Guofei Gu

Orcid: 0000-0003-0630-741X

Affiliations:
  • Texas A&M University, SUCCESS Lab, College Station, TX, USA
  • Georgia Institute of Technology, College of Computing, Atlanta, GA, USA (PhD 2008)
  • Fudan University, Shanghai, China


According to our database1, Guofei Gu authored at least 142 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Towards Understanding Crypto-Asset Risks on Ethereum Caused by Key Leakage on the Internet.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024

2023
SysFlow: Toward a Programmable Zero Trust Framework for System Security.
IEEE Trans. Inf. Forensics Secur., 2023

NetHCF: Filtering Spoofed IP Traffic With Programmable Switches.
IEEE Trans. Dependable Secur. Comput., 2023

On Detecting Route Hijacking Attack in Opportunistic Mobile Networks.
IEEE Trans. Dependable Secur. Comput., 2023

Mew: Enabling Large-Scale and Dynamic Link-Flooding Defenses on Programmable Switches.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Automatic Synthesis of Network Security Services: A First Step.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

Do Users Really Know Alexa? Understanding Alexa Skill Security Indicators.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

#DM-Me: Susceptibility to Direct Messaging-Based Scams.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Disrupting the SDN Control Channel via Shared Links: Attacks and Countermeasures.
IEEE/ACM Trans. Netw., 2022

BiasHacker: Voice Command Disruption by Exploiting Speaker Biases in Automatic Speech Recognition.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols.
Proceedings of the 31st USENIX Security Symposium, 2022

SWAPP: A New Programmable Playground for Web Application Security.
Proceedings of the 31st USENIX Security Symposium, 2022

SAID: State-aware Defense Against Injection Attacks on In-vehicle Network.
Proceedings of the 31st USENIX Security Symposium, 2022

Understanding and Detecting Remote Infection on Linux-based IoT Devices.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Control Plane Reflection Attacks and Defenses in Software-Defined Networks.
IEEE/ACM Trans. Netw., 2021

Enabling Performant, Flexible and Cost-Efficient DDoS Defense With Programmable Switches.
IEEE/ACM Trans. Netw., 2021

ExAD: An Ensemble Approach for Explanation-based Adversarial Detection.
CoRR, 2021

Abusing Hidden Properties to Attack the Node.js Ecosystem.
Proceedings of the 30th USENIX Security Symposium, 2021

Happer: Unpacking Android Apps via a Hardware-Assisted Approach.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Practical Speech Re-use Prevention in Voice-driven Services.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

The Service Worker Hiding in Your Browser: The Next Web Attack Target?
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

Programmable Security in the Age of Software-Defined Infrastructure.
Proceedings of the CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, 2021

2020
On the Privacy and Integrity Risks of Contact-Tracing Applications.
CoRR, 2020

Unexpected Data Dependency Creation and Chaining: A New Attack to SDN.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Poseidon: Mitigating Volumetric DDoS Attacks with Programmable Switches.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

SODA: A Generic Online Detection Framework for Smart Contracts.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

MinerGate: A Novel Generic and Accurate Defense Solution Against Web Based Cryptocurrency Mining Attacks.
Proceedings of the Cyber Security - 17th China Annual Conference, 2020

PPMLP 2020: Workshop on Privacy-Preserving Machine Learning In Practice.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Your Cybersecurity Is Now Programmable: Experiments on Networking and Blockchain Systems.
Proceedings of the 8th International Workshop on Security in Blockchain and Cloud Computing, 2020

Security Study of Service Worker Cross-Site Scripting.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Guest Editors' Introduction: Special Section on Security in Emerging Networking Technologies.
IEEE Trans. Dependable Secur. Comput., 2019

Editorial: special issue on "The security, privacy, and digital forensics of mobile networks and mobile cloud".
Digit. Commun. Networks, 2019

Iframes/Popups Are Dangerous in Mobile WebView: Studying and Mitigating Differential Context Vulnerabilities.
Proceedings of the 28th USENIX Security Symposium, 2019

The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links.
Proceedings of the 28th USENIX Security Symposium, 2019

Life after Speech Recognition: Fuzzing Semantic Misinterpretation for Voice Assistant Applications.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

NETHCF: Enabling Line-rate and Adaptive Spoofed IP Traffic Filtering.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

CollusiveHijack: A New Route Hijacking Attack and Countermeasures in Opportunistic Networks.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis.
IEEE Trans. Inf. Forensics Secur., 2018

LinkScope: Toward Detecting Target Link Flooding Attacks.
IEEE Trans. Inf. Forensics Secur., 2018

Shadow Attacks Based on Password Reuses: A Quantitative Empirical Analysis.
IEEE Trans. Dependable Secur. Comput., 2018

Security and performance of software-defined networks and functions virtualization.
Comput. Networks, 2018

Uncovering HTTP Header Inconsistencies and the Impact on Desktop/Mobile Websites.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage Enabled Mobile Applications.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Mobile Application Web API Reconnaissance: Web-to-Mobile Inconsistencies & Vulnerabilities.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Control Plane Reflection Attacks in SDNs: New Attacks and Countermeasures.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Error-Sensor: Mining Information from HTTP Error Traffic for Malware Intelligence.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Automated Generation of Event-Oriented Exploits in Android Hybrid Apps.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

CloudRand: Building Heterogeneous and Moving-Target Network Interfaces.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Effective Topology Tampering Attacks and Defenses in Software-Defined Networks.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

Towards Fine-grained Network Security Forensics and Diagnosis in the SDN Era.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

vNIDS: Towards Elastic Security with Safe and Efficient Virtualization of Network Intrusion Detection Systems.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Flow Wars: Systemizing the Attack Surface and Defenses in Software-Defined Networks.
IEEE/ACM Trans. Netw., 2017

Identifying User-Input Privacy in Mobile Applications at a Large Scale.
IEEE Trans. Inf. Forensics Secur., 2017

Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART.
Proceedings of the 26th USENIX Security Symposium, 2017

Attacking the Brain: Races in the SDN Control Plane.
Proceedings of the 26th USENIX Security Symposium, 2017

Precisely and Scalably Vetting JavaScript Bridge in Android Hybrid Apps.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Bring your own controller: Enabling tenant-defined SDN apps in IaaS clouds.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Understanding the Market-Level and Network-Level Behaviors of the Android Malware Ecosystem.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

EvilDirect: A New Wi-Fi Direct Hijacking Attack and Countermeasures.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Building a Security OS With Software Defined Infrastructure.
Proceedings of the 8th Asia-Pacific Workshop on Systems, Mumbai, India, September 2, 2017, 2017

2016
Rethinking Permission Enforcement Mechanism on Mobile Systems.
IEEE Trans. Inf. Forensics Secur., 2016

PRIDE: A practical intrusion detection system for resource constrained wireless mesh networks.
Comput. Secur., 2016

Towards SDN-Defined Programmable BYOD (Bring Your Own Device) Security.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Hunting for invisibility: Characterizing and detecting malicious web infrastructures through server visibility analysis.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Enhancing Network Security through Software Defined Networking (SDN).
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

2015
Malware Propagation in Large-Scale Networks.
IEEE Trans. Knowl. Data Eng., 2015

A First Step Toward Network Security Virtualization: From Concept To Prototype.
IEEE Trans. Inf. Forensics Secur., 2015

VulHunter: Toward Discovering Vulnerabilities in Android Applications.
IEEE Micro, 2015

UIPicker: User-Input Privacy Identification in Mobile Applications.
Proceedings of the 24th USENIX Security Symposium, 2015

FineDroid: Enforcing Permissions with System-Wide Application Execution Context.
Proceedings of the Security and Privacy in Communication Networks, 2015

Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps.
Proceedings of the Security and Privacy in Communication Networks, 2015

Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

What is wrecking your data plan? A measurement study of mobile web overhead.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Systematic Mining of Associated Server Herds for Malware Campaign Discovery.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

FloodGuard: A DoS Attack Prevention Extension in Software-Defined Networks.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

2014
Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps.
IEEE Trans. Inf. Forensics Secur., 2014

Characterizing Google Hacking: A First Large-Scale Quantitative Study.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-On Cross Site Scripting Attacks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

GoldenEye: Efficiently and Effectively Unveiling Malware's Targeted Environment.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

CyberProbe: Towards Internet-Scale Active Detection of Malicious Servers.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications.
Proceedings of the Computer Security - ESORICS 2014, 2014

SRID: State Relation Based Intrusion Detection for False Data Injection Attacks in SCADA.
Proceedings of the Computer Security - ESORICS 2014, 2014

AUTOPROBE: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

A taste of tweets: reverse engineering Twitter spammers.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers.
IEEE Trans. Inf. Forensics Secur., 2013

EFFORT: A new host-network cooperated framework for efficient and effective bot malware detection.
Comput. Networks, 2013

Editorial for Computer Networks special issue on ''Botnet Activity: Analysis, Detection and Shutdown''.
Comput. Networks, 2013

Attacking software-defined networks: a first feasibility study.
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, 2013

NEIGHBORWATCHER: A Content-Agnostic Comment Spam Inference System.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

FRESCO: Modular Composable Security Services for Software-Defined Networks.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

PRIDE: Practical Intrusion Detection in Resource Constrained Wireless Mesh Networks.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

AUTOVAC: Automatically Extracting System Resource Constraints and Generating Vaccines for Malware Immunization.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

Model checking invariant security properties in OpenFlow.
Proceedings of IEEE International Conference on Communications, 2013

CATS: Characterizing automation of Twitter spammers.
Proceedings of the Fifth International Conference on Communication Systems and Networks, 2013

NOMAD: Towards non-intrusive moving-target defense against web bots.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Vetting undesirable behaviors in android apps with permission use analysis.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

AppIntent: analyzing sensitive data transmission in android for privacy leakage detection.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Shadow attacks: automatically evading system-call-behavior based malware detection.
J. Comput. Virol., 2012

Active User-Side Evil Twin Access Point Detection Using Statistical Techniques.
IEEE Trans. Inf. Forensics Secur., 2012

A Large-Scale Empirical Study of Conficker.
IEEE Trans. Inf. Forensics Secur., 2012

Bin-Carver: Automatic recovery of binary executable files.
Digit. Investig., 2012

Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter.
Proceedings of the 21st World Wide Web Conference 2012, 2012

A security enforcement kernel for OpenFlow networks.
Proceedings of the first workshop on Hot topics in software defined networks, 2012

PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

EFFORT: Efficient and effective bot malware detection.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?).
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

SmartDroid: an automatic system for revealing UI-based trigger conditions in android applications.
Proceedings of the SPSM'12, 2012

Detecting money-stealing apps in alternative Android markets.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Automatic generation of vaccines for malware immunization.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

PeerPress: utilizing enemies' P2P strength against them.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Machine learning meets social networking security: detecting and analyzing malicious social networks for fun and profit.
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, 2012

2011
Botnet Detection in Enterprise Networks.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic Execution.
ACM Trans. Inf. Syst. Secur., 2011

Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

Cross-Analysis of Botnet Victims: New Insights and Implications.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

Boosting the scalability of botnet detection using adaptive traffic sampling.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

WebPatrol: automated collection and replay of web-based malware scenarios.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

SEMAGE: a new image-based two-factor CAPTCHA.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Privacy-Preserving Matching Protocols for Attributes and Strings.
IACR Cryptol. ePrint Arch., 2010

TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Who is peeping at your passwords at Starbucks? - To catch an evil twin access point.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

Conficker and beyond: a large-scale empirical study.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Active Botnet Probing to Identify Obscure Command and Control Channels.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
A Taxonomy of Botnet Structures.
Proceedings of the Botnet Detection: Countering the Largest Security Threat, 2008

Correlation-based Botnet Detection in Enterprise Networks.
PhD thesis, 2008

BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection.
Proceedings of the 17th USENIX Security Symposium, 2008

BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic.
Proceedings of the Network and Distributed System Security Symposium, 2008

Principled reasoning and practical applications of alert fusion in intrusion detection systems.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

Misleading and defeating importance-scanning malware propagation.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

A Taxonomy of Botnet Structures.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems.
Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006

InfoShield: a security architecture for protecting information usage in memory.
Proceedings of the 12th International Symposium on High-Performance Computer Architecture, 2006

Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems.
Proceedings of the Computer Security, 2006

Measuring intrusion detection capability: an information-theoretic approach.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

DSO: Dependable Signing Overlay.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
An Intrusion-Tolerant and Self-Recoverable Network Service System Using A Security Enhanced Chip Multiprocessor.
Proceedings of the Second International Conference on Autonomic Computing (ICAC 2005), 2005

2004
HoneyStat: Local Worm Detection Using Honeypots.
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004

Worm Detection, Early Warning and Response Based on Local Victim Information.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2003
PLI: A New Framework to Protect Digital Content for P2P Networks.
Proceedings of the Applied Cryptography and Network Security, 2003


  Loading...