Guofei Gu
Orcid: 0000-0003-0630-741XAffiliations:
- Texas A&M University, SUCCESS Lab, College Station, TX, USA
- Georgia Institute of Technology, College of Computing, Atlanta, GA, USA (PhD 2008)
- Fudan University, Shanghai, China
According to our database1,
Guofei Gu
authored at least 146 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Enhancing security in SDN: Systematizing attacks and defenses from a penetration perspective.
Comput. Networks, 2024
Towards Understanding Crypto-Asset Risks on Ethereum Caused by Key Leakage on the Internet.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024
You Can Obfuscate, but You Cannot Hide: CrossPoint Attacks against Network Topology Obfuscation.
Proceedings of the 33rd USENIX Security Symposium, 2024
Cerberus: Enabling Efficient and Effective In-Network Monitoring on Programmable Switches.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Mew: Enabling Large-Scale and Dynamic Link-Flooding Defenses on Programmable Switches.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
IEEE/ACM Trans. Netw., 2022
BiasHacker: Voice Command Disruption by Exploiting Speaker Biases in Automatic Speech Recognition.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
IEEE/ACM Trans. Netw., 2021
Enabling Performant, Flexible and Cost-Efficient DDoS Defense With Programmable Switches.
IEEE/ACM Trans. Netw., 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
Proceedings of the CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, 2021
2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
MinerGate: A Novel Generic and Accurate Defense Solution Against Web Based Cryptocurrency Mining Attacks.
Proceedings of the Cyber Security - 17th China Annual Conference, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Your Cybersecurity Is Now Programmable: Experiments on Networking and Blockchain Systems.
Proceedings of the 8th International Workshop on Security in Blockchain and Cloud Computing, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Guest Editors' Introduction: Special Section on Security in Emerging Networking Technologies.
IEEE Trans. Dependable Secur. Comput., 2019
Editorial: special issue on "The security, privacy, and digital forensics of mobile networks and mobile cloud".
Digit. Commun. Networks, 2019
Iframes/Popups Are Dangerous in Mobile WebView: Studying and Mitigating Differential Context Vulnerabilities.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Life after Speech Recognition: Fuzzing Semantic Misinterpretation for Voice Assistant Applications.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019
CollusiveHijack: A New Route Hijacking Attack and Countermeasures in Opportunistic Networks.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Trans. Dependable Secur. Comput., 2018
Comput. Networks, 2018
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018
Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage Enabled Mobile Applications.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Mobile Application Web API Reconnaissance: Web-to-Mobile Inconsistencies & Vulnerabilities.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
vNIDS: Towards Elastic Security with Safe and Efficient Virtualization of Network Intrusion Detection Systems.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
IEEE/ACM Trans. Netw., 2017
IEEE Trans. Inf. Forensics Secur., 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Understanding the Market-Level and Network-Level Behaviors of the Android Malware Ecosystem.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017
Proceedings of the 8th Asia-Pacific Workshop on Systems, Mumbai, India, September 2, 2017, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
PRIDE: A practical intrusion detection system for resource constrained wireless mesh networks.
Comput. Secur., 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Hunting for invisibility: Characterizing and detecting malicious web infrastructures through server visibility analysis.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Micro, 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the Security and Privacy in Communication Networks, 2015
Proceedings of the Security and Privacy in Communication Networks, 2015
Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015
2014
IEEE Trans. Inf. Forensics Secur., 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-On Cross Site Scripting Attacks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications.
Proceedings of the Computer Security - ESORICS 2014, 2014
SRID: State Relation Based Intrusion Detection for False Data Injection Attacks in SCADA.
Proceedings of the Computer Security - ESORICS 2014, 2014
AUTOPROBE: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
EFFORT: A new host-network cooperated framework for efficient and effective bot malware detection.
Comput. Networks, 2013
Editorial for Computer Networks special issue on ''Botnet Activity: Analysis, Detection and Shutdown''.
Comput. Networks, 2013
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the Information and Communications Security - 15th International Conference, 2013
AUTOVAC: Automatically Extracting System Resource Constraints and Generating Vaccines for Malware Immunization.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of the Fifth International Conference on Communication Systems and Networks, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
AppIntent: analyzing sensitive data transmission in android for privacy leakage detection.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
J. Comput. Virol., 2012
IEEE Trans. Inf. Forensics Secur., 2012
Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter.
Proceedings of the 21st World Wide Web Conference 2012, 2012
Proceedings of the first workshop on Hot topics in software defined networks, 2012
PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?).
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012
SmartDroid: an automatic system for revealing UI-based trigger conditions in android applications.
Proceedings of the SPSM'12, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Machine learning meets social networking security: detecting and analyzing malicious social networks for fun and profit.
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
ACM Trans. Inf. Syst. Secur., 2011
Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
IACR Cryptol. ePrint Arch., 2010
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
Proceedings of the Botnet Detection: Countering the Largest Security Threat, 2008
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection.
Proceedings of the 17th USENIX Security Symposium, 2008
Proceedings of the Network and Distributed System Security Symposium, 2008
Principled reasoning and practical applications of alert fusion in intrusion detection systems.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
2007
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2006
Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems.
Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006
Proceedings of the 12th International Symposium on High-Performance Computer Architecture, 2006
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems.
Proceedings of the Computer Security, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
An Intrusion-Tolerant and Self-Recoverable Network Service System Using A Security Enhanced Chip Multiprocessor.
Proceedings of the Second International Conference on Autonomic Computing (ICAC 2005), 2005
2004
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004
2003
Proceedings of the Applied Cryptography and Network Security, 2003