Kai Bu
College of Computer Science and TechnologyZhejiang University, Hangzhou, China
Email: kaibu@zju.edu.cn
Publications
Journal Articles- TreasureCache: Hiding Cache Evictions against Side-Channel Attacks
Mengming Li, Kai Bu, Chenlu Miao, and Kui Ren
IEEE Transactions on Dependable and Secure Computing (TDSC), accepted. January 2024 - SwiftParade: Anti-burst Multipath Validation
Anxiao He, Kai Bu, Jiongrui Huang, Yifei Pang, Qianping Gu, and Kui Ren
IEEE Transactions on Dependable and Secure Computing (TDSC), accepted. September 2023 - Hummingbird: Dynamic Path Validation with Hidden Equal-Probability Sampling
Anxiao He, Xiang Li, Jiandong Fu, Haoyu Hu, Kai Bu, Chenlu Miao, and Kui Ren
IEEE Transactions on Information Forensics and Security (TIFS), accepted. January 2023 - Hitchhiker: Accelerating ORAM with Dynamic Scheduling
Jingsen Zhu, Mengming Li, Xingjian Zhang, Kai Bu, Miao Zhang, and Tianqi Song
IEEE Transactions on Computers (TC), accepted for publication. September 2022 - RuleOut Forwarding Anomalies for SDN
Shaoke Xi, Kai Bu, Wensen Mao, Xiaoyu Zhang, Kui Ren, and Xinxin Ren
IEEE/ACM Transactions on Networking (ToN), accepted for publication. July 2022 - Securing Middlebox Policy Enforcement in SDN
Kai Bu, Yutian Yang, Zixuan Guo, Yuanyuan Yang, Xing Li, and Shigeng Zhang
Computer Networks (ComNet), accepted for publication. April 2021 - Adversarial CAPTCHAs
Chenghui Shi, Xiaogang Xu, Shouling Ji, Kai Bu, Jianhai Chen, Raheem Beyah, and Ting Wang
IEEE Transactions on Cybernetics (CYB), accepted for publication. March 2021 - Unveiling the Mystery of Internet Packet Forwarding: A Survey of Network Path Validation
Kai Bu, Avery Laird, Yutian Yang, Linfeng Cheng, Jiaqing Luo, Yingjiu Li, and Kui Ren
ACM Computing Surveys (CSUR), accepted. June 2020 - Atomos: Constant-Size Path Validation Proof
Anxiao He, Kai Bu, Yucong Li, Eikoh Chida, Qianping Gu, and Kui Ren
IEEE Transactions on Information Forensics and Security (TIFS), accepted. June 2020 - Atlas: A First Step Toward Multipath Validation
Lin Ma, Kai Bu, Ningchao Wu, Tianxiang Luo, and Kui Ren
Computer Networks (ComNet), accepted for publication. March 2020 - Privacy-Preserving Network Path Validation
Binanda Sengupta, Yingjiu Li, Kai Bu, and Robert Deng
ACM Transactions on Internet Technology (TOIT), accepted for publication. November 2019 - Falcon: Differential Fault Localization for SDN Control Plane
Yinbo Yu, Xing Li, Kai Bu, Yan Chen, and Jianfeng Yang
Computer Networks (ComNet), accepted for publication. July 2019 - A Lightweight Policy Enforcement System for Resource Protection and Management in the SDN-based Cloud
Xue Leng, Kaiyu Hou, Yan Chen, Kai Bu, Libin Song, and You Li
Computer Networks (ComNet), accepted for publication. May 2019 - Efficient Polling-based Information Collection in RFID Systems
Jia Liu, Bin Xiao, Xuan Liu, Kai Bu, Lijun Chen, and Changhai Nie
IEEE/ACM Transactions on Networking (ToN), accepted for publication. March 2019 - FastLane-ing More Flows with Less Bandwidth for Software-Defined Networking
Kai Bu, Kaiwen Zhu, Yi Zheng, Yuanyuan Yang, Yutian Yang, and Linfeng Cheng
Computer Networks (ComNet), accepted for publication. October 2018 - Fault Management in Software-Defined Networking: A Survey
Yinbo Yu, Xing Li, Xue Leng, Libin Song, Kai Bu, Yan Chen, Jianfeng Yang, Liang Zhang, Kang Cheng, and Xin Xiao
IEEE Communications Surveys & Tutorials, accepted for publication. September 2018 - Every Step You Take, I'll Be Watching You: Practical StepAuth-entication of RFID Paths
Kai Bu and Yingjiu Li
IEEE Transactions on Information Forensics and Security (TIFS), accepted. October 2017 - Editorial: High Performance and Security in Cloud Computing
Kai Bu, Bin Xiao, and Yi Qian
Concurrency and Computation: Practice and Experience, accepted for publication. June 2017
Special Issue on High Performance and Security in Cloud Computing - You Can Clone but You Can't Hide: A Survey of Clone Prevention and Detection for RFID
Kai Bu, Minyu Weng, Yi Zheng, Bin Xiao, and Xuan Liu
IEEE Communications Surveys & Tutorials, accepted for publication. March 2017 - RuleScope: Inspecting Forwarding Faults for Software-Defined Networking
Xitao Wen, Kai Bu, Bo Yang, Yan Chen, Li Erran Li, Xiaolin Chen, Jianfeng Yang, and Xue Leng
IEEE/ACM Transactions on Networking (ToN), accepted for publication. March 2017 - Beating the Artificial Chaos: Fighting OSN Spam using Its Own Templates
Tiantian Zhu, Hongyu Gao, Yi Yang, Kai Bu, Yan Chen, Doug Downey, Kathy Lee, and Alok Choudhary
IEEE/ACM Transactions on Networking (ToN), accepted for publication. April 2016 - Deterministic Detection of Cloning Attacks for Anonymous RFID Systems
Kai Bu, Mingjie Xu, Xuan Liu, Jiaqing Luo, Shigeng Zhang, and Minyu Weng
IEEE Transactions on Industrial Informatics (TII), accepted for publication. September 2015 - Who Stole My Cheese?: Verifying Intactness of Anonymous RFID Systems
Kai Bu, Junze Bao, Minyu Weng, Jia Liu, Bin Xiao, Xuan Liu, and Shigeng Zhang
Ad Hoc Networks, accepted for publication. June 2015 - A Locality-based Range-Free Localization Algorithm for Anisotropic Wireless Sensor Networks
Xuan Liu, Shigeng Zhang, and Kai Bu
Telecommunication Systems, March 2015. - STEP: A Time-Efficient Tag Searching Protocol in Large RFID Systems
Xuan Liu, Bin Xiao, Shigeng Zhang, Kai Bu, and Alvin Chan
IEEE Transactions on Computers (TC), accepted for publication. January 2015 - Flexible and Time-Efficient Tag Scanning with Handheld Readers
Xuan Liu, Shigeng Zhang, Bin Xiao, and Kai Bu
IEEE Transactions on Mobile Computing (TMC), accepted for publication. December 2014 - Unknown Tag Identification in Large RFID Systems: An Efficient and Complete Solution
Xuan Liu, Bin Xiao, Shigeng Zhang, and Kai Bu
IEEE Transactions on Parallel and Distributed Systems (TPDS), accepted for publication. April 2014 - Iterative Localization of Wireless Sensor Networks: An Accurate and Robust Approach
Qingjun Xiao, Bin Xiao, Kai Bu, and Jiannong CaoIEEE/ACM Transactions on Networking (ToN), vol. 22, no. 2, pp. 608-621, 2014. - Approaching the Time Lower Bound on Cloned-tag Identification for Large RFID Systems
Kai Bu, Xuan Liu, and Bin Xiao
Ad Hoc Networks, vol. 13, Part B, no. 0, pp. 271-281, 2014. - Understanding and Improving Piece-related Algorithms in the BitTorrent Protocol
Jiaqing Luo, Bin Xiao, Kai Bu, and Shijie Zhou
IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 24, no. 12, pp. 2526-2537, 2013. - Efficient Protocol Design for Dynamic Tag Population Monitoring in Large-Scale RFID Systems
Qingjun Xiao, Kai Bu, Bin Xiao, and Limin Sun
Concurrency and Computation: Practice and Experience, vol. 25, no. 14, pp. 2080-2097, 2013. - Secure P2P Topology based on a Multidimensional DHT Space Mapping
Zhixin Sun, Bingqing Luo, Yadang Chen, and Kai Bu
SCIENCE CHINA Information Science (Science in China Series F), vol. 56, no. 5, pp. 1-14, 2013. - Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems
Kai Bu, Xuan Liu, Jiaqing Luo, Bin Xiao, and Guiyi Wei
IEEE Transactions on Information Forensics and Security (TIFS), vol. 8, no. 3, pp. 429-439, 2013. - Robust Localization against Outliers in Wireless Sensor Networks
Qingjun Xiao, Kai Bu, Zhijun Wang, and Bin Xiao
ACM Transactions on Sensor Networks (TOSN), vol. 9, no. 2, pp. 24:1-24:26, 2013. - [in Chinese] Secure P2P topology based on a multidimensional DHT space mapping
Zhixin Sun, Bingqing Luo, Yadang Chen, and Kai Bu
SCIENTIA SINICA Informationis (Sci. Sin. Inform.), vol. 43, no. 3, pp. 343-360, 2013. - Efficient Misplaced-Tag Pinpointing in Large RFID Systems
Kai Bu, Bin Xiao, Qingjun Xiao, and Shigang Chen
IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 23, no. 11, pp. 2094-2106, 2012. - Toward Collinearity-Aware and Conflict-Friendly Localization for Wireless Sensor Networks
Kai Bu, Qingjun Xiao, Zhixin Sun, and Bin Xiao
Computer Communications (COMCOM), vol. 35, no. 13, pp. 1549-1560, 2012.
- MineShark: Cryptomining Traffic Detection at Scale
Shaoke Xi, Tianyi Fu, Kai Bu, Chunling Yang, Zhihua Chang, Wenzhi Chen, Zhou Ma, Chongjie Chen, Yongsheng Shen, and Kui Ren
in The Network and Distributed System Security Symposium (NDSS)
San Diego, California, USA, Feburary 23-28, 2025. [Artifact] [Presentation] - Symphony: Path Validation at Scale
Anxiao He, Jiandong Fu, Kai Bu, Ruiqi Zhou, Chenlu Miao, and Kui Ren
in The Network and Distributed System Security Symposium (NDSS)
San Diego, California, USA, Feburary 26 - March 1, 2024. [Presentation] - SwiftDir: Secure Cache Coherence without Overprotection
Chenlu Miao, Kai Bu, Mengming Li, Shaowu Mao, and Jianwei Jia
in The 55th IEEE/ACM International Symposium on Microarchitecture (MICRO)
Chicago, Illinois, USA, October 1-5, 2022. [Presentation] - Towards Practical Deployment-Stage Backdoor Attack on Deep Neural Networks
Xiangyu Qi, Tinghao Xie, Ruizhe Pan, Jifeng Zhu, Yong Yang, and Kai Bu
in IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)
New Orleans, Louisiana, USA, June 19-24, 2022. - unXpec: Breaking Undo-based Safe Speculation
Mengming Li, Chenlu Miao, Yilong Yang, and Kai Bu
in The 28th IEEE International Symposium on High-Performance Computer Architecture (HPCA)
Seoul, South Korea, April 2-6, 2022. [Artifact] [Presentation] - PhantomCache: Obfuscating Cache Conflicts with Localized Randomization
Qinhan Tan*, Zhihua Zeng*, Kai Bu, and Kui Ren (*Co-first Authors)
in Proc. of The Network and Distributed System Security Symposium (NDSS)
San Diego, California, USA, Feburary 23-26, 2020. - [Short Paper] Thinking inside the Box: Differential Fault Localization for SDN Control Plane
Xing Li, Yinbo Yu, Kai Bu, Yan Chen, Jianfeng Yang, and Ruijie Quan
in Proc. of The 16th IFIP/IEEE Symposium on Integrated Network and Service Management (IM)
Washington DC, USA, April 8-12, 2019. - MemCloak: Practical Access Obfuscation for Untrusted Memory
Weixin Liang, Kai Bu, Ke Li, Jinhong Li, and Arya Tavakoli
in Proc. of 2018 Annual Computer Security Applications Conference (ACSAC)
San Juan, Puerto Rico, USA, December 3-7, 2018. - SDNKeeper: Lightweight Resource Protection and Management System for SDN-based Cloud
Xue Leng, Kaiyu Hou, Yan Chen, Kai Bu, and Libing Song
in Proc. of IEEE/ACM International Symposium on Quality of Service (IWQoS)
Banff, Alberta, Canada, June 4-6, 2018. - FlowCloak: Defeating Middlebox-Bypass Attacks in Software-Defined Networking
Kai Bu, Yutian Yang, Zixuan Guo, Yuanyuan Yang, Xing Li, and Shigeng Zhang
in Proc. of IEEE International Conference on Computer Communications (INFOCOM)
Honolulu, HI, USA, April 15-19, 2018. [Presentation] - Reviving Android Malware with DroidRide: And How Not To
Min Huang, Kai Bu, Hanlin Wang, and Kaiwen Zhu
in Proc. of The Fourth International Workshop on Cyber Security and Privacy (CSP)
Chengdu, China, October 13-15, 2016. Co-located with CyberC 2016. [Presentation] - RuleTris: Minimizing Rule Update Latency for TCAM-based SDN Switches Best Paper Nominees
Xitao Wen, Bo Yang, Yan Chen, Li Erran Li, Kai Bu, Peng Zheng, Yang Yang, and Chengchen Hu
in Proc. of The 36th IEEE International Conference on Distributed Computing Systems (ICDCS)
Nara, Japan, June 27-30, 2016. - Toward Taming Policy Enforcement for SDN in The RIGHT Way: Or Can We?
Kai Bu, Minyu Weng, Junze Bao, Zhenchao Lin, and Zhikui Xu
in Proc. of International Workshop of Software-Defined Data Communications and Storage (SDDCS)
Nara, Japan, June 27, 2016. Co-located with ICDCS 2016. [Presentation] - One More Hash is Enough: Efficient Tag Stocktaking in Highly Dynamic RFID Systems
Xuan Liu, Bin Xiao, Shigeng Zhang, and Kai Bu
in Proc. of IEEE International Conference on Communications (ICC)
Kuala Lumpur, Malaysia, May 23-27, 2016. - Is Every Flow on The Right Track?: Inspect SDN Forwarding with RuleScope
Kai Bu, Xitao Wen, Bo Yang, Yan Chen, Li Erran Li, and Xiaolin Chen
in Proc. of the 35th Annual IEEE International Conference on Computer Communications (INFOCOM)
San Francisco, CA, USA, April 10-15, 2016. [Presentation] - [Poster] A Range-free Localization of Passive RFID Tags Using Mobile Readers
Jiaqing Luo, Shijie Zhou, Hongrong Cheng, Yongjian Liao, and Kai Bu
in Proc. of the 12th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS)
Dallas, TX, USA, October 19-22, 2015. - Gotta Tell You Switches Only Once: Toward Bandwidth-Efficient Flow Setup for SDN
Kai Bu
in Proc. of International Workshop of Software-Defined Data Communications and Storage (SDDCS)
Hong Kong, China, April 27, 2015, pp. 492-497. Co-located with INFOCOM 2015. [Presentation] - Intactness Verification in Anonymous RFID Systems
Kai Bu, Jia Liu, Bin Xiao, Xuan Liu, and Shigeng Zhang
in Proc. of the 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS)
Hsinchu, Taiwan, December 16-19, 2014, pp. 134-141. [Presentation] - Spam ain't as Diverse as It Seems: Throttling OSN Spam with Templates Underneath
Hongyu Gao, Yi Yang, Kai Bu, Yan Chen, Doug Downey, Kathy Lee, and Alok Choudhary
in Proc. of 2014 Annual Computer Security Applications Conference (ACSAC)
New Orleans, LA, USA, December 8-12, 2014, pp. 76-85. - Toward Fast and Deterministic Clone Detection for Large Anonymous RFID Systems
Kai Bu, Mingjie Xu, Xuan Liu, Jiaqing Luo, and Shigeng Zhang
in Proc. of the 11th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS)
Philadelphia, PA, USA, October 28-30, 2014, pp. 416-424. [Presentation] - Compiling Minimum Incremental Update for Modular SDN Languages
Xitao Wen, Chunxiao Diao, Xun Zhao,Yan Chen, Li Erran Li, Bo Yang, and Kai Bu
in Proc. of ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN)
Chicago, IL, USA, August 22, 2014, pp. 193-198. Co-located with SIGCOMM 2014. - LOCK: A Fast and Flexible Tag Scanning Mechanism with Handheld Readers
Xuan Liu, Bin Xiao, Kai Bu, and Shigeng Zhang
in Proc. of IEEE/ACM International Symposium on Quality of Service (IWQoS)
Hong Kong, China, May 26-27, 2014, pp. 360-369. - Efficient Distributed Query Processing in Large RFID-enabled Supply Chains
Jia Liu, Bin Xiao, Kai Bu, and Lijun Chen
in Proc. of the 33rd Annual IEEE International Conference on Computer Communications (INFOCOM)
Toronto, Canada, April 27 - May 2, 2014, pp. 163-171. - Less is More: Efficient RFID-based 3D Localization
Kai Bu, Xuan Liu, Jiwei Li, and Bin Xiao
in Proc. of the 10th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS)
Hangzhou, Zhejiang, China, October 14-16, 2013, pp. 86-94. [Presentation] - ENDA: Embracing Network Inconsistency for Dynamic Application Offloading in Mobile Cloud Computing
Jiwei Li, Kai Bu, Xuan Liu, and Bin Xiao
in Proc. of the 2nd Mobile Cloud Computing Workshop (MCC)
Hong Kong, China, August 12, 2013, pp. 39-44. Co-located with SIGCOMM 2013. - Detect and Identify Blocker Tags in Tree-based RFID Systems
Fei Wang, Bin Xiao, Kai Bu, and Jinshu Su
in Proc. of IEEE International Conference on Communications (ICC)
Budapest, Hungary, June 9-13, 2013, pp. 2133-2137. - Complete and Fast Unknown Tag Identification in Large RFID Systems
Xuan Liu, Shigeng Zhang, Kai Bu, and Bin Xiao
in Proc. of the 9th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS)
Las Vegas, Nevada, USA, October 8-11, 2012, pp. 47-55. - [Poster/Short Paper] Fast Cloned-Tag Identification Protocols for Large-Scale RFID Systems
Kai Bu, Xuan Liu, and Bin Xiao
in Proc. of the 20th IEEE/ACM International Workshop on Quality of Service (IWQoS)
Coimbra, Portugal, June 4-5, 2012, pp. 1-4. [Presentation] [Poster] - Efficient Monitoring of Dynamic Tag Populations in RFID Systems Best Paper Award
Qingjun Xiao, Kai Bu, and Bin Xiao
in Proc. of the 9th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC)
Melbourne, Australia, October 24-26, 2011, pp. 106-113. - Efficient Pinpointing of Misplaced Tags in Large RFID Systems
Kai Bu, Bin Xiao, Qingjun Xiao, and Shigang Chen
in Proc. of the 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON)
Salt Lake City, Utah, June 27-30, 2011, pp. 287-295. [Presentation] [Poster] - A Multidimensional Mapping Mechanism Based Secure Routing Method for DHT
Zhixin Sun, Kai Bu, and Ke Ding
in Proc. of the 4th International ICST Conference on Scalable Information Systems (INFOSCALE)
Hong Kong, China, June 10-11, 2009, pp. 192-205. - A Method Based on AMHI for DDoS Attacks Detection and Defense
Kai Bu and Zhixin Sun
in Proc. of the 9th International Conference for Young Computer Scientists (ICYCS)
Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 1571-1576. - P2P Streaming Traffic Identification based on Traffic Behavior
Jing Liu, Tingyong Liu, Zhixin Sun, Jing Gong, and Kai Bu
China Patent Application Number CN200710145490.4, Granted on April 13, 2011. - A Novel Defense Method Against DoS and DDoS Attacks
Zhixin Sun, Jing Gong, Jing Liu, Tingyong Liu, and Kai Bu
China Patent Application Number CN200710164224.6, Granted on December 8, 2010. - A Host-Assisted Architecture Defense Against Abnormal Traffic
Zhixin Sun, Kai Bu, and Songle Chen
China Patent Application Number CN200810019664.7, Granted on August 18, 2010.
-
Patents
Template design by Andreas Viklund.