default search action
Hai-Xin Duan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c128]Mingxuan Liu, Zhenglong Jin, Jiahai Yang, Baoiun Liu, Haixin Duan, Ying Liu, Ximeng Liu, Shujun Tang:
ChatScam: Unveiling the Rising Impact of ChatGPT on Domain Name Abuse. DSN 2024: 507-521 - [c127]Yunpeng Xing, Chaoyi Lu, Baojun Liu, Haixin Duan, Junzhe Sun, Zhou Li:
Yesterday Once More: Global Measurement of Internet Traffic Shadowing Behaviors. IMC 2024: 230-240 - [c126]Ruixuan Li, Shaodong Xiao, Baojun Liu, Yanzhong Lin, Haixin Duan, Qingfeng Pan, Jianjun Chen, Jia Zhang, Ximeng Liu, Xiuqi Lu, Jun Shao:
Bounce in the Wild: A Deep Dive into Email Delivery Failures from a Large Email Service Provider. IMC 2024: 659-673 - [c125]Mingxuan Liu, Yiming Zhang, Xiang Li, Chaoyi Lu, Baojun Liu, Haixin Duan, Xiaofeng Zheng:
Understanding the Implementation and Security Implications of Protective DNS Services. NDSS 2024 - [c124]Chuhan Wang, Yasuhiro Kuranaga, Yihang Wang, Mingming Zhang, Linkai Zheng, Xiang Li, Jianjun Chen, Haixin Duan, Yanzhong Lin, Qingfeng Pan:
BreakSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet. NDSS 2024 - [c123]Linkai Zheng, Xiang Li, Chuhan Wang, Run Guo, Haixin Duan, Jianjun Chen, Chao Zhang, Kaiwen Shen:
ReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies and DoS Attacks with Grammar-based Fuzzing. NDSS 2024 - [c122]Jianing Wang, Shanqing Guo, Wenrui Diao, Yue Liu, Haixin Duan, Yichen Liu, Zhenkai Liang:
CrypTody: Cryptographic Misuse Analysis of IoT Firmware via Data-flow Reasoning. RAID 2024: 579-593 - [c121]Qi Wang, Jianjun Chen, Zheyu Jiang, Run Guo, Ximeng Liu, Chao Zhang, Haixin Duan:
Break the Wall from Bottom: Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewalls. SP 2024: 185-202 - [c120]Enze Wang, Jianjun Chen, Wei Xie, Chuhan Wang, Yifei Gao, Zhenhua Wang, Haixin Duan, Yang Liu, Baosheng Wang:
Where URLs Become Weapons: Automated Discovery of SSRF Vulnerabilities in Web Applications. SP 2024: 239-257 - [c119]Yacong Gu, Lingyun Ying, Huajun Chai, Yingyuan Pu, Haixin Duan, Xing Gao:
More Haste, Less Speed: Cache Related Security Threats in Continuous Integration Services. SP 2024: 1179-1197 - [c118]Xiang Li, Wei Xu, Baojun Liu, Mingming Zhang, Zhou Li, Jia Zhang, Deliang Chang, Xiaofeng Zheng, Chuhan Wang, Jianjun Chen, Haixin Duan, Qi Li:
TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets. SP 2024: 4459-4477 - [c117]Xiang Li, Dashuai Wu, Haixin Duan, Qi Li:
DNSBomb: A New Practical-and-Powerful Pulsing DoS Attack Exploiting DNS Queries-and-Responses. SP 2024: 4478-4496 - [c116]Yijing Liu, Yiming Zhang, Baojun Liu, Haixin Duan, Qiang Li, Mingxuan Liu, Ruixuan Li, Jia Yao:
Tickets or Privacy? Understand the Ecosystem of Chinese Ticket Grabbing Apps. USENIX Security Symposium 2024 - [c115]Qifan Zhang, Xuesong Bai, Xiang Li, Haixin Duan, Qi Li, Zhou Li:
ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing. USENIX Security Symposium 2024 - [c114]Yunyi Zhang, Baojun Liu, Haixin Duan, Min Zhang, Xiang Li, Fan Shi, Chengxi Xu, Eihal Alowaisheq:
Rethinking the Security Threats of Stale DNS Glue Records. USENIX Security Symposium 2024 - [c113]Yunyi Zhang, Mingxuan Liu, Baojun Liu, Yiming Zhang, Haixin Duan, Min Zhang, Hui Jiang, Yanzhe Li, Fan Shi:
Into the Dark: Unveiling Internal Site Search Abused for Black Hat SEO. USENIX Security Symposium 2024 - [c112]Yunyi Zhang, Mingming Zhang, Baojun Liu, Zhan Liu, Jia Zhang, Haixin Duan, Min Zhang, Fan Shi, Chengxi Xu:
Cross the Zone: Toward a Covert Domain Hijacking via Shared DNS Infrastructure. USENIX Security Symposium 2024 - [c111]Yaru Yang, Yiming Zhang, Tao Wan, Chuhan Wang, Haixin Duan, Jianjun Chen, Yishen Li:
Uncovering Security Vulnerabilities in Real-world Implementation and Deployment of 5G Messaging Services. WISEC 2024: 265-276 - [c110]Ruixuan Li, Baojun Liu, Chaoyi Lu, Haixin Duan, Jun Shao:
A Worldwide View on the Reachability of Encrypted DNS Services. WWW 2024: 1193-1202 - [c109]Xiaoyin Liu, Wenzhi Li, Qinsheng Hou, Shishuai Yang, Lingyun Ying, Wenrui Diao, Yanan Li, Shanqing Guo, Haixin Duan:
From Promises to Practice: Evaluating the Private Browsing Modes of Android Browser Apps. WWW 2024: 1561-1572 - [i5]Yu Bi, Mingshuo Yang, Yong Fang, Xianghang Mi, Shanqing Guo, Shujun Tang, Haixin Duan:
An Empirical Study of Open Edge Computing Platforms: Ecosystem, Usage, and Security Risks. CoRR abs/2404.09681 (2024) - [i4]Ruijie Li, Chenyang Zhang, Huajun Chai, Lingyun Ying, Haixin Duan, Jun Tao:
PowerPeeler: A Precise and General Dynamic Deobfuscation Method for PowerShell Scripts. CoRR abs/2406.04027 (2024) - 2023
- [j16]Mingming Zhang, Xiang Li, Baojun Liu, Jianyu Lu, Yiming Zhang, Jianjun Chen, Haixin Duan, Shuang Hao, Xiaofeng Zheng:
Detecting and Measuring Security Risks of Hosting-Based Dangling Domains. Proc. ACM Meas. Anal. Comput. Syst. 7(1): 9:1-9:28 (2023) - [j15]Mingxuan Liu, Zihan Zhang, Yiming Zhang, Chao Zhang, Zhou Li, Qi Li, Haixin Duan, Donghong Sun:
Automatic Generation of Adversarial Readable Chinese Texts. IEEE Trans. Dependable Secur. Comput. 20(2): 1756-1770 (2023) - [j14]Zhongyu Pei, Xingman Chen, Songtao Yang, Haixin Duan, Chao Zhang:
TAICHI: Transform Your Secret Exploits Into Mine From a Victim's Perspective. IEEE Trans. Dependable Secur. Comput. 20(6): 5278-5292 (2023) - [j13]Qinsheng Hou, Wenrui Diao, Yanhao Wang, Chenglin Mao, Lingyun Ying, Song Liu, Xiaofeng Liu, Yuanzhi Li, Shanqing Guo, Meining Nie, Haixin Duan:
Can We Trust the Phone Vendors? Comprehensive Security Measurements on the Android Firmware Ecosystem. IEEE Trans. Software Eng. 49(7): 3901-3921 (2023) - [c108]Fenglu Zhang, Baojun Liu, Eihal Alowaisheq, Jianjun Chen, Chaoyi Lu, Linjian Song, Yong Ma, Ying Liu, Haixin Duan, Min Yang:
Silence is not Golden: Disrupting the Load Balancing of Authoritative DNS Servers. ACM TUR-C 2023: 133-135 - [c107]Fenglu Zhang, Baojun Liu, Eihal Alowaisheq, Jianjun Chen, Chaoyi Lu, Linjian Song, Yong Ma, Ying Liu, Haixin Duan, Min Yang:
Silence is not Golden: Disrupting the Load Balancing of Authoritative DNS Servers. CCS 2023: 296-310 - [c106]Wei Xu, Xiang Li, Chaoyi Lu, Baojun Liu, Haixin Duan, Jia Zhang, Jianjun Chen, Tao Wan:
TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers. CCS 2023: 311-325 - [c105]Zhenrui Zhang, Geng Hong, Xiang Li, Zhuoqun Fu, Jia Zhang, Mingxuan Liu, Chuhan Wang, Jianjun Chen, Baojun Liu, Haixin Duan, Chao Zhang, Min Yang:
Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild. CCS 2023: 326-340 - [c104]Yue Qin, Zhuoqun Fu, Chuyun Deng, Xiaojing Liao, Jia Zhang, Haixin Duan:
Stolen Risks of Models with Security Properties. CCS 2023: 756-770 - [c103]Fenglu Zhang, Yunyi Zhang, Baojun Liu, Eihal Alowaisheq, Lingyun Ying, Xiang Li, Zaifeng Zhang, Ying Liu, Haixin Duan, Min Zhang:
Wolf in Sheep's Clothing: Evaluating Security Risks of the Undelegated Record on DNS Hosting Services. IMC 2023: 188-197 - [c102]Zihao Jin, Shuo Chen, Yang Chen, Haixin Duan, Jianjun Chen, Jianping Wu:
A Security Study about Electron Applications and a Programming Methodology to Tame DOM Functionalities. NDSS 2023 - [c101]Xiang Li, Baojun Liu, Xuesong Bai, Mingming Zhang, Qifan Zhang, Zhou Li, Haixin Duan, Qi Li:
Ghost Domain Reloaded: Vulnerable Links in Domain Name Delegation and Revocation. NDSS 2023 - [c100]Mingming Zhang, Xiang Li, Baojun Liu, Jianyu Lu, Yiming Zhang, Jianjun Chen, Haixin Duan, Shuang Hao, Xiaofeng Zheng:
Detecting and Measuring Security Risks of Hosting-Based Dangling Domains. SIGMETRICS (Abstracts) 2023: 87-88 - [c99]Yacong Gu, Lingyun Ying, Huajun Chai, Chu Qiao, Haixin Duan, Xing Gao:
Continuous Intrusion: Characterizing the Security of Continuous Integration Services. SP 2023: 1561-1577 - [c98]Yacong Gu, Lingyun Ying, Yingyuan Pu, Xiao Hu, Huajun Chai, Ruimin Wang, Xing Gao, Haixin Duan:
Investigating Package Related Security Threats in Software Registries. SP 2023: 1578-1595 - [c97]Xingman Chen, Yinghao Shi, Zheyu Jiang, Yuan Li, Ruoyu Wang, Haixin Duan, Haoyu Wang, Chao Zhang:
MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries. USENIX Security Symposium 2023: 841-858 - [c96]Xiang Li, Chaoyi Lu, Baojun Liu, Qifan Zhang, Zhou Li, Haixin Duan, Qi Li:
The Maginot Line: Attacking the Boundary of DNS Caching Protection. USENIX Security Symposium 2023: 3153-3170 - [c95]Run Guo, Jianjun Chen, Yihang Wang, Keran Mu, Baojun Liu, Xiang Li, Chao Zhang, Haixin Duan, Jianping Wu:
Temporal CDN-Convex Lens: A CDN-Assisted Practical Pulsing DDoS Attack. USENIX Security Symposium 2023: 6185-6202 - [i3]Qifan Zhang, Xuesong Bai, Xiang Li, Haixin Duan, Qi Li, Zhou Li:
ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing. CoRR abs/2310.03202 (2023) - 2022
- [c94]Libo Chen, Quanpu Cai, Zhenbang Ma, Yanhao Wang, Hong Hu, Minghang Shen, Yue Liu, Shanqing Guo, Haixin Duan, Kaida Jiang, Zhi Xue:
SFuzz: Slice-based Fuzzing for Real-Time Operating Systems. CCS 2022: 485-498 - [c93]Mingshuo Yang, Yunnan Yu, Xianghang Mi, Shujun Tang, Shanqing Guo, Yilin Li, Xiaofeng Zheng, Haixin Duan:
An Extensive Study of Residential Proxies in China. CCS 2022: 3049-3062 - [c92]Kaiwen Shen, Jianyu Lu, Yaru Yang, Jianjun Chen, Mingming Zhang, Haixin Duan, Jia Zhang, Xiaofeng Zheng:
HDiff: A Semi-automatic Framework for Discovering Semantic Gap Attack in HTTP Implementations. DSN 2022: 1-13 - [c91]Huajun Chai, Lingyun Ying, Haixin Duan, Daren Zha:
Invoke-Deobfuscation: AST-Based and Semantics-Preserving Deobfuscation for PowerShell Scripts. DSN 2022: 295-306 - [c90]Mingxuan Liu, Yiming Zhang, Baojun Liu, Haixin Duan:
Exploring the Characteristics and Security Risks of Emerging Emoji Domain Names. ESORICS (3) 2022: 186-206 - [c89]Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu:
Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers. EuroS&P 2022: 171-187 - [c88]Yiming Zhang, Mingxuan Liu, Mingming Zhang, Chaoyi Lu, Haixin Duan:
Ethics in Security Research: Visions, Reality, and Paths Forward. EuroS&P Workshops 2022: 538-545 - [c87]Qinsheng Hou, Wenrui Diao, Yanhao Wang, Xiaofeng Liu, Song Liu, Lingyun Ying, Shanqing Guo, Yuanzhi Li, Meining Nie, Haixin Duan:
Large-scale Security Measurements on the Android Firmware Ecosystem. ICSE 2022: 1257-1268 - [c86]Chuyun Deng, Mingxuan Liu, Yue Qin, Jia Zhang, Hai-Xin Duan, Donghong Sun:
ValCAT: Variable-Length Contextualized Adversarial Transformations Using Encoder-Decoder Language Model. NAACL-HLT 2022: 1735-1746 - [c85]Xuewei Feng, Qi Li, Kun Sun, Ke Xu, Baojun Liu, Xiaofeng Zheng, Qiushi Yang, Haixin Duan, Zhiyun Qian:
PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP. NDSS 2022 - [c84]Fenglu Zhang, Chaoyi Lu, Baojun Liu, Haixin Duan, Ying Liu:
Measuring the Practical Effect of DNS Root Server Instances: A China-Wide Case Study. PAM 2022: 247-263 - [c83]Zhuoqun Fu, Mingxuan Liu, Yue Qin, Jia Zhang, Yuan Zou, Qilei Yin, Qi Li, Haixin Duan:
Encrypted Malware Traffic Detection via Graph-based Network Analysis. RAID 2022: 495-509 - [c82]Zihao Jin, Ziqiao Kong, Shuo Chen, Haixin Duan:
Timing-Based Browsing Privacy Vulnerabilities Via Site Isolation. SP 2022: 1525-1539 - [c81]Geng Hong, Zhemin Yang, Sen Yang, Xiaojing Liao, Xiaolin Du, Min Yang, Haixin Duan:
Analyzing Ground-Truth Data of Mobile Gambling Scams. SP 2022: 2176-2193 - [c80]Lei Zhang, Keke Lian, Haoyu Xiao, Zhibo Zhang, Peng Liu, Yuan Zhang, Min Yang, Haixin Duan:
Exploit the Last Straw That Breaks Android Systems. SP 2022: 2230-2247 - [c79]Qinge Xie, Shujun Tang, Xiaofeng Zheng, Qingran Lin, Baojun Liu, Haixin Duan, Frank Li:
Building an Open, Robust, and Stable Voting-Based Domain Top List. USENIX Security Symposium 2022: 625-642 - [c78]Chuhan Wang, Kaiwen Shen, Minglei Guo, Yuxuan Zhao, Mingming Zhang, Jianjun Chen, Baojun Liu, Xiaofeng Zheng, Haixin Duan, Yanzhong Lin, Qingfeng Pan:
A Large-scale and Longitudinal Measurement Study of DKIM Deployment. USENIX Security Symposium 2022: 1185-1201 - [c77]Shiyue Nie, Yiming Zhang, Tao Wan, Haixin Duan, Song Li:
Measuring the Deployment of 5G Security Enhancement. WISEC 2022: 169-174 - [i2]Mingshuo Yang, Yunnan Yu, Xianghang Mi, Shujun Tang, Shanqing Guo, Yilin Li, Xiaofeng Zheng, Haixin Duan:
An Extensive Study of Residential Proxies in China. CoRR abs/2209.06056 (2022) - 2021
- [c76]Mingxuan Liu, Yiming Zhang, Baojun Liu, Zhou Li, Haixin Duan, Donghong Sun:
Detecting and Characterizing SMS Spearphishing Attacks. ACSAC 2021: 930-943 - [c75]Yiming Zhang, Baojun Liu, Chaoyi Lu, Zhou Li, Haixin Duan, Jiachen Li, Zaifeng Zhang:
Rusted Anchors: A National Client-Side View of Hidden Root CAs in the Web PKI Ecosystem. CCS 2021: 1373-1387 - [c74]Xiang Li, Baojun Liu, Xiaofeng Zheng, Haixin Duan, Qi Li, Youjun Huang:
Fast IPv6 Network Periphery Discovery and Security Implications. DSN 2021: 88-100 - [c73]Hao Yang, Kun Du, Yubao Zhang, Shuai Hao, Haining Wang, Jia Zhang, Haixin Duan:
Mingling of Clear and Muddy Water: Understanding and Detecting Semantic Confusion in Blackhat SEO. ESORICS (1) 2021: 263-284 - [c72]Hui Gao, Yiming Zhang, Tao Wan, Jia Zhang, Haixin Duan:
On Evaluating Delegated Digital Signing of Broadcasting Messages in 5G. GLOBECOM 2021: 1-7 - [c71]Chaoyi Lu, Baojun Liu, Yiming Zhang, Zhou Li, Fenglu Zhang, Haixin Duan, Ying Liu, Joann Qiongna Chen, Jinjin Liang, Zaifeng Zhang, Shuang Hao, Min Yang:
From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR. NDSS 2021 - [c70]Libo Chen, Yanhao Wang, Quanpu Cai, Yunfan Zhan, Hong Hu, Jiaqi Linghu, Qinsheng Hou, Chao Zhang, Haixin Duan, Zhi Xue:
Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems. USENIX Security Symposium 2021: 303-319 - [c69]Kaiwen Shen, Chuhan Wang, Minglei Guo, Xiaofeng Zheng, Chaoyi Lu, Baojun Liu, Yuxuan Zhao, Shuang Hao, Haixin Duan, Qingfeng Pan, Min Yang:
Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks. USENIX Security Symposium 2021: 3201-3217 - 2020
- [j12]Pengxiong Zhu, Keyu Man, Zhongjie Wang, Zhiyun Qian, Roya Ensafi, J. Alex Halderman, Hai-Xin Duan:
Characterizing Transnational Internet Performance and the Great Bottleneck of China. Proc. ACM Meas. Anal. Comput. Syst. 4(1): 13:1-13:23 (2020) - [c68]Kun Du, Hao Yang, Yubao Zhang, Haixin Duan, Haining Wang, Shuang Hao, Zhou Li, Min Yang:
Understanding Promotion-as-a-Service on GitHub. ACSAC 2020: 597-610 - [c67]Yiming Zhang, Baojun Liu, Chaoyi Lu, Zhou Li, Haixin Duan, Shuang Hao, Mingxuan Liu, Ying Liu, Dong Wang, Qiang Li:
Lies in the Air: Characterizing Fake-base-station Spam Ecosystem in China. CCS 2020: 521-534 - [c66]Keyu Man, Zhiyun Qian, Zhongjie Wang, Xiaofeng Zheng, Youjun Huang, Haixin Duan:
DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels. CCS 2020: 1337-1350 - [c65]Mingming Zhang, Xiaofeng Zheng, Kaiwen Shen, Ziqiao Kong, Chaoyi Lu, Yu Wang, Haixin Duan, Shuang Hao, Baojun Liu, Min Yang:
Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks. CCS 2020: 1939-1952 - [c64]Weizhong Li, Kaiwen Shen, Run Guo, Baojun Liu, Jia Zhang, Haixin Duan, Shuang Hao, Xiarun Chen, Yao Wang:
CDN Backfired: Amplification Attacks Based on HTTP Range Requests. DSN 2020: 14-25 - [c63]Zihan Zhang, Mingxuan Liu, Chao Zhang, Yiming Zhang, Zhou Li, Qi Li, Haixin Duan, Donghong Sun:
Argot: Generating Adversarial Readable Chinese Texts. IJCAI 2020: 2533-2539 - [c62]Run Guo, Weizhong Li, Baojun Liu, Shuang Hao, Jia Zhang, Haixin Duan, Kaiwen Sheng, Jianjun Chen, Ying Liu:
CDN Judo: Breaking the CDN DoS Protection with Itself. NDSS 2020 - [c61]Pengxiong Zhu, Keyu Man, Zhongjie Wang, Zhiyun Qian, Roya Ensafi, J. Alex Halderman, Hai-Xin Duan:
Characterizing Transnational Internet Performance and the Great Bottleneck of China. SIGMETRICS (Abstracts) 2020: 69-70 - [c60]Yuyu He, Lei Zhang, Zhemin Yang, Yinzhi Cao, Keke Lian, Shuai Li, Wei Yang, Zhibo Zhang, Min Yang, Yuan Zhang, Haixin Duan:
TextExerciser: Feedback-driven Text Input Exercising for Android Applications. SP 2020: 1071-1087 - [c59]Xiaofeng Zheng, Chaoyi Lu, Jian Peng, Qiushi Yang, Dongjie Zhou, Baojun Liu, Keyu Man, Shuang Hao, Haixin Duan, Zhiyun Qian:
Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Devices. USENIX Security Symposium 2020: 577-593 - [i1]Kaiwen Shen, Chuhan Wang, Minglei Guo, Xiaofeng Zheng, Chaoyi Lu, Baojun Liu, Yuxuan Zhao, Shuang Hao, Haixin Duan, Qingfeng Pan, Min Yang:
Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks. CoRR abs/2011.08420 (2020)
2010 – 2019
- 2019
- [j11]Jia Zhang, Hai-Xin Duan, Jian Jiang, Jinjin Liang, Jianping Wu:
Finding the best answer: measuring the optimization of public and authoritative DNS. Sci. China Inf. Sci. 62(3): 39107:1-39107:3 (2019) - [c58]Hao Yang, Kun Du, Yubao Zhang, Shuang Hao, Zhou Li, Mingxuan Liu, Haining Wang, Hai-Xin Duan, Yazhou Shi, XiaoDong Su, Guang Liu, Zhifeng Geng, Jianping Wu:
Casino royale: a deep exploration of illegal online gambling. ACSAC 2019: 500-513 - [c57]Baojun Liu, Chaoyi Lu, Hai-Xin Duan, Ying Liu, Zhou Li, Shuang Hao, Min Yang:
Who is answering my queries: understanding and characterizing interception of the DNS resolution path. ANRW 2019: 15-16 - [c56]Baojun Liu, Zhou Li, Peiyuan Zong, Chaoyi Lu, Hai-Xin Duan, Ying Liu, Sumayah A. Alrwais, XiaoFeng Wang, Shuang Hao, Yaoqi Jia, Yiming Zhang, Kai Chen, Zaifeng Zhang:
TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis. EuroS&P 2019: 560-575 - [c55]Guanyu Li, Menghao Zhang, Chang Liu, Xiao Kong, Ang Chen, Guofei Gu, Haixin Duan:
NETHCF: Enabling Line-rate and Adaptive Spoofed IP Traffic Filtering. ICNP 2019: 1-12 - [c54]Chaoyi Lu, Baojun Liu, Zhou Li, Shuang Hao, Hai-Xin Duan, Mingming Zhang, Chunying Leng, Ying Liu, Zaifeng Zhang, Jianping Wu:
An End-to-End, Large-Scale Measurement of DNS-over-Encryption: How Far Have We Come? Internet Measurement Conference 2019: 22-35 - [c53]Kun Du, Hao Yang, Zhou Li, Hai-Xin Duan, Shuang Hao, Baojun Liu, Yuxiao Ye, Mingxuan Liu, XiaoDong Su, Guang Liu, Zhifeng Geng, Zaifeng Zhang, Jinjin Liang:
TL;DR Hazard: A Comprehensive Study of Levelsquatting Scams. SecureComm (2) 2019: 3-25 - [c52]Kun Yang, Hanqing Zhao, Chao Zhang, Jianwei Zhuge, Haixin Duan:
Fuzzing IPC with Knowledge Inference. SRDS 2019: 11-20 - 2018
- [c51]Geng Hong, Zhemin Yang, Sen Yang, Lei Zhang, Yuhong Nan, Zhibo Zhang, Min Yang, Yuan Zhang, Zhiyun Qian, Hai-Xin Duan:
How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World. CCS 2018: 1701-1713 - [c50]Fuqing Chen, Hai-Xin Duan, Xiaofeng Zheng, Jian Jiang, Jianjun Chen:
Path Leaks of HTTPS Side-Channel by Cookie Injection. COSADE 2018: 189-203 - [c49]Baojun Liu, Chaoyi Lu, Zhou Li, Ying Liu, Hai-Xin Duan, Shuang Hao, Zaifeng Zhang:
A Reexamination of Internationalized Domain Names: The Good, the Bad and the Ugly. DSN 2018: 654-665 - [c48]Jian Jiang, Jia Zhang, Hai-Xin Duan, Kang Li, Wu Liu:
Analysis and Measurement of Zone Dependency in the Domain Name System. ICC 2018: 1-7 - [c47]Kun Yang, Yuan Deng, Chao Zhang, Jianwei Zhuge, Hai-Xin Duan:
ICUFuzzer: Fuzzing ICU Library for Exploitable Bugs in Multiple Software. ISC 2018: 67-84 - [c46]Run Guo, Jianjun Chen, Baojun Liu, Jia Zhang, Chao Zhang, Hai-Xin Duan, Tao Wan, Jian Jiang, Shuang Hao, Yaoqi Jia:
Abusing CDNs for Fun and Profit: Security Issues in CDNs' Origin Validation. SRDS 2018: 1-10 - [c45]Jianjun Chen, Jian Jiang, Hai-Xin Duan, Tao Wan, Shuo Chen, Vern Paxson, Min Yang:
We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS. USENIX Security Symposium 2018: 1079-1093 - [c44]Baojun Liu, Chaoyi Lu, Hai-Xin Duan, Ying Liu, Zhou Li, Shuang Hao, Min Yang:
Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path. USENIX Security Symposium 2018: 1113-1128 - [c43]Mingming Zhang, Baojun Liu, Chaoyi Lu, Jia Zhang, Shuang Hao, Hai-Xin Duan:
Measuring Privacy Threats in China-Wide Mobile Networks. FOCI @ USENIX Security Symposium 2018 - [c42]Xiaohan Zhang, Yuan Zhang, Qianqian Mo, Hao Xia, Zhemin Yang, Min Yang, Xiaofeng Wang, Long Lu, Hai-Xin Duan:
An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications. USENIX Security Symposium 2018: 1183-1198 - 2017
- [c41]Daiping Liu, Zhou Li, Kun Du, Haining Wang, Baojun Liu, Hai-Xin Duan:
Don't Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains. CCS 2017: 537-552 - [c40]Jia Zhang, Hai-Xin Duan, Wu Liu, Xingkun Yao:
How to Notify a Vulnerability to the Right Person? Case Study: In an ISP Scope. GLOBECOM 2017: 1-7 - [c39]Hao Yang, Xiulin Ma, Kun Du, Zhou Li, Hai-Xin Duan, XiaoDong Su, Guang Liu, Zhifeng Geng, Jianping Wu:
How to Learn Klingon without a Dictionary: Detection and Measurement of Black Keywords Used by the Underground Economy. IEEE Symposium on Security and Privacy 2017: 751-769 - 2016
- [j10]Song Li, Hai-Xin Duan, Zhiliang Wang, Jinjin Liang, Xing Li:
An accurate distributed scheme for detection of prefix interception. Sci. China Inf. Sci. 59(5): 052105:1-052105:17 (2016) - [j9]Yi Guo, Hai-Xin Duan, Jikun Chen, Fu Miao:
MAF-SAM: An effective method to perceive data plane threats of inter domain routing system. Comput. Networks 110: 69-78 (2016) - [j8]Hongyu Gao, Vinod Yegneswaran, Jian Jiang, Yan Chen, Phillip A. Porras, Shalini Ghosh, Hai-Xin Duan:
Reexamining DNS From a Global Recursive Resolver Perspective. IEEE/ACM Trans. Netw. 24(1): 43-57 (2016) - [c38]Wei Liu, Yueqian Zhang, Zhou Li, Hai-Xin Duan:
What You See Isn't Always What You Get: A Measurement Study of Usage Fraud on Android Apps. SPSM@CCS 2016: 23-32 - [c37]Jianjun Chen, Jian Jiang, Hai-Xin Duan, Nicholas Weaver, Tao Wan, Vern Paxson:
Host of Troubles: Multiple Host Ambiguities in HTTP Implementations. CCS 2016: 1516-1527 - [c36]Jianjun Chen, Xiaofeng Zheng, Hai-Xin Duan, Jinjin Liang, Jian Jiang, Kang Li, Tao Wan, Vern Paxson:
Forwarding-Loop Attacks in Content Delivery Networks. NDSS 2016 - [c35]Xiaojing Liao, Kan Yuan, XiaoFeng Wang, Zhongyu Pei, Hao Yang, Jianjun Chen, Hai-Xin Duan, Kun Du, Eihal Alowaisheq, Sumayah A. Alrwais, Luyi Xing, Raheem A. Beyah:
Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search. IEEE Symposium on Security and Privacy 2016: 707-723 - [c34]Kun Du, Hao Yang, Zhou Li, Hai-Xin Duan, Kehuan Zhang:
The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO. USENIX Security Symposium 2016: 245-262 - 2015
- [c33]Song Li, Hai-Xin Duan, Zhiliang Wang, Xing Li:
Route Leaks Identification by Detecting Routing Loops. SecureComm 2015: 313-329 - [c32]Xiaofeng Zheng, Jian Jiang, Jinjin Liang, Hai-Xin Duan, Shuo Chen, Tao Wan, Nicholas Weaver:
Cookies Lack Integrity: Real-World Implications. USENIX Security Symposium 2015: 707-721 - 2014
- [c31]Kun Yang, Jianwei Zhuge, Yongke Wang, Lujue Zhou, Hai-Xin Duan:
IntentFuzzer: detecting capability leaks of android applications. AsiaCCS 2014: 531-536 - [c30]Jinjin Liang, Jian Jiang, Hai-Xin Duan, Kang Li, Tao Wan, Jianping Wu:
When HTTPS Meets CDN: A Case of Authentication in Delegated Service. IEEE Symposium on Security and Privacy 2014: 67-82 - 2013
- [c29]Jinjin Liang, Jian Jiang, Hai-Xin Duan, Kang Li, Jianping Wu:
Measuring Query Latency of Top Level DNS Servers. PAM 2013: 145-154 - [c28]Hongyu Gao, Vinod Yegneswaran, Yan Chen, Phillip A. Porras, Shalini Ghosh, Jian Jiang, Hai-Xin Duan:
An empirical reexamination of global DNS behavior. SIGCOMM 2013: 267-278 - [c27]Ming Zheng, Jianping Wu, Hai-Xin Duan:
Research on the Anti-attack Design Principles of Low-Latency Anonymous Communication. TrustCom/ISPA/IUCC 2013: 651-658 - 2012
- [c26]Jian Jiang, Jinjin Liang, Kang Li, Jun Li, Hai-Xin Duan, Jianping Wu:
Ghost Domain Names: Revoked Yet Still Resolvable. NDSS 2012 - 2011
- [j7]Jia Zhang, Hai-Xin Duan, Wu Liu, Jianping Wu:
Anonymity analysis of P2P anonymous communication systems. Comput. Commun. 34(3): 358-366 (2011) - [c25]Jian Jiang, Hai-Xin Duan, Tao Lin, Fenglin Qin, Hong Zhang:
A federated identity management system with centralized trust and unified Single Sign-On. CHINACOM 2011: 785-789 - [c24]Wu Liu, Ping Ren, Ke Liu, Hai-Xin Duan:
User cooperation trust model and its application in network security management. FSKD 2011: 2335-2339 - [c23]Ming Zheng, Hai-Xin Duan, Jianping Wu:
Anonymous Communication over Invisible Mix Rings. ICA3PP (1) 2011: 182-193 - [c22]Wu Liu, Hai-Xin Duan, Ping Ren:
Cooperation-Based Trust Model and Its Application in Network Security Management. ICA3PP (1) 2011: 453-459 - 2010
- [c21]Lei Hou, Hai-Xin Duan, Jianping Wu:
Distinguishing the Master to Defend DDoS Attack in Peer-to-Peer Networks. CIT 2010: 1002-1008 - [c20]Jia Zhang, Hai-Xin Duan, Wu Liu, Jianping Wu:
Analysis of Anonymity in P2P Anonymous Communication Systems. AINA Workshops 2010: 860-865 - [c19]Wu Liu, Hai-Xin Duan, Ping Ren, Jianping Wu:
IABA: An improved PNN Algorithm for anomaly detection in network security management. ICNC 2010: 335-339
2000 – 2009
- 2009
- [j6]Jia Zhang, Hai-Xin Duan, Wu Liu, Jianping Wu:
WindTalker: A P2P-Based Low-Latency Anonymous Communication Network. IEICE Trans. Commun. 92-B(10): 3183-3194 (2009) - [c18]Lei Hou, Hai-Xin Duan, Jianping Wu:
Selecting Trust Peers Based on Updated Credit Value in Peer-to-Peer Networks. Security and Management 2009: 628-634 - 2008
- [j5]Hong Zhang, Hai-Xin Duan, Wu Liu:
RRM: An incentive reputation model for promoting good behaviors in distributed systems. Sci. China Ser. F Inf. Sci. 51(11): 1871-1882 (2008) - [j4]Lanjia Wang, Hai-Xin Duan, Xing Li:
Dynamic emulation based modeling and detection of polymorphic shellcode at the network level. Sci. China Ser. F Inf. Sci. 51(11): 1883-1897 (2008) - [c17]Lei Hou, Hai-Xin Duan, Jianping Wu:
Scheduling Peers Based on Credit Construction Period in Peer-to-Peer Networks. ICPADS 2008: 470-477 - [c16]Wu Liu, Hai-Xin Duan, Tao Lin, Xing Li, Jian-Ping Wu:
Attacking Test and Online Forensics in IPv6 Networks. IMF 2008: 87-106 - [c15]Yuan Liang, Hai-Xin Duan:
An Admission Control Policy Based on Social Networks for P2P Systems. WAIM 2008: 487-492 - [c14]Jia Zhang, Yuntao Guan, Xiaoxin Jiang, Hai-Xin Duan, Jianping Wu:
AMCAS: An Automatic Malicious Code Analysis System. WAIM 2008: 501-507 - 2005
- [j3]Feng Yang, Hai-Xin Duan, Xing Li:
Modeling and analyzing of the interaction between worms and antiworms during network worm propagation. Sci. China Ser. F Inf. Sci. 48(1): 91-106 (2005) - [j2]Quang-Anh Tran, Xing Li, Hai-Xin Duan:
Efficient performance estimate for one-class support vector machine. Pattern Recognit. Lett. 26(8): 1174-1182 (2005) - [c13]Hong Zhang, Hai-Xin Duan, Wu Liu, Jianping Wu:
An Extensible AAA Infrastructure for IPv6. CIS (2) 2005: 482-487 - [c12]Wu Liu, Hai-Xin Duan, Jianping Wu, Xing Li:
PDTM: A Policy-Driven Trust Management Framework in Distributed Systems. CIS (2) 2005: 518-525 - [c11]Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li:
New Algorithm Mining Intrusion Patterns. FSKD (2) 2005: 774-777 - [c10]Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li:
New Method for Intrusion Features Mining in IDS. ICIC (1) 2005: 429-437 - [c9]Lanjia Wang, Hai-Xin Duan, Xing Li:
Port Scan Behavior Diagnosis by Clustering. ICICS 2005: 243-255 - [c8]Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li:
The Authorization Service in Dynamic Trust Domains. ICITA (2) 2005: 564-567 - [c7]Wu Liu, Hai-Xin Duan, Jianping Wu, Xing Li:
Improved Marking Model ERPPM Tracing Back to DDoS Attacker. ICITA (2) 2005: 759-762 - [c6]Hanghang Tong, Chongrong Li, Jingrui He, Jiajian Chen, Quang-Anh Tran, Hai-Xin Duan, Xing Li:
Anomaly Internet Network Traffic Detection by Kernel Principle Component Classifier. ISNN (3) 2005: 476-481 - 2004
- [j1]Jiahai Yang, Hai-Xin Duan, Jianping Wu, Xing Li:
Workflow Oriented Network Management - A Web/Java Approach. J. Netw. Syst. Manag. 12(4): 431-439 (2004) - [c5]Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li, Ping Ren:
XML Based X.509 Authorization in CERNET Grid. GCC 2004: 325-332 - [c4]Wu Liu, Hai-Xin Duan, Jianping Wu, Xing Li, Ping Ren:
Algorithms for Congestion Detection and Control. GCC Workshops 2004: 374-381 - [c3]Wu Liu, Hai-Xin Duan, Yong Feng, Yong-Bin Li, Ping Ren:
Improved algorithms tracing back to attacking sources. Parallel and Distributed Computing and Networks 2004: 222-226 - 2003
- [c2]Wu Liu, Hai-Xin Duan, Jianping Wu, Ping Ren, Li-Hua Lu:
Distributed IDS Tracing Back to Attacking Sources. GCC (1) 2003: 859-866 - 2000
- [c1]Hai-Xin Duan, Jianping Wu, Xing Li:
Policy based access control framework for large networks. ICON 2000: 267-272
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 00:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint