Segui
Daiping Liu
Daiping Liu
Palo Alto Networks
Email verificata su udel.edu - Home page
Titolo
Citata da
Citata da
Anno
All your dns records point to us: Understanding the security threats of dangling dns records
D Liu, S Hao, H Wang
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1142016
E-commerce reputation manipulation: The emergence of reputation-escalation-as-a-service
H Xu, D Liu, H Wang, A Stavrou
Proceedings of the 24th International Conference on World Wide Web, 1296-1306, 2015
922015
Detecting malicious javascript in pdf through document instrumentation
D Liu, H Wang, A Stavrou
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
832014
Don’t Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains
D Liu, Z Li, K Du, H Wang, B Liu, H Duan
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
702017
A robust and efficient defense against use-after-free exploits via concurrent pointer sweeping
D Liu, M Zhang, H Wang
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
552018
Click fraud detection on the advertiser side
H Xu, D Liu, A Koehl, H Wang, A Stavrou
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
532014
E-android: A new energy profiling tool for smartphones
X Gao, D Liu, D Liu, H Wang, A Stavrou
2017 IEEE 37th international conference on distributed computing systems …, 2017
332017
A comprehensive measurement-based investigation of DNS hijacking
R Houser, S Hao, Z Li, D Liu, C Cotton, H Wang
2021 40th International Symposium on Reliable Distributed Systems (SRDS …, 2021
272021
Detecting passive cheats in online games via performance-skillfulness inconsistency
D Liu, X Gao, M Zhang, H Wang, A Stavrou
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
242017
Network traffic analysis using refined bayesian reasoning to detect flooding and port scan attacks
D Liu, M Zhang, T Li
2008 International Conference on Advanced Computer Theory and Engineering …, 2008
122008
An empirical investigation of ecommerce-reputation-escalation-as-a-service
H Xu, D Liu, H Wang, A Stavrou
ACM Transactions on the Web (TWEB) 11 (2), 1-35, 2017
112017
executable-only-memory-switch (xom-switch): Hiding your code from advanced code reuse attacks in one shot
M Zhang, R Sahita, D Liu
Black Hat Asia, 2018
102018
Ready raider one: Exploring the misuse of cloud gaming services
G Liu, D Liu, S Hao, X Gao, K Sun, H Wang
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
52022
Dial" N" for NXDomain: The Scale, Origin, and Security Implications of DNS Queries to Non-Existent Domains
G Liu, L Jin, S Hao, Y Zhang, D Liu, A Stavrou, H Wang
Proceedings of the 2023 ACM on Internet Measurement Conference, 198-212, 2023
42023
All Use-After-Free Vulnerabilities Are Not Created Equal: An Empirical Study on Their Characteristics and Detectability
Z Chen, D Liu, J Xiao, H Wang
Proceedings of the 26th International Symposium on Research in Attacks …, 2023
42023
In-line detection of algorithmically generated domains
D Liu, M Walter, B Hua, S Li, F Fei, S Chung, J Wang, W Xu
US Patent 11,729,134, 2023
42023
Real-time detection of dns tunneling traffic
D Liu, J Wang, M Walter, F Fei, W Xu
US Patent App. 16/799,655, 2021
32021
Domain squatting detection
Z Chen, J Wang, D Liu
US Patent 11,973,800, 2024
12024
Automated extraction and classification of malicious indicators
J Szurdi, D Liu, J Wang
US Patent 11,882,130, 2024
12024
Inline package name based supply chain attack detection and prevention
R Duan, D Liu, J Wang, Z Xiao
US Patent 11,863,586, 2024
12024
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20