Jianjun Chen

Orcid: 0000-0001-7511-1117

Affiliations:
  • Tsinghua University, Beijing, China
  • Zhongguancun Laboratory, Beijing, China
  • University of California, Berkeley, International Computer Science Institute, CA, USA


According to our database1, Jianjun Chen authored at least 31 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Detecting and Measuring Security Implications of Entangled Domain Verification in CDN.
CoRR, 2024

Uncovering Security Vulnerabilities in Real-world Implementation and Deployment of 5G Messaging Services.
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024

CDN Cannon: Exploiting CDN Back-to-Origin Strategies for Amplification Attacks.
Proceedings of the 33rd USENIX Security Symposium, 2024

Demystifying the Security Implications in IoT Device Rental Services.
Proceedings of the 33rd USENIX Security Symposium, 2024

Where URLs Become Weapons: Automated Discovery of SSRF Vulnerabilities in Web Applications.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Break the Wall from Bottom: Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewalls.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

ReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies and DoS Attacks with Grammar-based Fuzzing.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

BreakSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Faster and Better: Detecting Vulnerabilities in Linux-based IoT Firmware with Optimized Reaching Definition Analysis.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Bounce in the Wild: A Deep Dive into Email Delivery Failures from a Large Email Service Provider.
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024

Inbox Invasion: Exploiting MIME Ambiguities to Evade Email Attachment Detectors.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Internet's Invisible Enemy: Detecting and Measuring Web Cache Poisoning in the Wild.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Detecting and Measuring Security Risks of Hosting-Based Dangling Domains.
Proc. ACM Meas. Anal. Comput. Syst., March, 2023

Temporal CDN-Convex Lens: A CDN-Assisted Practical Pulsing DDoS Attack.
Proceedings of the 32nd USENIX Security Symposium, 2023

Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

A Security Study about Electron Applications and a Programming Methodology to Tame DOM Functionalities.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

1dFuzz: Reproduce 1-Day Vulnerabilities with Directed Differential Fuzzing.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Silence is not Golden: Disrupting the Load Balancing of Authoritative DNS Servers.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
A Large-scale and Longitudinal Measurement Study of DKIM Deployment.
Proceedings of the 31st USENIX Security Symposium, 2022

HDiff: A Semi-automatic Framework for Discovering Semantic Gap Attack in HTTP Implementations.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2020
Composition Kills: A Case Study of Email Sender Authentication.
Proceedings of the 29th USENIX Security Symposium, 2020

CDN Judo: Breaking the CDN DoS Protection with Itself.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

2018
We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS.
Proceedings of the 27th USENIX Security Symposium, 2018

Abusing CDNs for Fun and Profit: Security Issues in CDNs' Origin Validation.
Proceedings of the 37th IEEE Symposium on Reliable Distributed Systems, 2018

Path Leaks of HTTPS Side-Channel by Cookie Injection.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2018

2016
Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Forwarding-Loop Attacks in Content Delivery Networks.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Host of Troubles: Multiple Host Ambiguities in HTTP Implementations.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016


  Loading...