Guan-Hua (Scott) Tu

Assistant Professor

Department of Computer Science and Engineering,
Michigan State University
428 S SHAW LN, ROOM 3115
East Lansing, MI 48824-1266
Email: ghtu AT msu.edu
Office: 1124 Engineering Building
My CV

Publications

    Insecurity of Operational Cellular IoT Service: New Vulnerabilities, Attacks, and Countermeasures
    Sihan Wang, Guan-Hua Tu, Xinyu Lei, Tian Xie, Chi-Yu Li, Po-Yi Chou, Fucheng Hsieh, Yiwen Hu, Li Xiao, Chunyi Peng.
    ACM MOBICOM'21 (acceptance rate: 59/297 = 19.9%).
  • How Can IoT Services Pose New Security Threats In Operational Cellular Networks?
    Tian Xie, Guan-Hua Tu, Chi-Yu Li, Chunyi Peng.
    IEEE Transactions on Mobile Computing (TMC), vol. 20, no. 8, pp. 2592-2606, 1 Aug. 2021. (Paper , BibTex )
  • BFastPay: a Routing-free Protocol for Fast Payment in Bitcoin Network
    Xinyu Lei, Guan-Hua Tu, Tian Xie and Sihan Wang.
    ACM CODASPY'21(Paper , BibTex ).
  • Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures
    Yiwen Hu, Sihan Wang, Guan-Hua Tu, Li Xiao, Tian Xie, Xinyu Lei and Chi-Yu Li.
    ACM CODASPY'21 (Paper , BibTex ).
  • SecWIR: Securing Smart Home IoT Communications via Wi-Fi Routers with Embedded Intelligence
    Xinyu Lei, Guan-Hua Tu, Chi-Yu Li, Tian Xie and Mi Zhang.
    ACM MOBISYS'20 (acceptance rate: 34/175 = 19.4%) (Paper , BibTex ).
  • Ghost Calls from Operational 4G Call Systems: IMS Vulnerability, Call DoS Attack, and Countermeasure
    Yu-Han Lu, Chi-Yu Li, Yao-Yu Li, Sandy Hsin-Yu Hsiao, Tian Xie, Guan-Hua Tu, Wei-Xun Chen.
    ACM MOBICOM'20 (acceptance rate: 24/139 = 17.3%, Fall submission run) .
  • The Untold Secrets of WiFi-Calling Services: Vulnerabilities, Attacks, and Countermeasures
    Tian Xie, Guan-Hua Tu, Bangjie Yin, Chi-Yu Li, Chunyi Peng, Mi Zhang, Hui Liu, and Xiaoming Liu.
    accepted by IEEE Transactions on Mobile Computing (TMC), to appear. (Paper , BibTex )
  • Fast and Secure kNN Query Processing in Cloud Computing
    Xinyu Lei, Guan-Hua Tu, Alex X. Liu, Xie Tian
    IEEE CNS'20 (acceptance rate: 43/151 = 28.4%).
  • SecEQP: A Secure and Efficient Scheme for SkNN Query Problem over Encrypted Geodata on Cloud
    Xinyu Lei, Alex X. Liu, Rui Li, Guan-Hua Tu
    IEEE ICDE'19. (Paper , slides , BibTex )
  • Exploring the Insecurity of Google Account Registration Protocol via Model Checking
    Tian Xie, Sihan Wang, Guan-Hua Tu, Chi-Yu Li, Xinyu Lei
    IEEE SSCI'19. (Paper , slides , BibTex )
  • Device-Customized Multi-Carrier Network Access on Commodity Smartphones
    Yuanjie Li, Chunyi Peng, Haotian Deng, Zengwen Yuan, Guan-Hua Tu, Jiayao Li, Songwu Lu
    IEEE/ACM Transactions on Networking, September 2018. (Paper , BibTex )
  • The Dark Side of Operational Wi-Fi Calling Services
    Tian Xie, Guan-Hua Tu, Chi-Yu Li, Chunyi Peng, Jaiwei Li, Mi Zhang
    IEEE CNS'18.(Paper , slides , BibTex )(acceptance rate: 51/181 = 28.1%)
    Best Paper Award, Google Security Reward
  • The Insecurity of Home Digital Voice Assistants - Vulnerabilities, Attacks and Countermeasures
    Xinyu Lei, Guan-Hua Tu, Alex Liu, Chi-Yu Li, Tian Xie
    IEEE CNS'18. (Paper , BibTex )(acceptance rate: 51/181 = 28.1%)
  • Mobile Edge Computing Platform Deployment in 4G LTE Networks: A Middlebox Approach
    Chi-Yu Li, Hsueh-Yang Liu, Po-Hao Huang, Hsu-Tung Chien, Guan-Hua Tu, Pei-Yuan Hong, Ying-Dar Lin
    USENIX HotEdge’18.
  • How Voice Service Threatens Cellular-connected IoT Devices in the Operational 4G LTE Networks
    Tian Xie, Chi-Yu Li, Jiliang Tang, and Guan-Hua Tu
    IEEE ICC'18. (Paper , BibTex )
  • V2PSense: Enabling Cellular-based V2P Collision Warning Service Through Mobile Sensing
    Chi-Yu Li, Giovanni Salinas, Po-Hao Huang, Guan-Hua Tu, Guo-Huang Hsu, and Tien-Yuan Hsieh
    IEEE ICC'18. (Paper , BibTex )
  • New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks
    Guan-Hua Tu, Chi-Yu Li, Chunyi Peng, Yuanjie Li, Songwu Lu
    ACM CCS'16.(Paper , slides , BibTex ) (acceptance rate: 137/837 = 16.4%)
    Facebook Security Award
  • Detecting Problematic Control-Plane Protocol Interactions in Mobile Networks
    Guan-Hua Tu, Yuanjie Li, Chunyi Peng, Chi-Yu Li, Songwu Lu
    IEEE/ACM Transactions on Networking, 24(2): 1209-1222, April 2016. (Paper , BibTex )
  • VoLTE*: A Lightweight Voice Solution to 4G LTE Networks
    Guan-Hua Tu, Chi-Yu Li, Chunyi Peng, Zengwen Yuan, Yuanjie Li, Xiaohu Zhao, Songwu Lu
    ACM HotMobile'16. (Paper , BibTex )
  • iCellular: Device-Customized Cellular Network Access on Commodity Smartphones
    Yuanjie Li, Haotian Deng, Chunyi Peng, Zengwen Yuan, Guan-Hua Tu, Jiayao Li and Songwu Lu
    USENIX NSDI, 2016 (acceptance rate: 45/225 = 20%). (Paper )
  • Insecurity of Voice Solution VoLTE in LTE Mobile Networks
    Chi-Yu Li*, Guan-Hua Tu* (*:Co-Primary), Chunyi Peng, Zengwen Yuan, Yuanjie Li, Songwu Lu, Xinbing Wang
    ACM CCS'15.(Paper , slides , BibTex ) (acceptance rate: 128/646 = 19.8%)
  • How Voice Call Technology Poses Security Threats in 4G LTE Networks
    Guan-Hua Tu, Chi-Yu Li, Chunyi Peng, Songwu Lu
    IEEE CNS'15.(Paper , Slides , BibTex )) (acceptance rate: 48/171 = 28%)
  • Control-Plane Protocol Interactions in Cellular Networks
    Guan-Hua Tu, Yuanjie Li, Chunyi Peng, Chi-Yu Li, Hongyi Wang, Songwu Lu
    ACM SIGCOMM'14.(Paper , slides , BibTex )(acceptance rate: 45/237 = 19.0%)
  • Real Threats to Your Data Bills: Security Loopholes and Defenses in Mobile Data Charging
    Chunyi Peng, Chi-Yu Li, Hongyi Wang, Guan-Hua Tu, Songwu Lu
    ACM CCS'14.(Paper , BibTex )(acceptance rate: 114/585 = 19.5%)
  • How Voice Calls Affect Data in Operational LTE Networks
    Guan-Hua Tu, Chunyi Peng, Hongyi Wang, Chi-Yu Li, Songwu Lu
    ACM MOBICOM'13.(Paper , slides, BibTex )(acceptance rate: 28/208= 13.5%)
  • Accounting for Roaming Users on Mobile Data Access: Issues and Root Causes
    Guan-Hua Tu, Chunyi Peng, Chi-Yu Li and et al
    ACM MOBISYS'13.(Paper , slides, BibTex )(acceptance rate: 33/211= 15.6%)
  • Can We Pay for What We Get in 3G Data Access?
    Chunyi Peng*, Guan-Hua Tu* (*:Co-Primary), Chi-Yu Li, Songwu Lu
    ACM MOBICOM'12.(Paper , BibTex )). (acceptance rate: 32/212 = 15.1%)
  • Mobile Data Charging: New Attacks and Countermeasures
    Chunyi Peng, Chi-Yu Li, Guan-Hua Tu, Songwu Lu, Lixia Zhang
    ACM CCS'12.(Paper , slides, BibTex )(acceptance rate: 80/423 = 18.9%)

US Patents

  • Anku Jain, Amit Kumar, Guan-Hua Tu, Mobile communication apparatus having anti-theft and auto-notification functions, USA patent application number: US9160830, October 2015.(Granted)
  • Guan-Hua Tu, J.-C. Wang Method and mobile apparatus of receiving a multimedia message, US Patent, Patent number: US7835758, May 2010.(Granted)
  • Guan-Hua Tu. Mobile communication apparatus having anti-theft and auto-notification functions, US. Patent, Patent Number: US7574235 in August 2009.(Granted)
  • Guan-Hua Tu. Method and system for serverless VOIP service in personal communication network, US. Patent, Patent Number: US7519075, April 2009.(Granted)
  • Phone Lin, Y.-B. Lin, Guan-Hua Tu, and R.-G Cheng. An Overflow Control Mechanism for Frame Synchronization of Base Station in Wireless Communication Systems. US. Patent, Patent Number: US7359356, August 2008.(Granted)

Book Chapters

  •   Guan-Hua Tu, Short Message Service Programming for Wireless Internet,
    Chapters 3 and 4, Functionalities of Short Message Service Gateway, ISBN957-8675-83-6, February 2002