CA, USA.

  21. Ahmed M. Azab, Peng Ning, Emre C. Sezer, and Xiaolan Zhang, "HIMA: A Hypervisor-Based Integrity Measurement Agent," in Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC '09), December 2009, Honolulu, Hawaii, USA.

  22. Attila Yavuz and Peng Ning, "BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems," in Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC '09), December 2009, Honolulu, Hawaii, USA.

  23. Yao Liu, Peng Ning, Michael Reiter, "False Data Injection Attacks against State Estimation in Electric Power Grids," in Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09), November 2009. (Authors' version)

  24. Zhi Wang, Xuxian Jiang, Weidong Cui, Peng Ning, "Countering Kernel Rootkits with Lightweight Hook Protection," in Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09), November 2009.

  25. Attila Yavuz and Peng Ning, “Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks,” in Proceedings of the Sixth Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous 2009), July 2009.
  26. Chongkyung Kil, Emre Can Sezer, Ahmed Azab, Peng Ning, Xiaolan Zhang, "Remote Attestation to Dynamic System Properties: Towards Providing Complete System Integrity Evidence," in Proceedings of the 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2009), Lisbon, Portugal, June-July 2009.

  27. Young-Hyun Oh, Peng Ning, Yao Liu, Michael Reiter, “Authenticated Data Compression in Delay Tolerant Wireless Sensor Networks,” in Proceedings of the 6th International Conference on Networked Sensing Systems (INSS ’09), pages 137--144, June 2009.

  28. An Liu, Peng Ning, Cliff Wang, "Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks," in IEEE INFOCOM 2009, April 2009.

  29. Kun Sun, An Liu, Roger Xu, Peng Ning, Douglas Maughan, "Securing Network Access in Wireless Sensor Networks (short paper)," in Proceedings of 2nd ACM Conference on Wireless Network Security (WiSec '09), March 2009.

  30. An Liu, Peng Ning, "TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks," in Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN 2008), SPOTS Track, pages 245--256, April 2008.

  31. Sangwon Hyun, Peng Ning, An Liu, Wenliang Du, "Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks," in Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN 2008), IP Track, pages 445--456, April 2008.

  32. Qi Dong, Donggang Liu, Peng Ning, "Pre-Authentication Filters: Providing DoS Resistance for Signature-Based Broadcast Authentication in Wireless Sensor Networks," To appear in Proceedings of 1st ACM Conference on Wireless Network Security (WiSec '08), March/April, 2008.

  33. Chongkyung Kil, Emre Can Sezer, Peng Ning, and Xiaolang Zhang, "Automated Security Debugging Using Program Structural Constraints," in Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC'07), pages 453--462, December 2007.

  34. Emre Can Sezer, Peng Ning, Chongkyung Kil and Jun Xu, "MemSherlock: An Automated Debugger for Unknown Memory Corruption Vulnerabilities," in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), October/November, 2007.

  35. Ronghua Wang, Wenliang Du, and Peng Ning, "Containing Denial-of-Service Attacks in Broadcast Authentication in Sensor Networks," in Proceedings of the Eighth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '07), pages 71--79, September 2007.

  36. Cliff Wang, An Liu, Peng Ning, "Cluster-Based Minimum Mean Square Estimation for Secure and Resilient Localization in Wireless Sensor Networks," in Proceedings of The International Conference on Wireless Algorithms, Systems and Applications (WASA '07), August 2007. (Full version)

  37. Tong Zhou, Romit Roy Choudhury, Peng Ning, Krishnendu Charkrabarty, “Privacy-Preserving Detection of Sybil Attacks in Vehicular Networks,” in Proceedings of 4th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous 2007), August 2007.

  38. Young June Pyun, Young Hee Park, Xinyuan Wang, Douglas S. Reeves, Peng Ning, "Tracing Traffic through Intermediate Hosts that Repacketize Flows," in Proceedings of IEEE INFOCOM '07, pages 634--642, Anchorage, Alaska, May 2007.

  39. Qinghua Zhang, Douglas S. Reeves, Peng Ning, Purush Iyer, "Analyzing Network Traffic to Detect Self-Decrypting Exploit Code," in Proceedings of the 2nd ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS'07), pages 4--12, Singapore, March 2007.

  40. Pan Wang, Peng Ning, Douglas S. Reeves, "A K-anonymous Communication Protocol for Overlay Networks," in Proceedings of the 2nd ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS'07), pages 45--56, Singapore, March 2007.

  41. Chongkyung Kil, Jinsuk Jun, Christopher Bookholt, Jun Xu, and Peng Ning, "Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software," in Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC'06), pages 339--348, December 2006.

  42. Kun Sun, Pai Peng, Peng Ning, Cliff Wang, "Secure Distributed Cluster Formation in Wireless Sensor Networks,'' in Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC'06), pages 131--140, December 2006.

  43. Kun Sun, Peng Ning, Cliff Wang, An Liu, Yuzheng Zhou, "TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks," in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06), pages 264--277, Alexandria, Virginia, October/November 2006.

  44. Dingbang Xu, Peng Ning, "A Flexible Approach to Intrusion Alert Anonymization and Correlation," in Proceedings of 2nd IEEE Communications Society/CreateNet International Conference on Security and Privacy in Communication Networks (SecureComm 2006), August 2006.

  45. Qing Zhang, Ting Yu, Peng Ning, "A Framework for Identifying Compromised Nodes in Sensor Networks," in Proceedings of 2nd IEEE Communications Society/CreateNet International Conference on Security and Privacy in Communication Networks (SecureComm 2006), August 2006.

  46. Pai Peng, Peng Ning, Douglas S. Reeves, "On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques," in Proceedings of 2006 IEEE Symposium on Security and Privacy, pages 334-348, Oakland, CA, May 2006.

  47. Yan Zhai, Peng Ning, Jun Xu, “Integrating IDS Alert Correlation and OS-Level Dependency Tracking,” in Proceedings of IEEE International Conference on Intelligence and Security Informatics (ISI 2006), pages 272--284, May 2006.

  48. Pan Wang, Peng Ning, Douglas S. Reeves, "Network Access Control for Mobile Ad-Hoc Networks," in Proceedings of the 7th International Conference on Information and Communications Security (ICICS '05), pages 350-362, December 2005.

  49. Dingbang Xu, Peng Ning, "Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach," in Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC '05), pages 489-498, December 2005.

  50. Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, and Chris Bookholt, "Automatic Diagnosis and Response to Memory Corruption Vulnerabilities," in Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS '05), November 2005.

  51. Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodia, "Practical Broadcast Authentication in Sensor Networks," in Proceedings of The 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous 2005), pages 118--129, July 2005.

  52. Donggang Liu, Peng Ning, Wenliang Du, "Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks," in Proceedings of the The 25th International Conference on Distributed Computing Systems (ICDCS '05), pages 609--619, June 2005.

  53. Wenliang Du, Ronghua Wang, and Peng Ning, "An Efficient Scheme for Authenticating Public Keys in Sensor Networks," in Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '05), pages 58–67, May 2005.

  54. Donggang Liu, Peng Ning, Wenliang Du, "Attack-Resistant Location Estimation in Sensor Networks," in Proceedings of The Fourth International Symposium on Information Processing in Sensor Networks (IPSN '05), pages 99 -- 106, April 2005.

  55. Wenliang Du, Lei Fang, Peng Ning, "LAD: Localization Anomaly Detection for Wireless Sensor Networks," in Proceedings of the 19th IEEE International Parallel & Distributed Processing Symposium (IPDPS '05), April 2005.

  56. Lei Fang, Wenliang Du, Peng Ning, "A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks," in Proceedings of the IEEE INFOCOM'05, March 13-17, 2005.

  57. Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves, "Reasoning about Complementary Intrusion Evidence," in Proceedings of 20th Annual Computer Security Applications Conference , pages 39--48, December 2004.

  58. Dingbang Xu, Peng Ning, "Alert Correlation through Triggering Events and Common Resources," in Proceedings of 20th Annual Computer Security Applications Conference, pages 360--369, December 2004.

  59. Pan Wang, Peng Ning, Douglas S. Reeves, "Storage-Efficient Stateless Group Key Revocation," in Proceedings of the 7th Information Security Conference (ISC '04), pages 25--36, September 2004.

  60. Qinglin Jiang , Douglas S. Reeves, Peng Ning, "Certificate Recommendations to Improve the Robustness of Web of Trust," in Proceedings of the 7th Information Security Conference (ISC '04), pages 292--303, September 2004.

  61. Sencun Zhu, Sanjeev Setia, Sushil Jajodia, and Peng Ning, "An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data in Sensor Networks," in Proceedings of IEEE Symposium on Security and Privacy, pages 259--271, Oakland, California, May 2004.

  62. Peng Ning, Dingbang Xu, Christopher G. Healey, and Robert A. St. Amant, "Building Attack Scenarios through Integration of Complementary Alert Correlation Methods," in Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS '04), pages 97--111, February, 2004.

  63. Qinglin Jiang, Douglas S. Reeves, Peng Ning, "Improving Robutness of PGP Keyrings by Conflict Detection," in 2004 RSA Conference Cryptographers' Track (CT-RSA2004), LNCS 2964, pages 194--207, February 2004.

  64. Peng Ning, Dingbang Xu, "Learning Attack Strategies from Intrusion Alerts," in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), pages 200--209, Washington D.C., October, 2003. (Acceptance ratio: 35/253) (Full version)

  65. Donggang Liu, Peng Ning, Kun Sun, "Efficient Self-Healing Group Key Distribution with Revocation Capability," in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), pages 231--240, Washington D.C., October, 2003. (Acceptance ratio: 35/253) (Full version)

  66. Donggang Liu, Peng Ning, "Establishing Pairwise Keys in Distributed Sensor Networks," in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), pages 52--61, Washington D.C., October, 2003. (Acceptance ratio: 35/253) (journal version)

  67. Peng Ning, Dingbang Xu, "Adapting Query Optimization Techniques for Efficient Intrusion Alert Correlation," in Proceedings of the 17th IFIP WG 11.3 Working Conference on Data and Application Security, pages 75--88, August, 2003.

  68. Donggang Liu, Peng Ning, "Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks," in Proceedings of the 10th Annual Network and Distributed System Security Symposium (NDSS '03), pages 263--276, February 2003. (Acceptance ratio:17/82)

  69. Peng Ning, Yun Cui, Douglas S. Reeves, "Constructing Attack Scenarios through Correlation of Intrusion Alerts," in Proceedings of the 9th ACM Conference on Computer & Communications Security (CCS '02), pages 245--254, Washington D.C., November 2002. (Subsumed by the journal version.) (Acceptance ratio: 27/153)

  70. Peng Ning, Yun Cui, Douglas S. Reeves, "Analyzing Intensive Intrusion Alerts Via Correlation," in Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002), LNCS 2516, pages 74--94, Zurich, Switzerland, October 2002. (Acceptance ratio: 16/64)

  71. Peng Ning, Yiqun Lisa Yin, "Efficient Software Implementation for Finite Field Multiplication in Normal Basis," in Proceedings of the 3rd International Conference on Information and Communication Security (ICICS 01), LNCS 2229,  pages 177 - 188, November 2001.

  72. Yingjiu Li, Peng Ning, X. Sean Wang, Sushil Jajodia, "Discovering Calendar-based Temporal Association Rules," (Full version) in Proceedings of the 8th International Symposium on Temporal Representation and Reasoning (TIME 01), pages 111-118, Italy, June 2001.

  73. Peng Ning, X. Sean Wang, Sushil Jajodia, "A Query Facility for Common Intrusion Detection Framework,'' in Proceedings of the 23rd National Information Systems Security Conference, pages 317 - 328, Baltimore, MD, October 2000.

  74. Jiahai Yang, Peng Ning, X. Sean Wang, and Sushil Jajodia. "CARDS: A Distributed System for Detecting Coordinated Attacks," in Proceedings of IFIP TC11 Sixteenth Annual Working Conference on Information Security, pages 171-180, August 2000.

  75. Peng Ning, Jiwu Jing, Yingxia Dai, "A Key Exchange Protocol based on Distributed Certficate Authorities," (in Chinese) in Proceedings of the Fifth Annual Conference of Information Security Professional Committee of Chinese Computer Federation, pages 233-237, 1995.

Peer-Reviewed Workshop Papers

  1. Sangwon Hyun and Peng Ning, “Mitigating Wireless Jamming Attacks via Channel Migration,” in Proceedings of the 8th ICDCS Workshop on Wireless Ad Hoc and Sensor Networks (WWASN 2011), June 2011.

  2. Jinpeng Wei, Xiaolan Zhang, Glenn Ammons, Vasanth Bala, and Peng Ning, "Managing Security of Virtual Machine Images in a Cloud Environment," in Proceedings of the 1st ACM Cloud Computing Security Workshop (CCSW '09), November 2009.

  3. Donggang Liu, Peng Ning, Wenliang Du, “Group-Based Key Pre-Distribution in Wireless Sensor Networks,” in Proceedings of 2005 ACM Workshop on Wireless Security (WiSe 2005), pages 11--20, September 2005.

  4. Pai Peng, Peng Ning, Douglas S. Reeves, Xinyuan Wang, "Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets," in Proceedings of the International Workshop on Security in Distributed Computing Systems (SDCS-2005), June 2005.

  5. Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning, "Defending Sybil Attacks in Sensor Networks," in Proceedings of the International Workshop on Security in Distributed Computing Systems (SDCS-2005), June 2005.

  6. Donggang Liu, Peng Ning, "Location-Based Pairwise Key Establishments for Static Sensor Networks," in 2003 ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN '03), October 2003. (Acceptance ratio: 14/71)

  7. Peng Ning, Kun Sun, "How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols," in Proceedings of the 4th Annual IEEE Information Assurance Workshop, pages 60-67, West Point, June 2003. (Best Paper Award) (journal version)

  8. Yingjiu Li, Peng Ning, X. Sean Wang, Sushil Jajodia, "Generating Market Basket Data with Temporal Information," in ACM KDD Workshop on Temporal Data Mining, August 2001.

  9. Peng Ning, X. Sean Wang, Sushil Jajodia, "An Algebraic Representation of Calendars (Extended Abstract),'' in Proceedings of AAAI-2000 International Workshop on Spatial and Temporal Granularity, pages 1 - 8, July 2000.

  10. Peng Liu, Peng Ning, Sushil Jajodia, "Avoiding Loss of Fairness Owing to Process Crashes in Fair Data Exchange Protocols,'' in Proceedings of 2000 International Conference on Dependable Systems and Networks, pages 631-640, New York City, June 2000.

Other Publications

  1. An Liu, Young-Hyun Oh, Peng Ning, "Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks Using Seluge (Demo Abstract)," in Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN 2008), pages 561--562, April 2008.

  2. Pan Wang, Douglas S. Reeves, Peng Ning, "Secure Address Auto-Configuration for Mobile Ad Hoc Networks," Poster, To appear in The 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous 2005), July 2005.

  3. Lloyd Williams, Sean McBride, Robert St. Amant, and Peng Ning. "Toward interface customization in intrusion detection systems," in Workshop on Behavior-based Customization, International Conference on Intelligent User Interfaces (IUI). (Invited.) 2004.

  4. Peng Ning, Yun Cui, Douglas S. Reeves, and Dingbang Xu, "Towards Automating Intrusion Alert Analysis," in 2003 Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection, September 2003. (Invited paper that summarizes our previous work on intrusion alert analysis.)

Patent

  • Yiqun Lisa Yin, Peng Ning, "Efficient Finite Field Multiplication in Normal Basis," US Patent 6,389,442, May 2002.

Dissertation & Thesis

  • Peng Ning, "Abstraction-based Intrusion Detection in Distributed Environments," PhD Dissertation, George Mason University, July 2001.

  • Peng Ning, "Efficient Implementation of A Cryptographic Library for Elliptic Curves over GF(p) and GF(2^m)," Master Thesis, University of Science & Technology of China, July 1997.


Last Updated: August 31, 2012 .