2018年版
-
Wang, Z., Cao, Y., Qian, Z., Song, C., & Krishnamurthy, S. V. Your state is not mine- a closer look at evading stateful internet censorship (pp. 114–127). Presented at the the 2017 Internet Measurement Conference, New York, New York, USA: ACM Press.
-
Sommer, R., & Paxson, V. Outside the closed world: On using machine learning for network intrusion detection. 2010 IEEE Symposium on Security and Privacy (SP)
-
Tschantz, M. C., Afroz, S., Anonymous, & Paxson, V. (n.d.). SoK: Towards Grounding Censorship Circumvention in Empiricism (pp. 914–933). Presented at the 2016 IEEE Symposium on Security and Privacy (SP)
-
Y. Cao, Z. Qian, Z. Wang, T. Dao, and S. V. Krishnamurthy, “Off-Path TCP Exploits: Global Rate Limit Considered Dangerous,” usenix Security. 2015
-
Ensafi, R., Fifield, D., Winter, P., Feamster, N., Weaver, N., & Paxson, V. (2015). Examining How the Great Firewall Discovers Hidden Circumvention Servers (pp. 445–458). Presented at the the 2015 ACM Conference, New York, New York, USA
- H. Yang, E. Osterweil, D. Massey, S. Lu, and L. Zhang, “Deploying Cryptography in Internet-Scale Systems: A Case con DNSSEC,” IEEE Trans. Dependable and Secure Comput., vol. 8, no. 5, pp. 656–669, 2011.
- Chung, T., van Rijswijk-Deij, R., 0002, B. C., Choffnes, D. R., Levin, D., Maggs, B. M., et al. (2017). A Longitudinal, End-to-End View of the DNSSEC Ecosystem. USENIX Security Symposium.
- Lauinger, T., Chaabane, A., Buyukkayhan, A. S., Onarlioglu, K., & 0002, W. R. (2017). Game of Registrars - An Empirical Analysis of Post-Expiration Domain Name Takeovers. USENIX Security Symposium.
- [Clark J, van Oorschot P C. SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancementsC]//Security and Privacy (SP), 2013 IEEE Symposium on. IEEE, 2013: 511-525.
- J. Liang, J. Jiang, H. Duan, K. Li, T. Wan, and J.-P. Wu. When HTTPS Meets CDN: A Case of Authentication in Delegated Service IEEE Symposium on Security and Privacy 2014, pp. 1–14, Feb. 2014.
- Larisch, J., Choffnes, D. R., Levin, D., Maggs, B. M., Mislove, A., & Wilson, C. (2017). CRLite - A Scalable System for Pushing All TLS Revocations to All Browsers. IEEE Symposium on Security and Privacy, 539–556. http://doi.org/10.1109/SP.2017.17
- Durumeric, Z., Ma, Z., Springall, D., Barnes, R., Sullivan, N., Bursztein, E., et al. (n.d.). The Security Impact of HTTPS Interception. Presented at the Network and Distributed System Security Symposium, 2017
- Durumeric, Z., Halderman, J. A., Adrian, D., Mirian, A., Kasten, J., Bursztein, E., et al. (2015). Neither Snow Nor Rain Nor MITM...An Empirical Analysis of Email Delivery Security, IMC 2015
- Beurdouche, B., & Bhargavan, K. (2015). A messy state of the union: Taming the composite state machines of TLS. IEEE symposium on Security & Privacy, 2015
- Chen, J., Jiang, J., Duan, H., Weaver, N., Wan, T., & Paxson, V. Host of Troubles: Multiple Host Ambiguities in HTTP Implementations ACM SIGSAC CCS 2016.
- M. Johns, S. Lekies, and B. Stock, “Eradicating DNS Rebinding with the Extended Same-Origin Policy,” 2013. ( Usenix Security 2013)
- Xiaofeng Zheng, Jian Jiang, Jinjin Liang, Haixin Duan, Shuo Chen, Tao Wan, Nicholas Weaver, Cookies lack integrity: real world implications, USENIX Security, 2015.
- Schwenk, J., Niemietz, M., & Mainka, C. (2017). Same-Origin Policy - Evaluation in Modern Browsers. USENIX Security Symposium.2017
- Rui Wang, Shuo Chen, XiaoFeng Wang, and Shaz Qadeer, How to Shop for Free Online – Security Analysis of Cashier-as-a-Service Based Web Stores, S&P 2011
- R. Wang, S. Chen, and X. Wang, “Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services,” pp. 365–379, 2012.
- Ying Zhang, Zhuoqing Morley Mao, and Jia Wang Rate TCP-Targeted DoS Attacks Disrupts Internet RoutingProceedings of 14th Annual Network & Distributed System Security Symposium (NDSS), San Diego, CA, February 2007. [slides]
- M. S. Kang, S. B. Lee, and V. D. Gligor, “The Crossfire Attack,” presented at the 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change, pp. 127–141.
- Rossow, C. Amplification hell: Revisiting network protocols for DDoS abuse. NDSS 2014.
- Jianjun Chen, Jian Jiang, Xiaofeng Zheng, Haixin Duan, Jinjin Liang, Tao Wan, Kang Li, Vern Paxson, Forwarding-Loop Attacks in Content Delivery Networks, accepted by NDSS 2016
- Yossi Gilad , Amir Herzberg, Michael Sudkovitch and Michael Goberman, CDN-on-Demand: An affordable DDoS Defense via Untrusted Clouds,NDSS 2016
- Xiaojing Liao,Kan Yuan, Xiaofeng Wang(*), Zhongyu Pei,Hao Yang, Jianjun Chen, Haixin Duan(*), Kun Du, Eihal Alowaisheq, Sumayah Alrwais, Luyi Xing, Raheem Beyah, Seeking Nonsense, Looking for Trouble: Efficient Promotional Infection Detection through Semantic Inconsistency Search, IEEE Symposium on Security & Privacy, 2016
- Kun Du, Hao Yang, Zhou Li, Haixin Duan(*), Kehuan Zhang. The Ever-changing Labyrinth: A Large-scale Analysis of Wildcard DNS Powered Blackhat SEO, USENIX Security 2016
- Ho, G., Javed, A., Paxson, V., & Wagner, D. (n.d.). Detecting Credential Spearphishing Attacks in Enterprise Settings. Usenix 2017