Hai-Xin Duan
Orcid: 0000-0003-0083-733X
According to our database1,
Hai-Xin Duan
authored at least 142 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
PowerPeeler: A Precise and General Dynamic Deobfuscation Method for PowerShell Scripts.
CoRR, 2024
An Empirical Study of Open Edge Computing Platforms: Ecosystem, Usage, and Security Risks.
CoRR, 2024
From Promises to Practice: Evaluating the Private Browsing Modes of Android Browser Apps.
Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the ACM on Web Conference 2024, 2024
Uncovering Security Vulnerabilities in Real-world Implementation and Deployment of 5G Messaging Services.
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Where URLs Become Weapons: Automated Discovery of SSRF Vulnerabilities in Web Applications.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Break the Wall from Bottom: Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewalls.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
DNSBomb: A New Practical-and-Powerful Pulsing DoS Attack Exploiting DNS Queries-and-Responses.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
More Haste, Less Speed: Cache Related Security Threats in Continuous Integration Services.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 27th International Symposium on Research in Attacks, 2024
ReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies and DoS Attacks with Grammar-based Fuzzing.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
BreakSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Understanding the Implementation and Security Implications of Protective DNS Services.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024
Bounce in the Wild: A Deep Dive into Email Delivery Failures from a Large Email Service Provider.
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
2023
Can We Trust the Phone Vendors? Comprehensive Security Measurements on the Android Firmware Ecosystem.
IEEE Trans. Software Eng., July, 2023
Proc. ACM Meas. Anal. Comput. Syst., March, 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Continuous Intrusion: Characterizing the Security of Continuous Integration Services.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
A Security Study about Electron Applications and a Programming Methodology to Tame DOM Functionalities.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Wolf in Sheep's Clothing: Evaluating Security Risks of the Undelegated Record on DNS Hosting Services.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 25th International Symposium on Research in Attacks, 2022
Measuring the Practical Effect of DNS Root Server Instances: A China-Wide Case Study.
Proceedings of the Passive and Active Measurement - 23rd International Conference, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
ValCAT: Variable-Length Contextualized Adversarial Transformations Using Encoder-Decoder Language Model.
Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2022
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Proceedings of the IEEE European Symposium on Security and Privacy, 2022
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
HDiff: A Semi-automatic Framework for Discovering Semantic Gap Attack in HTTP Implementations.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
Invoke-Deobfuscation: AST-Based and Semantics-Preserving Deobfuscation for PowerShell Scripts.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks.
Proceedings of the 30th USENIX Security Symposium, 2021
Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems.
Proceedings of the 30th USENIX Security Symposium, 2021
From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the IEEE Global Communications Conference, 2021
Mingling of Clear and Muddy Water: Understanding and Detecting Semantic Confusion in Blackhat SEO.
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
Rusted Anchors: A National Client-Side View of Hidden Root CAs in the Web PKI Ecosystem.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
Proc. ACM Meas. Anal. Comput. Syst., 2020
Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Devices.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020
Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Sci. China Inf. Sci., 2019
Proceedings of the 38th Symposium on Reliable Distributed Systems, 2019
Proceedings of the Security and Privacy in Communication Networks, 2019
Proceedings of the Internet Measurement Conference, 2019
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019
TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 8th USENIX Workshop on Free and Open Communications on the Internet, 2018
Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path.
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 37th IEEE Symposium on Reliable Distributed Systems, 2018
Proceedings of the Information Security - 21st International Conference, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2018
How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
How to Learn Klingon without a Dictionary: Detection and Measurement of Black Keywords Used by the Underground Economy.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Don't Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
IEEE/ACM Trans. Netw., 2016
MAF-SAM: An effective method to perceive data plane threats of inter domain routing system.
Comput. Networks, 2016
Sci. China Inf. Sci., 2016
The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO.
Proceedings of the 25th USENIX Security Symposium, 2016
Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
What You See Isn't Always What You Get: A Measurement Study of Usage Fraud on Android Apps.
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the Security and Privacy in Communication Networks, 2015
2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
Research on the Anti-attack Design Principles of Low-Latency Anonymous Communication.
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the ACM SIGCOMM 2013 Conference, 2013
Proceedings of the Passive and Active Measurement - 14th International Conference, 2013
2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
2011
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011
A federated identity management system with centralized trust and unified Single Sign-On.
Proceedings of the 6th International ICST Conference on Communications and Networking in China, 2011
2010
IABA: An improved PNN Algorithm for anomaly detection in network security management.
Proceedings of the Sixth International Conference on Natural Computation, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
IEICE Trans. Commun., 2009
Selecting Trust Peers Based on Updated Credit Value in Peer-to-Peer Networks.
Proceedings of the 2009 International Conference on Security & Management, 2009
2008
RRM: An incentive reputation model for promoting good behaviors in distributed systems.
Sci. China Ser. F Inf. Sci., 2008
Dynamic emulation based modeling and detection of polymorphic shellcode at the network level.
Sci. China Ser. F Inf. Sci., 2008
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008
Proceedings of the IT-Incidents Management & IT-Forensics, 2008
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008
2005
Pattern Recognit. Lett., 2005
Modeling and analyzing of the interaction between worms and antiworms during network worm propagation.
Sci. China Ser. F Inf. Sci., 2005
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the Advances in Intelligent Computing, 2005
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
2004
J. Netw. Syst. Manag., 2004
Improved algorithms tracing back to attacking sources.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2004
Proceedings of the Grid and Cooperative Computing, 2004
Proceedings of the Grid and Cooperative Computing, 2004
2003
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003
2000
Proceedings of the IEEE International Conference on Networks 2000: Networking Trends and Challenges in the New Millennium, 2000