Shuo Chen

Affiliations:
  • Microsoft Research, Redmond, WA, USA
  • University of Illinois, Urbana-Champaign, IL, USA (former)


According to our database1, Shuo Chen authored at least 40 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web.
CoRR, 2024

2023
A Security Study about Electron Applications and a Programming Methodology to Tame DOM Functionalities.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

2022
Decentralized Verifiable Mail-in Ballot Counting for Postal Voting.
CoRR, 2022

Timing-Based Browsing Privacy Vulnerabilities Via Site Isolation.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2021
Argus: A Fully Transparent Incentive System for Anti-Piracy Campaigns (Extended Version).
CoRR, 2021

Agatha: Smart Contract for DNN Computation.
CoRR, 2021

Argus: A Fully Transparent Incentive System for Anti-Piracy Campaigns.
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021

Forerunner: Constraint-based Speculative Transaction Execution for Ethereum.
Proceedings of the SOSP '21: ACM SIGOPS 28th Symposium on Operating Systems Principles, 2021

Characterizing Ethereum's Mining Power Decentralization at a Deeper Level.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

2018
We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS.
Proceedings of the 27th USENIX Security Symposium, 2018

2017
SVAuth - A Single-Sign-On Integration Solution with Runtime Verification.
Proceedings of the Runtime Verification - 17th International Conference, 2017

2016
Self-Verifying Execution (Position Paper).
Proceedings of the IEEE Cybersecurity Development, 2016

Uncovering Bugs in Distributed Storage Systems during Testing (Not in Production!).
Proceedings of the 14th USENIX Conference on File and Storage Technologies, 2016

"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Swords and shields: a study of mobile game hacks and existing defenses.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Cookies Lack Integrity: Real-World Implications.
Proceedings of the 24th USENIX Security Symposium, 2015

Securing Multiparty Online Services Via Certification of Symbolic Transactions.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Enlightening Ph.D. Students with the Elegance of Logic - My Personal Memory About Prof. José Meseguer.
Proceedings of the Logic, Rewriting, and Concurrency, 2015

2014
Thwarting Wi-Fi Side-Channel Analysis through Traffic Demultiplexing.
IEEE Trans. Wirel. Commun., 2014

Brahmastra: Driving Apps to Test the Security of Third-Party Components.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

OAuth Demystified for Mobile Application Developers.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

InteGuard: Toward Automatic Protection of Third-Party Web Service Integrations.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Unauthorized origin crossing on mobile platforms: threats and mitigation.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Signing Me onto Your Accounts through Facebook and Google: A Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

2011
How to Shop for Free Online - Security Analysis of Cashier-as-a-Service Based Web Stores.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

2010
Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

How to Share Your Favourite Search Results while Preserving Privacy and Quality.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

Sidebuster: automated detection and quantification of side-channel leaks in web application development.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2008
Workshop on compiler and architectural techniques for application reliability and security (CATARS).
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

2006
Security Vulnerabilities: From Analysis to Detection and Masking Techniques.
Proc. IEEE, 2006

2005
Design for Security: Measurement, Analysis and Mitigation Techniques
PhD thesis, 2005

Non-Control-Data Attacks Are Realistic Threats.
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005

Defeating Memory Corruption Attacks via Pointer Taintedness Detection.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

2004
Modeling and evaluating the security threats of transient errors in firewall software.
Perform. Evaluation, 2004

Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities by Pointer Taintedness Semantics.
Proceedings of the Security and Protection in Information Processing Systems, 2004

2003
Security Vulnerabilities - From Data Analysis to Protection Mechanisms.
Proceedings of the 9th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS Fall 2003), 2003

A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

2002
Evaluating the Security Threat of Firewall Data Corruption Caused by Transient Errors.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

2001
An Experimental Study of Security Vulnerabilities Caused by Errors.
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001


  Loading...