Kai Bu

College of Computer Science and Technology
Zhejiang University, Hangzhou, China
Email: kaibu@zju.edu.cn

Publications

Journal Articles
  1. TreasureCache: Hiding Cache Evictions against Side-Channel Attacks
    Mengming Li, Kai Bu, Chenlu Miao, and Kui Ren
    IEEE Transactions on Dependable and Secure Computing (TDSC), accepted. January 2024
  2. SwiftParade: Anti-burst Multipath Validation
    Anxiao He, Kai Bu, Jiongrui Huang, Yifei Pang, Qianping Gu, and Kui Ren
    IEEE Transactions on Dependable and Secure Computing (TDSC), accepted. September 2023
  3. Hummingbird: Dynamic Path Validation with Hidden Equal-Probability Sampling
    Anxiao He, Xiang Li, Jiandong Fu, Haoyu Hu, Kai Bu, Chenlu Miao, and Kui Ren
    IEEE Transactions on Information Forensics and Security (TIFS), accepted. January 2023
  4. Hitchhiker: Accelerating ORAM with Dynamic Scheduling
    Jingsen Zhu, Mengming Li, Xingjian Zhang, Kai Bu, Miao Zhang, and Tianqi Song
    IEEE Transactions on Computers (TC), accepted for publication. September 2022
  5. RuleOut Forwarding Anomalies for SDN
    Shaoke Xi, Kai Bu, Wensen Mao, Xiaoyu Zhang, Kui Ren, and Xinxin Ren
    IEEE/ACM Transactions on Networking (ToN), accepted for publication. July 2022
  6. Securing Middlebox Policy Enforcement in SDN
    Kai Bu, Yutian Yang, Zixuan Guo, Yuanyuan Yang, Xing Li, and Shigeng Zhang
    Computer Networks (ComNet), accepted for publication. April 2021
  7. Adversarial CAPTCHAs
    Chenghui Shi, Xiaogang Xu, Shouling Ji, Kai Bu, Jianhai Chen, Raheem Beyah, and Ting Wang
    IEEE Transactions on Cybernetics (CYB), accepted for publication. March 2021
  8. Unveiling the Mystery of Internet Packet Forwarding: A Survey of Network Path Validation
    Kai Bu, Avery Laird, Yutian Yang, Linfeng Cheng, Jiaqing Luo, Yingjiu Li, and Kui Ren
    ACM Computing Surveys (CSUR), accepted. June 2020
  9. Atomos: Constant-Size Path Validation Proof
    Anxiao He, Kai Bu, Yucong Li, Eikoh Chida, Qianping Gu, and Kui Ren
    IEEE Transactions on Information Forensics and Security (TIFS), accepted. June 2020
  10. Atlas: A First Step Toward Multipath Validation
    Lin Ma, Kai Bu, Ningchao Wu, Tianxiang Luo, and Kui Ren
    Computer Networks (ComNet), accepted for publication. March 2020
  11. Privacy-Preserving Network Path Validation
    Binanda Sengupta, Yingjiu Li, Kai Bu, and Robert Deng
    ACM Transactions on Internet Technology (TOIT), accepted for publication. November 2019
  12. Falcon: Differential Fault Localization for SDN Control Plane
    Yinbo Yu, Xing Li, Kai Bu, Yan Chen, and Jianfeng Yang
    Computer Networks (ComNet), accepted for publication. July 2019
  13. A Lightweight Policy Enforcement System for Resource Protection and Management in the SDN-based Cloud
    Xue Leng, Kaiyu Hou, Yan Chen, Kai Bu, Libin Song, and You Li
    Computer Networks (ComNet), accepted for publication. May 2019
  14. Efficient Polling-based Information Collection in RFID Systems
    Jia Liu, Bin Xiao, Xuan Liu, Kai Bu, Lijun Chen, and Changhai Nie
    IEEE/ACM Transactions on Networking (ToN), accepted for publication. March 2019
  15. FastLane-ing More Flows with Less Bandwidth for Software-Defined Networking
    Kai Bu, Kaiwen Zhu, Yi Zheng, Yuanyuan Yang, Yutian Yang, and Linfeng Cheng
    Computer Networks (ComNet), accepted for publication. October 2018
  16. Fault Management in Software-Defined Networking: A Survey
    Yinbo Yu, Xing Li, Xue Leng, Libin Song, Kai Bu, Yan Chen, Jianfeng Yang, Liang Zhang, Kang Cheng, and Xin Xiao
    IEEE Communications Surveys & Tutorials, accepted for publication. September 2018
  17. Every Step You Take, I'll Be Watching You: Practical StepAuth-entication of RFID Paths
    Kai Bu and Yingjiu Li
    IEEE Transactions on Information Forensics and Security (TIFS), accepted. October 2017
  18. Editorial: High Performance and Security in Cloud Computing
    Kai Bu, Bin Xiao, and Yi Qian
    Concurrency and Computation: Practice and Experience, accepted for publication. June 2017
    Special Issue on High Performance and Security in Cloud Computing
  19. You Can Clone but You Can't Hide: A Survey of Clone Prevention and Detection for RFID
    Kai Bu, Minyu Weng, Yi Zheng, Bin Xiao, and Xuan Liu
    IEEE Communications Surveys & Tutorials, accepted for publication. March 2017
  20. RuleScope: Inspecting Forwarding Faults for Software-Defined Networking
    Xitao Wen, Kai Bu, Bo Yang, Yan Chen, Li Erran Li, Xiaolin Chen, Jianfeng Yang, and Xue Leng
    IEEE/ACM Transactions on Networking (ToN), accepted for publication. March 2017
  21. Beating the Artificial Chaos: Fighting OSN Spam using Its Own Templates
    Tiantian Zhu, Hongyu Gao, Yi Yang, Kai Bu, Yan Chen, Doug Downey, Kathy Lee, and Alok Choudhary
    IEEE/ACM Transactions on Networking (ToN), accepted for publication. April 2016
  22. Deterministic Detection of Cloning Attacks for Anonymous RFID Systems
    Kai Bu, Mingjie Xu, Xuan Liu, Jiaqing Luo, Shigeng Zhang, and Minyu Weng
    IEEE Transactions on Industrial Informatics (TII), accepted for publication. September 2015
  23. Who Stole My Cheese?: Verifying Intactness of Anonymous RFID Systems
    Kai Bu, Junze Bao, Minyu Weng, Jia Liu, Bin Xiao, Xuan Liu, and Shigeng Zhang
    Ad Hoc Networks, accepted for publication. June 2015
  24. A Locality-based Range-Free Localization Algorithm for Anisotropic Wireless Sensor Networks
    Xuan Liu, Shigeng Zhang, and Kai Bu
    Telecommunication Systems, March 2015.
  25. STEP: A Time-Efficient Tag Searching Protocol in Large RFID Systems
    Xuan Liu, Bin Xiao, Shigeng Zhang, Kai Bu, and Alvin Chan
    IEEE Transactions on Computers (TC), accepted for publication. January 2015
  26. Flexible and Time-Efficient Tag Scanning with Handheld Readers
    Xuan Liu, Shigeng Zhang, Bin Xiao, and Kai Bu
    IEEE Transactions on Mobile Computing (TMC), accepted for publication. December 2014
  27. Unknown Tag Identification in Large RFID Systems: An Efficient and Complete Solution
    Xuan Liu, Bin Xiao, Shigeng Zhang, and Kai Bu
    IEEE Transactions on Parallel and Distributed Systems (TPDS), accepted for publication. April 2014
  28. Iterative Localization of Wireless Sensor Networks: An Accurate and Robust Approach
    Qingjun Xiao, Bin Xiao, Kai Bu, and Jiannong Cao
    IEEE/ACM Transactions on Networking (ToN), vol. 22, no. 2, pp. 608-621, 2014.
  29. Approaching the Time Lower Bound on Cloned-tag Identification for Large RFID Systems
    Kai Bu, Xuan Liu, and Bin Xiao
    Ad Hoc Networks, vol. 13, Part B, no. 0, pp. 271-281, 2014.
  30. Understanding and Improving Piece-related Algorithms in the BitTorrent Protocol
    Jiaqing Luo, Bin Xiao, Kai Bu, and Shijie Zhou
    IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 24, no. 12, pp. 2526-2537, 2013.
  31. Efficient Protocol Design for Dynamic Tag Population Monitoring in Large-Scale RFID Systems
    Qingjun Xiao, Kai Bu, Bin Xiao, and Limin Sun
    Concurrency and Computation: Practice and Experience, vol. 25, no. 14, pp. 2080-2097, 2013.
  32. Secure P2P Topology based on a Multidimensional DHT Space Mapping
    Zhixin Sun, Bingqing Luo, Yadang Chen, and Kai Bu
    SCIENCE CHINA Information Science (Science in China Series F), vol. 56, no. 5, pp. 1-14, 2013.
  33. Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems
    Kai Bu, Xuan Liu, Jiaqing Luo, Bin Xiao, and Guiyi Wei
    IEEE Transactions on Information Forensics and Security (TIFS), vol. 8, no. 3, pp. 429-439, 2013.
  34. Robust Localization against Outliers in Wireless Sensor Networks
    Qingjun Xiao, Kai Bu, Zhijun Wang, and Bin Xiao
    ACM Transactions on Sensor Networks (TOSN), vol. 9, no. 2, pp. 24:1-24:26, 2013.
  35. [in Chinese] Secure P2P topology based on a multidimensional DHT space mapping
    Zhixin Sun, Bingqing Luo, Yadang Chen, and Kai Bu
    SCIENTIA SINICA Informationis (Sci. Sin. Inform.), vol. 43, no. 3, pp. 343-360, 2013.
  36. Efficient Misplaced-Tag Pinpointing in Large RFID Systems
    Kai Bu, Bin Xiao, Qingjun Xiao, and Shigang Chen
    IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 23, no. 11, pp. 2094-2106, 2012.
  37. Toward Collinearity-Aware and Conflict-Friendly Localization for Wireless Sensor Networks
    Kai Bu, Qingjun Xiao, Zhixin Sun, and Bin Xiao
    Computer Communications (COMCOM), vol. 35, no. 13, pp. 1549-1560, 2012.

Conference Papers
  1. Symphony: Path Validation at Scale
    Anxiao He, Jiandong Fu, Kai Bu, Ruiqi Zhou, Chenlu Miao, and Kui Ren
    in The Network and Distributed System Security Symposium (NDSS)
    San Diego, California, USA, Feburary 26 - March 1, 2024. [Presentation]
  2. SwiftDir: Secure Cache Coherence without Overprotection
    Chenlu Miao, Kai Bu, Mengming Li, Shaowu Mao, and Jianwei Jia
    in The 55th IEEE/ACM International Symposium on Microarchitecture (MICRO)
    Chicago, Illinois, USA, October 1-5, 2022. [Presentation]
  3. Towards Practical Deployment-Stage Backdoor Attack on Deep Neural Networks
    Xiangyu Qi, Tinghao Xie, Ruizhe Pan, Jifeng Zhu, Yong Yang, and Kai Bu
    in IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)
    New Orleans, Louisiana, USA, June 19-24, 2022.
  4. unXpec: Breaking Undo-based Safe Speculation
    Mengming Li, Chenlu Miao, Yilong Yang, and Kai Bu
    in The 28th IEEE International Symposium on High-Performance Computer Architecture (HPCA)
    Seoul, South Korea, April 2-6, 2022. [Artifact] [Presentation]
  5. PhantomCache: Obfuscating Cache Conflicts with Localized Randomization
    Qinhan Tan*, Zhihua Zeng*, Kai Bu, and Kui Ren (*Co-first Authors)
    in Proc. of The Network and Distributed System Security Symposium (NDSS)
    San Diego, California, USA, Feburary 23-26, 2020.
  6. [Short Paper] Thinking inside the Box: Differential Fault Localization for SDN Control Plane
    Xing Li, Yinbo Yu, Kai Bu, Yan Chen, Jianfeng Yang, and Ruijie Quan
    in Proc. of The 16th IFIP/IEEE Symposium on Integrated Network and Service Management (IM)
    Washington DC, USA, April 8-12, 2019.
  7. MemCloak: Practical Access Obfuscation for Untrusted Memory
    Weixin Liang, Kai Bu, Ke Li, Jinhong Li, and Arya Tavakoli
    in Proc. of 2018 Annual Computer Security Applications Conference (ACSAC)
    San Juan, Puerto Rico, USA, December 3-7, 2018.
  8. SDNKeeper: Lightweight Resource Protection and Management System for SDN-based Cloud
    Xue Leng, Kaiyu Hou, Yan Chen, Kai Bu, and Libing Song
    in Proc. of IEEE/ACM International Symposium on Quality of Service (IWQoS)
    Banff, Alberta, Canada, June 4-6, 2018.
  9. FlowCloak: Defeating Middlebox-Bypass Attacks in Software-Defined Networking
    Kai Bu, Yutian Yang, Zixuan Guo, Yuanyuan Yang, Xing Li, and Shigeng Zhang
    in Proc. of IEEE International Conference on Computer Communications (INFOCOM)
    Honolulu, HI, USA, April 15-19, 2018. [Presentation]
  10. Reviving Android Malware with DroidRide: And How Not To
    Min Huang, Kai Bu, Hanlin Wang, and Kaiwen Zhu
    in Proc. of The Fourth International Workshop on Cyber Security and Privacy (CSP)
    Chengdu, China, October 13-15, 2016. Co-located with CyberC 2016. [Presentation]
  11. RuleTris: Minimizing Rule Update Latency for TCAM-based SDN Switches Best Paper Nominees
    Xitao Wen, Bo Yang, Yan Chen, Li Erran Li, Kai Bu, Peng Zheng, Yang Yang, and Chengchen Hu
    in Proc. of The 36th IEEE International Conference on Distributed Computing Systems (ICDCS)
    Nara, Japan, June 27-30, 2016.
  12. Toward Taming Policy Enforcement for SDN in The RIGHT Way: Or Can We?
    Kai Bu, Minyu Weng, Junze Bao, Zhenchao Lin, and Zhikui Xu
    in Proc. of International Workshop of Software-Defined Data Communications and Storage (SDDCS)
    Nara, Japan, June 27, 2016. Co-located with ICDCS 2016. [Presentation]
  13. One More Hash is Enough: Efficient Tag Stocktaking in Highly Dynamic RFID Systems
    Xuan Liu, Bin Xiao, Shigeng Zhang, and Kai Bu
    in Proc. of IEEE International Conference on Communications (ICC)
    Kuala Lumpur, Malaysia, May 23-27, 2016.
  14. Is Every Flow on The Right Track?: Inspect SDN Forwarding with RuleScope
    Kai Bu, Xitao Wen, Bo Yang, Yan Chen, Li Erran Li, and Xiaolin Chen
    in Proc. of the 35th Annual IEEE International Conference on Computer Communications (INFOCOM)
    San Francisco, CA, USA, April 10-15, 2016. [Presentation]
  15. [Poster] A Range-free Localization of Passive RFID Tags Using Mobile Readers
    Jiaqing Luo, Shijie Zhou, Hongrong Cheng, Yongjian Liao, and Kai Bu
    in Proc. of the 12th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS)
    Dallas, TX, USA, October 19-22, 2015.
  16. Gotta Tell You Switches Only Once: Toward Bandwidth-Efficient Flow Setup for SDN
    Kai Bu
    in Proc. of International Workshop of Software-Defined Data Communications and Storage (SDDCS)
    Hong Kong, China, April 27, 2015, pp. 492-497. Co-located with INFOCOM 2015. [Presentation]
  17. Intactness Verification in Anonymous RFID Systems
    Kai Bu, Jia Liu, Bin Xiao, Xuan Liu, and Shigeng Zhang
    in Proc. of the 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS)
    Hsinchu, Taiwan, December 16-19, 2014, pp. 134-141. [Presentation]
  18. Spam ain't as Diverse as It Seems: Throttling OSN Spam with Templates Underneath
    Hongyu Gao, Yi Yang, Kai Bu, Yan Chen, Doug Downey, Kathy Lee, and Alok Choudhary
    in Proc. of 2014 Annual Computer Security Applications Conference (ACSAC)
    New Orleans, LA, USA, December 8-12, 2014, pp. 76-85.
  19. Toward Fast and Deterministic Clone Detection for Large Anonymous RFID Systems
    Kai Bu, Mingjie Xu, Xuan Liu, Jiaqing Luo, and Shigeng Zhang
    in Proc. of the 11th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS)
    Philadelphia, PA, USA, October 28-30, 2014, pp. 416-424. [Presentation]
  20. Compiling Minimum Incremental Update for Modular SDN Languages
    Xitao Wen, Chunxiao Diao, Xun Zhao,Yan Chen, Li Erran Li, Bo Yang, and Kai Bu
    in Proc. of ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN)
    Chicago, IL, USA, August 22, 2014, pp. 193-198. Co-located with SIGCOMM 2014.
  21. LOCK: A Fast and Flexible Tag Scanning Mechanism with Handheld Readers
    Xuan Liu, Bin Xiao, Kai Bu, and Shigeng Zhang
    in Proc. of IEEE/ACM International Symposium on Quality of Service (IWQoS)
    Hong Kong, China, May 26-27, 2014, pp. 360-369.
  22. Efficient Distributed Query Processing in Large RFID-enabled Supply Chains
    Jia Liu, Bin Xiao, Kai Bu, and Lijun Chen
    in Proc. of the 33rd Annual IEEE International Conference on Computer Communications (INFOCOM)
    Toronto, Canada, April 27 - May 2, 2014, pp. 163-171.
  23. Less is More: Efficient RFID-based 3D Localization
    Kai Bu, Xuan Liu, Jiwei Li, and Bin Xiao
    in Proc. of the 10th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS)
    Hangzhou, Zhejiang, China, October 14-16, 2013, pp. 86-94. [Presentation]
  24. ENDA: Embracing Network Inconsistency for Dynamic Application Offloading in Mobile Cloud Computing
    Jiwei Li, Kai Bu, Xuan Liu, and Bin Xiao
    in Proc. of the 2nd Mobile Cloud Computing Workshop (MCC)
    Hong Kong, China, August 12, 2013, pp. 39-44. Co-located with SIGCOMM 2013.
  25. Detect and Identify Blocker Tags in Tree-based RFID Systems
    Fei Wang, Bin Xiao, Kai Bu, and Jinshu Su
    in Proc. of IEEE International Conference on Communications (ICC)
    Budapest, Hungary, June 9-13, 2013, pp. 2133-2137.
  26. Complete and Fast Unknown Tag Identification in Large RFID Systems
    Xuan Liu, Shigeng Zhang, Kai Bu, and Bin Xiao
    in Proc. of the 9th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS)
    Las Vegas, Nevada, USA, October 8-11, 2012, pp. 47-55.
  27. [Poster/Short Paper] Fast Cloned-Tag Identification Protocols for Large-Scale RFID Systems
    Kai Bu, Xuan Liu, and Bin Xiao
    in Proc. of the 20th IEEE/ACM International Workshop on Quality of Service (IWQoS)
    Coimbra, Portugal, June 4-5, 2012, pp. 1-4. [Presentation] [Poster]
  28. Efficient Monitoring of Dynamic Tag Populations in RFID Systems Best Paper Award
    Qingjun Xiao, Kai Bu, and Bin Xiao
    in Proc. of the 9th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC)
    Melbourne, Australia, October 24-26, 2011, pp. 106-113.
  29. Efficient Pinpointing of Misplaced Tags in Large RFID Systems
    Kai Bu, Bin Xiao, Qingjun Xiao, and Shigang Chen
    in Proc. of the 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON)
    Salt Lake City, Utah, June 27-30, 2011, pp. 287-295. [Presentation] [Poster]
  30. A Multidimensional Mapping Mechanism Based Secure Routing Method for DHT
    Zhixin Sun, Kai Bu, and Ke Ding
    in Proc. of the 4th International ICST Conference on Scalable Information Systems (INFOSCALE)
    Hong Kong, China, June 10-11, 2009, pp. 192-205.
  31. A Method Based on AMHI for DDoS Attacks Detection and Defense
    Kai Bu and Zhixin Sun
    in Proc. of the 9th International Conference for Young Computer Scientists (ICYCS)
    Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 1571-1576.
    1. Patents
      1. P2P Streaming Traffic Identification based on Traffic Behavior
        Jing Liu, Tingyong Liu, Zhixin Sun, Jing Gong, and Kai Bu
        China Patent Application Number CN200710145490.4, Granted on April 13, 2011.
      2. A Novel Defense Method Against DoS and DDoS Attacks
        Zhixin Sun, Jing Gong, Jing Liu, Tingyong Liu, and Kai Bu
        China Patent Application Number CN200710164224.6, Granted on December 8, 2010.
      3. A Host-Assisted Architecture Defense Against Abnormal Traffic
        Zhixin Sun, Kai Bu, and Songle Chen
        China Patent Application Number  CN200810019664.7, Granted on August 18, 2010.

      Template design by Andreas Viklund.