Hai-Xin Duan

Orcid: 0000-0003-0083-733X

According to our database1, Hai-Xin Duan authored at least 142 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
PowerPeeler: A Precise and General Dynamic Deobfuscation Method for PowerShell Scripts.
CoRR, 2024

An Empirical Study of Open Edge Computing Platforms: Ecosystem, Usage, and Security Risks.
CoRR, 2024

From Promises to Practice: Evaluating the Private Browsing Modes of Android Browser Apps.
Proceedings of the ACM on Web Conference 2024, 2024

A Worldwide View on the Reachability of Encrypted DNS Services.
Proceedings of the ACM on Web Conference 2024, 2024

Uncovering Security Vulnerabilities in Real-world Implementation and Deployment of 5G Messaging Services.
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024

Cross the Zone: Toward a Covert Domain Hijacking via Shared DNS Infrastructure.
Proceedings of the 33rd USENIX Security Symposium, 2024

Into the Dark: Unveiling Internal Site Search Abused for Black Hat SEO.
Proceedings of the 33rd USENIX Security Symposium, 2024

Rethinking the Security Threats of Stale DNS Glue Records.
Proceedings of the 33rd USENIX Security Symposium, 2024

ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing.
Proceedings of the 33rd USENIX Security Symposium, 2024

Tickets or Privacy? Understand the Ecosystem of Chinese Ticket Grabbing Apps.
Proceedings of the 33rd USENIX Security Symposium, 2024

Where URLs Become Weapons: Automated Discovery of SSRF Vulnerabilities in Web Applications.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Break the Wall from Bottom: Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewalls.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

DNSBomb: A New Practical-and-Powerful Pulsing DoS Attack Exploiting DNS Queries-and-Responses.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

More Haste, Less Speed: Cache Related Security Threats in Continuous Integration Services.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

CrypTody: Cryptographic Misuse Analysis of IoT Firmware via Data-flow Reasoning.
Proceedings of the 27th International Symposium on Research in Attacks, 2024

ReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies and DoS Attacks with Grammar-based Fuzzing.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

BreakSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Understanding the Implementation and Security Implications of Protective DNS Services.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Yesterday Once More: Global Measurement of Internet Traffic Shadowing Behaviors.
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024

Bounce in the Wild: A Deep Dive into Email Delivery Failures from a Large Email Service Provider.
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024

ChatScam: Unveiling the Rising Impact of ChatGPT on Domain Name Abuse.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

2023
Can We Trust the Phone Vendors? Comprehensive Security Measurements on the Android Firmware Ecosystem.
IEEE Trans. Software Eng., July, 2023

Detecting and Measuring Security Risks of Hosting-Based Dangling Domains.
Proc. ACM Meas. Anal. Comput. Syst., March, 2023

TAICHI: Transform Your Secret Exploits Into Mine From a Victim's Perspective.
IEEE Trans. Dependable Secur. Comput., 2023

Automatic Generation of Adversarial Readable Chinese Texts.
IEEE Trans. Dependable Secur. Comput., 2023

The Maginot Line: Attacking the Boundary of DNS Caching Protection.
Proceedings of the 32nd USENIX Security Symposium, 2023

Temporal CDN-Convex Lens: A CDN-Assisted Practical Pulsing DDoS Attack.
Proceedings of the 32nd USENIX Security Symposium, 2023

MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries.
Proceedings of the 32nd USENIX Security Symposium, 2023

Investigating Package Related Security Threats in Software Registries.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Continuous Intrusion: Characterizing the Security of Continuous Integration Services.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Ghost Domain Reloaded: Vulnerable Links in Domain Name Delegation and Revocation.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

A Security Study about Electron Applications and a Programming Methodology to Tame DOM Functionalities.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Wolf in Sheep's Clothing: Evaluating Security Risks of the Undelegated Record on DNS Hosting Services.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

Silence is not Golden: Disrupting the Load Balancing of Authoritative DNS Servers.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Stolen Risks of Models with Security Properties.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Measuring the Deployment of 5G Security Enhancement.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

Building an Open, Robust, and Stable Voting-Based Domain Top List.
Proceedings of the 31st USENIX Security Symposium, 2022

A Large-scale and Longitudinal Measurement Study of DKIM Deployment.
Proceedings of the 31st USENIX Security Symposium, 2022

Timing-Based Browsing Privacy Vulnerabilities Via Site Isolation.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Analyzing Ground-Truth Data of Mobile Gambling Scams.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Exploit the Last Straw That Breaks Android Systems.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Encrypted Malware Traffic Detection via Graph-based Network Analysis.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

Measuring the Practical Effect of DNS Root Server Instances: A China-Wide Case Study.
Proceedings of the Passive and Active Measurement - 23rd International Conference, 2022

PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

ValCAT: Variable-Length Contextualized Adversarial Transformations Using Encoder-Decoder Language Model.
Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2022

Large-scale Security Measurements on the Android Firmware Ecosystem.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Ethics in Security Research: Visions, Reality, and Paths Forward.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

Exploring the Characteristics and Security Risks of Emerging Emoji Domain Names.
Proceedings of the Computer Security - ESORICS 2022, 2022

HDiff: A Semi-automatic Framework for Discovering Semantic Gap Attack in HTTP Implementations.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

Invoke-Deobfuscation: AST-Based and Semantics-Preserving Deobfuscation for PowerShell Scripts.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

An Extensive Study of Residential Proxies in China.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

SFuzz: Slice-based Fuzzing for Real-Time Operating Systems.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks.
Proceedings of the 30th USENIX Security Symposium, 2021

Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems.
Proceedings of the 30th USENIX Security Symposium, 2021

From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

On Evaluating Delegated Digital Signing of Broadcasting Messages in 5G.
Proceedings of the IEEE Global Communications Conference, 2021

Mingling of Clear and Muddy Water: Understanding and Detecting Semantic Confusion in Blackhat SEO.
Proceedings of the Computer Security - ESORICS 2021, 2021

Fast IPv6 Network Periphery Discovery and Security Implications.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

Rusted Anchors: A National Client-Side View of Hidden Root CAs in the Web PKI Ecosystem.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Detecting and Characterizing SMS Spearphishing Attacks.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Characterizing Transnational Internet Performance and the Great Bottleneck of China.
Proc. ACM Meas. Anal. Comput. Syst., 2020

Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Devices.
Proceedings of the 29th USENIX Security Symposium, 2020

TextExerciser: Feedback-driven Text Input Exercising for Android Applications.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

CDN Judo: Breaking the CDN DoS Protection with Itself.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Argot: Generating Adversarial Readable Chinese Texts.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

CDN Backfired: Amplification Attacks Based on HTTP Range Requests.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Lies in the Air: Characterizing Fake-base-station Spam Ecosystem in China.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Understanding Promotion-as-a-Service on GitHub.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Finding the best answer: measuring the optimization of public and authoritative DNS.
Sci. China Inf. Sci., 2019

Fuzzing IPC with Knowledge Inference.
Proceedings of the 38th Symposium on Reliable Distributed Systems, 2019

TL;DR Hazard: A Comprehensive Study of Levelsquatting Scams.
Proceedings of the Security and Privacy in Communication Networks, 2019

An End-to-End, Large-Scale Measurement of DNS-over-Encryption: How Far Have We Come?
Proceedings of the Internet Measurement Conference, 2019

NETHCF: Enabling Line-rate and Adaptive Spoofed IP Traffic Filtering.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

Casino royale: a deep exploration of illegal online gambling.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications.
Proceedings of the 27th USENIX Security Symposium, 2018

Measuring Privacy Threats in China-Wide Mobile Networks.
Proceedings of the 8th USENIX Workshop on Free and Open Communications on the Internet, 2018

Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path.
Proceedings of the 27th USENIX Security Symposium, 2018

We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS.
Proceedings of the 27th USENIX Security Symposium, 2018

Abusing CDNs for Fun and Profit: Security Issues in CDNs' Origin Validation.
Proceedings of the 37th IEEE Symposium on Reliable Distributed Systems, 2018

ICUFuzzer: Fuzzing ICU Library for Exploitable Bugs in Multiple Software.
Proceedings of the Information Security - 21st International Conference, 2018

Analysis and Measurement of Zone Dependency in the Domain Name System.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

A Reexamination of Internationalized Domain Names: The Good, the Bad and the Ugly.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

Path Leaks of HTTPS Side-Channel by Cookie Injection.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2018

How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
How to Learn Klingon without a Dictionary: Detection and Measurement of Black Keywords Used by the Underground Economy.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

How to Notify a Vulnerability to the Right Person? Case Study: In an ISP Scope.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Don't Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Reexamining DNS From a Global Recursive Resolver Perspective.
IEEE/ACM Trans. Netw., 2016

MAF-SAM: An effective method to perceive data plane threats of inter domain routing system.
Comput. Networks, 2016

An accurate distributed scheme for detection of prefix interception.
Sci. China Inf. Sci., 2016

The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO.
Proceedings of the 25th USENIX Security Symposium, 2016

Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Forwarding-Loop Attacks in Content Delivery Networks.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

What You See Isn't Always What You Get: A Measurement Study of Usage Fraud on Android Apps.
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016

Host of Troubles: Multiple Host Ambiguities in HTTP Implementations.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Cookies Lack Integrity: Real-World Implications.
Proceedings of the 24th USENIX Security Symposium, 2015

Route Leaks Identification by Detecting Routing Loops.
Proceedings of the Security and Privacy in Communication Networks, 2015

2014
When HTTPS Meets CDN: A Case of Authentication in Delegated Service.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

IntentFuzzer: detecting capability leaks of android applications.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Research on the Anti-attack Design Principles of Low-Latency Anonymous Communication.
Proceedings of the 12th IEEE International Conference on Trust, 2013

An empirical reexamination of global DNS behavior.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

Measuring Query Latency of Top Level DNS Servers.
Proceedings of the Passive and Active Measurement - 14th International Conference, 2013

2012
Ghost Domain Names: Revoked Yet Still Resolvable.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

2011
Anonymity analysis of P2P anonymous communication systems.
Comput. Commun., 2011

Anonymous Communication over Invisible Mix Rings.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

Cooperation-Based Trust Model and Its Application in Network Security Management.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

User cooperation trust model and its application in network security management.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011

A federated identity management system with centralized trust and unified Single Sign-On.
Proceedings of the 6th International ICST Conference on Communications and Networking in China, 2011

2010
IABA: An improved PNN Algorithm for anomaly detection in network security management.
Proceedings of the Sixth International Conference on Natural Computation, 2010

Analysis of Anonymity in P2P Anonymous Communication Systems.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

Distinguishing the Master to Defend DDoS Attack in Peer-to-Peer Networks.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
WindTalker: A P2P-Based Low-Latency Anonymous Communication Network.
IEICE Trans. Commun., 2009

Selecting Trust Peers Based on Updated Credit Value in Peer-to-Peer Networks.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
RRM: An incentive reputation model for promoting good behaviors in distributed systems.
Sci. China Ser. F Inf. Sci., 2008

Dynamic emulation based modeling and detection of polymorphic shellcode at the network level.
Sci. China Ser. F Inf. Sci., 2008

AMCAS: An Automatic Malicious Code Analysis System.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

An Admission Control Policy Based on Social Networks for P2P Systems.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Attacking Test and Online Forensics in IPv6 Networks.
Proceedings of the IT-Incidents Management & IT-Forensics, 2008

Scheduling Peers Based on Credit Construction Period in Peer-to-Peer Networks.
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008

2005
Efficient performance estimate for one-class support vector machine.
Pattern Recognit. Lett., 2005

Modeling and analyzing of the interaction between worms and antiworms during network worm propagation.
Sci. China Ser. F Inf. Sci., 2005

Anomaly Internet Network Traffic Detection by Kernel Principle Component Classifier.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

The Authorization Service in Dynamic Trust Domains.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Improved Marking Model ERPPM Tracing Back to DDoS Attacker.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Port Scan Behavior Diagnosis by Clustering.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

New Method for Intrusion Features Mining in IDS.
Proceedings of the Advances in Intelligent Computing, 2005

New Algorithm Mining Intrusion Patterns.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005

An Extensible AAA Infrastructure for IPv6.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

PDTM: A Policy-Driven Trust Management Framework in Distributed Systems.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Workflow Oriented Network Management - A Web/Java Approach.
J. Netw. Syst. Manag., 2004

Improved algorithms tracing back to attacking sources.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2004

XML Based X.509 Authorization in CERNET Grid.
Proceedings of the Grid and Cooperative Computing, 2004

Algorithms for Congestion Detection and Control.
Proceedings of the Grid and Cooperative Computing, 2004

2003
Distributed IDS Tracing Back to Attacking Sources.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

2000
Policy based access control framework for large networks.
Proceedings of the IEEE International Conference on Networks 2000: Networking Trends and Challenges in the New Millennium, 2000


  Loading...