kun sunDr. Kun Sun
Director of SunLab
Chief Scientist of CSIS
Associate Professor, IST
George Mason University

E-Mail:  ksun3@gmu.edu
Phone:  (703) 993-1715
Fax:    (703) 993-4776
Address: Research Hall, Suite 417
George Mason University
4400 University Drive
Fairfax, VA 22030-4422
~~~~~~~~~~~~~~~~~~~~~~

 

Dr. Kun Sun is an associate professor in George Mason University. He received his Ph.D. in Computer Science from North Carolina State University. His research focuses on systems and network security. Dr. Sun has more than 15 years working experience in both industry and academia, and serves as the Chief Scientist of the Center for Secure Information Systems (CSIS) and the director of the Sun Security Laboratory (SunLab). We are continuously hiring self-motivated graduate and undergraduate students who have research interests on cyber security, operating system, and computer networks.


What's New?
  • [SenSys20] One paper titled "TrustICT: An Efficient Trusted Interaction Interface between Isolated Execution Domains on ARM Multi-core Processors" conditionally accepted by SenSys 2020. Congrats to Jie.
  • [ACSAC20] One paper titled "RusTEE: Developing Memory-Safe ARM TrustZone Applications" accepted by ACSAC 2020. Congrats to Shengye and Xu.
  • [CCS20] One paper titled "Cache-in-the-Middle (CITM) Attacks : Manipulating Sensitive Data in Isolated Execution Environments" accepted by CCS 2020. Congrats to Jie and Shengye.
  • [CCS20] One paper titled "Off-Path TCP Exploits of the Mixed IPID Assignment" accepted by CCS 2020. Congrats to Xuewei and Chuanpu.
  • [CCS20] One paper titled "When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition" accepted by CCS 2020. Congrats to Shu, Jiahao, and Xu.  
  • [RAID20] One paper titled " SIEVE: Secure In-Vehicle Automatic Speech Recognition Systems" accepted by RAID 2020. Congrats to Shu and Jiahao. 
  • [NDSS20] One paper titled "When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN" accepted by NDSS 2020. Congrats to Jiahao and Renjie.
  • [ACSAC TPC] Invited to serve in the TPC of ACSAC 2020. 
  • [DSN TPC] Invited to serve in the TPC of DSN 2020.
  • [NDSS TPC] Invited to serve in the TPC of NDSS 2020.
Research Interests
  • Cyber Deception/Moving Target Defense: Against the experts in defense, the enemy does not know where to attack.  -- SunTzu
  • Trusted Computing Systems: SMM/TrustZone/SGX, VM/Container.
  • Network Security: SDN security, Wireless security.
  • Software Security: Software patch security
Postdoc&Students

Postdoctoral Researcher:

  • Pengbin Feng

Current PhD Students:

  • Songsong Liu, PhD
  • Xinda Wang, PhD
  • Shu Wang, PhD
  • Xu He, PhD
  • Jie Wang, PhD (CAS)
  • Tommy Chin, PhD

Former PhD Students:

  • Shengye Wan, PhD, August 2020, initial placement at Facebook
  • Jianhua Sun, PhD, August 2019, initial placement at Facebook
  • Yue Li, PhD (with Prof. Haining Wang), March 2019, initial placement at Facebook
  • Kyle Wallace, PhD (with Prof. Gang Zhou), August 2018, initial placement at MITRE
Teaching
  • AIT 682 Network and Systems Security (Fall 2017/2018/2019/2020, GMU)
  • AIT 681Secure Software Engineering (Spring 2017/2018/2019/2020, GMU)
  • CYSE 411Secure Software Engineering (Spring 2017/2018, GMU)
  • CSCI 454/554 Computer and Network Security (Spring 2015/2016, W&M)
  • CSCI 680 Advanced System and Network Security (Fall 2015, W&M)
  • CSCI 780 Advanced Network Security (Fall 2014, W&M)
Professional Services
  • NSF Panelist 2013, 2017, 2018, 2019 (2).
  • Geneal Chair: SecureComm 2020.
  • TPC Co-Chair: SciSec, 2020.
  • TPC Member: NDSS 2020, CCS 2015-2017/2019, DSN 2017/2020, ACSAC 2019/2020, INFOCOM 2016-2021, MTD 2015-2020, ICDCS 2019, SecureComm 2016-2018, ICICS 2018-2020, CNS 2014/2016-2020, ICC 2015-2019.
  • Travel Grant Chair: RAID 2019.
  • Workshop Co-chair: NSF SPS 2018.
  • Workshop Co-chair: IEEE CNS 2018.
  • TPC Co-Chair: First ACM Workshop on Moving Target Defense (MTD 2014), in conjunction with ACM CCS 2014.
Selected Publications (More Publications)
  • [ACSAC20]Shengye Wan, Mingshen Sun, Kun Sun, Ning Zhang, and Xu He. "RusTEE: Developing Memory-Safe ARM TrustZone Applications". To appear in Annual Computer Security Applications Conference (ACSAC), Austin, Texas, USA, December 7-11, 2020. [pdf]
  • [CCS20] Jie Wang, Kun Sun, Lingguang Lei, Shengye Wan, Yuewu Wang, and Jiwu Jing. "Cache-in-the-Middle (CITM) Attacks : Manipulating Sensitive Data in Isolated Execution Environments". To appear in ACM Conference on Computer and Communications Security (CCS), Orlando, USA, November 9-13, 2020. [pdf]
  • [CCS20] Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, and Ke Xu. "Off-Path TCP Exploits of the Mixed IPID Assignment". To appear in ACM Conference on Computer and Communications Security (CCS), Orlando, USA, November 9-13, 2020. [pdf]
  • [CCS20] Shu Wang, Jiahao Cao, Xu He, Kun Sun, and Qi Li. "When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition". To appear in ACM Conference on Computer and Communications Security (CCS), Orlando, USA, November 9-13, 2020. [pdf]
  • [RAID20] Shu Wang, Jiahao Cao, Kun Sun, and Qi Li. "SIEVE: Secure In-Vehicle Automatic Speech Recognition Systems". To appear in the 23nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020), Donostia/San Sebastian, Spain on October 14-16, 2020. (Acceptance ratio: 24.79%=31/121) [pdf]
  • [NDSS20] Jiahao Cao, Renjie Xie, Kun Sun, Qi Li, Guofei Gu, and Mingwei Xu. "When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN". To appear in the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 23-26, 2020. [pdf]
  • [RAID19] Jiahao Cao, Zijie Yang, Kun Sun, Qi Li, Mingwei Xu, and Peiyi Han. "Fingerprinting SDN Applications via Encrypted Control Traffic." To appear in the 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019), Beijing, China, September 23-25, 2019. (Acceptance ratio: 22.28%=37/166) [pdf}
  • [DSN19] Shengye Wan, Jianhua Sun, Kun Sun, Ning Zhang, and Qi Li. "SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM Processors". To appear in the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Portland, Oregon, June 24-27, 2019. (Acceptance ratio: 21.40%=54/252) [pdf]
  • [USENIX Security19] Jiahao Cao, Qi Li, Renjie Xie, Kun Sun, Guofei Gu, Mingwei Xu, and Yuan Yang. "The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links". To appear in 28th USENIX Security Symposium (USENIX Security'19), Santa Clara, CA, August 14-16, 2019. [pdf]
  • [CCS17] Lingguang Lei, Yi He, Kun Sun, Jiwu Jing, Yuewu Wang, Qi Li, and Jian Weng. "Vulnerable Implicit Service: A Revisit". To appear in the 24nd ACM Conference on Computer and Communications Security (CCS), Dallas, Texas, October 30-November 3, 2017. (Acceptance ratio: 18%=151/836) [pdf]
  • [S&P16] Ning Zhang, Kun Sun, Wenjing Lou, and Tom Hou. "CaSE: Cache-Assisted Secure Execution on ARM Processors." To appear in the 37th IEEE Symposium on Security and Privacy (S&P), SAN JOSE, CA, MAY 23-25, 2016. (Acceptance ratio: 13.75%=55/400) [pdf]
  • [CCS15] He Sun, Kun Sun, Yuewu Wang, and Jiwu Jing. "TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens". To appear in the 22nd ACM Conference on Computer and Communications Security (CCS), Denver, Colorado, October 12-16, 2015. (Acceptance ratio: 19.81%=128/646) [pdf]
  • [S&P15] Fengwei Zhang, Kevin Leach, Angelos Stavrou, Haining Wang, and Kun Sun. "Using Hardware Features for Increased Debugging Transparency". To appear in the 36th IEEE Symposium on Security and Privacy (S&P), Fairmont, San Jose, CA, May 18-20, 2015. (Acceptance ratio:13.51%=55/407) [pdf]
  • [NDSS15] Xueqiang Wang, Kun Sun, Yuewu Wang, and Jiwu Jing. "DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices", In the Proceedings of 2015 Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 8-11, 2015. (Acceptance ratio: 16.88%=51/302) [pdf]