Obserwuj
Jianjun Chen
Tytuł
Cytowane przez
Cytowane przez
Rok
Composition kills: A case study of email sender authentication
J Chen, V Paxson, J Jiang
29th USENIX Security Symposium (USENIX Security 20), 2183-2199, 2020
592020
Seeking nonsense, looking for trouble: Efficient promotional-infection detection through semantic inconsistency search
X Liao, K Yuan, XF Wang, Z Pei, H Yang, J Chen, H Duan, K Du, ...
2016 IEEE Symposium on Security and Privacy (SP), 707-723, 2016
512016
Host of troubles: Multiple host ambiguities in http implementations
J Chen, J Jiang, H Duan, N Weaver, T Wan, V Paxson
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
462016
Forwarding-Loop Attacks in Content Delivery Networks.
J Chen, X Zheng, HX Duan, J Liang, J Jiang, K Li, T Wan, V Paxson
Network and Distributed System Security (NDSS) Symposium 2016, 2016
432016
We Still Don’t Have Secure Cross-Domain Requests: an Empirical Study of CORS
J Chen, J Jiang, H Duan, T Wan, S Chen, V Paxson, M Yang
USENIX Security Symposium 2018, 2018
392018
Abusing CDNs for fun and profit: Security issues in CDNs' origin validation
R Guo, J Chen, B Liu, J Zhang, C Zhang, H Duan, T Wan, J Jiang, S Hao, ...
2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS), 1-10, 2018
352018
A Large-scale and Longitudinal Measurement Study of DKIM Deployment
C Wang, K Shen, M Guo, Y Zhao, M Zhang, J Chen, B Liu, X Zheng, ...
USENIX Security 2022, 2022
342022
CDN Judo: Breaking the CDN DoS Protection with Itself.
R Guo, W Li, B Liu, S Hao, J Zhang, H Duan, K Sheng, J Chen, Y Liu
Network and Distributed System Security (NDSS) Symposium 2020, 2020
282020
Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning
W Zhu, Z Feng, Z Zhang, J Chen, Z Ou, M Yang, C Zhang
IEEE S&P 2023, 2023
202023
Hdiff: A semi-automatic framework for discovering semantic gap attack in http implementations
K Shen, J Lu, Y Yang, J Chen, M Zhang, H Duan, J Zhang, X Zheng
2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems …, 2022
152022
Tudoor attack: Systematically exploring and exploiting logic vulnerabilities in dns response pre-processing with malformed packets
X Li, W Xu, B Liu, M Zhang, Z Li, J Zhang, D Chang, X Zheng, C Wang, ...
2024 IEEE Symposium on Security and Privacy (SP), 4459-4477, 2024
122024
TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers
W Xu, X Li, C Lu, B Liu, H Duan, J Zhang, J Chen, T Wan
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
122023
Detecting and measuring security risks of hosting-based dangling domains
M Zhang, X Li, B Liu, J Lu, Y Zhang, J Chen, H Duan, S Hao, X Zheng
Proceedings of the ACM on Measurement and Analysis of Computing Systems 7 (1 …, 2023
112023
Temporal CDN-Convex Lens: A CDN-Assisted Practical Pulsing DDoS Attack
R Guo, J Chen, Y Wang, K Mu, B Liu, X Li, C Zhang, H Duan, J Wu
32nd USENIX Security Symposium (USENIX Security 23), 6185-6202, 2023
112023
1dfuzz: Reproduce 1-day vulnerabilities with directed differential fuzzing
S Yang, Y He, K Chen, Z Ma, X Luo, Y Xie, J Chen, C Zhang
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
82023
Faster and Better: Detecting Vulnerabilities in Linux-based IoT Firmware with Optimized Reaching Definition Analysis
Z Gao, C Zhang, H Liu, W Sun, Z Tang, L Jiang, J Chen, Y Xie
Network and Distributed System Security (NDSS) Symposium 2024, 2024
72024
Path leaks of HTTPS Side-Channel by cookie injection
F Chen, H Duan, X Zheng, J Jiang, J Chen
Constructive Side-Channel Analysis and Secure Design: 9th International …, 2018
72018
BREAKSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet
C Wang, Y Kuranaga, Y Wang, M Zhang, L Zheng, X Li, J Chen, H Duan, ...
Network and Distributed System Security (NDSS) Symposium 2024, 2024
62024
A Security Study about Electron Applications and a Programming Methodology to Tame DOM Functionalities
Z Jin, S Chen, Y Chen, H Duan, J Chen, J Wu
Network and Distributed System Security (NDSS) Symposium 2023, 2023
62023
Where URLs Become Weapons: Automated Discovery of SSRF Vulnerabilities in Web Applications
E Wang, J Chen, W Xie, C Wang, Y Gao, Z Wang, H Duan, Y Liu, B Wang
2024 IEEE Symposium on Security and Privacy (SP), 239-257, 2024
52024
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20