Composition kills: A case study of email sender authentication J Chen, V Paxson, J Jiang 29th USENIX Security Symposium (USENIX Security 20), 2183-2199, 2020 | 59 | 2020 |
Seeking nonsense, looking for trouble: Efficient promotional-infection detection through semantic inconsistency search X Liao, K Yuan, XF Wang, Z Pei, H Yang, J Chen, H Duan, K Du, ... 2016 IEEE Symposium on Security and Privacy (SP), 707-723, 2016 | 51 | 2016 |
Host of troubles: Multiple host ambiguities in http implementations J Chen, J Jiang, H Duan, N Weaver, T Wan, V Paxson Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 46 | 2016 |
Forwarding-Loop Attacks in Content Delivery Networks. J Chen, X Zheng, HX Duan, J Liang, J Jiang, K Li, T Wan, V Paxson Network and Distributed System Security (NDSS) Symposium 2016, 2016 | 43 | 2016 |
We Still Don’t Have Secure Cross-Domain Requests: an Empirical Study of CORS J Chen, J Jiang, H Duan, T Wan, S Chen, V Paxson, M Yang USENIX Security Symposium 2018, 2018 | 39 | 2018 |
Abusing CDNs for fun and profit: Security issues in CDNs' origin validation R Guo, J Chen, B Liu, J Zhang, C Zhang, H Duan, T Wan, J Jiang, S Hao, ... 2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS), 1-10, 2018 | 35 | 2018 |
A Large-scale and Longitudinal Measurement Study of DKIM Deployment C Wang, K Shen, M Guo, Y Zhao, M Zhang, J Chen, B Liu, X Zheng, ... USENIX Security 2022, 2022 | 34 | 2022 |
CDN Judo: Breaking the CDN DoS Protection with Itself. R Guo, W Li, B Liu, S Hao, J Zhang, H Duan, K Sheng, J Chen, Y Liu Network and Distributed System Security (NDSS) Symposium 2020, 2020 | 28 | 2020 |
Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning W Zhu, Z Feng, Z Zhang, J Chen, Z Ou, M Yang, C Zhang IEEE S&P 2023, 2023 | 20 | 2023 |
Hdiff: A semi-automatic framework for discovering semantic gap attack in http implementations K Shen, J Lu, Y Yang, J Chen, M Zhang, H Duan, J Zhang, X Zheng 2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems …, 2022 | 15 | 2022 |
Tudoor attack: Systematically exploring and exploiting logic vulnerabilities in dns response pre-processing with malformed packets X Li, W Xu, B Liu, M Zhang, Z Li, J Zhang, D Chang, X Zheng, C Wang, ... 2024 IEEE Symposium on Security and Privacy (SP), 4459-4477, 2024 | 12 | 2024 |
TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers W Xu, X Li, C Lu, B Liu, H Duan, J Zhang, J Chen, T Wan Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 12 | 2023 |
Detecting and measuring security risks of hosting-based dangling domains M Zhang, X Li, B Liu, J Lu, Y Zhang, J Chen, H Duan, S Hao, X Zheng Proceedings of the ACM on Measurement and Analysis of Computing Systems 7 (1 …, 2023 | 11 | 2023 |
Temporal CDN-Convex Lens: A CDN-Assisted Practical Pulsing DDoS Attack R Guo, J Chen, Y Wang, K Mu, B Liu, X Li, C Zhang, H Duan, J Wu 32nd USENIX Security Symposium (USENIX Security 23), 6185-6202, 2023 | 11 | 2023 |
1dfuzz: Reproduce 1-day vulnerabilities with directed differential fuzzing S Yang, Y He, K Chen, Z Ma, X Luo, Y Xie, J Chen, C Zhang Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023 | 8 | 2023 |
Faster and Better: Detecting Vulnerabilities in Linux-based IoT Firmware with Optimized Reaching Definition Analysis Z Gao, C Zhang, H Liu, W Sun, Z Tang, L Jiang, J Chen, Y Xie Network and Distributed System Security (NDSS) Symposium 2024, 2024 | 7 | 2024 |
Path leaks of HTTPS Side-Channel by cookie injection F Chen, H Duan, X Zheng, J Jiang, J Chen Constructive Side-Channel Analysis and Secure Design: 9th International …, 2018 | 7 | 2018 |
BREAKSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet C Wang, Y Kuranaga, Y Wang, M Zhang, L Zheng, X Li, J Chen, H Duan, ... Network and Distributed System Security (NDSS) Symposium 2024, 2024 | 6 | 2024 |
A Security Study about Electron Applications and a Programming Methodology to Tame DOM Functionalities Z Jin, S Chen, Y Chen, H Duan, J Chen, J Wu Network and Distributed System Security (NDSS) Symposium 2023, 2023 | 6 | 2023 |
Where URLs Become Weapons: Automated Discovery of SSRF Vulnerabilities in Web Applications E Wang, J Chen, W Xie, C Wang, Y Gao, Z Wang, H Duan, Y Liu, B Wang 2024 IEEE Symposium on Security and Privacy (SP), 239-257, 2024 | 5 | 2024 |