Shuo Chen
Affiliations:- Microsoft Research, Redmond, WA, USA
- University of Illinois, Urbana-Champaign, IL, USA (former)
According to our database1,
Shuo Chen
authored at least 40 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web.
CoRR, 2024
2023
A Security Study about Electron Applications and a Programming Methodology to Tame DOM Functionalities.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
2021
Argus: A Fully Transparent Incentive System for Anti-Piracy Campaigns (Extended Version).
CoRR, 2021
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021
Proceedings of the SOSP '21: ACM SIGOPS 28th Symposium on Operating Systems Principles, 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
2018
Proceedings of the 27th USENIX Security Symposium, 2018
2017
Proceedings of the Runtime Verification - 17th International Conference, 2017
2016
Proceedings of the IEEE Cybersecurity Development, 2016
Proceedings of the 14th USENIX Conference on File and Storage Technologies, 2016
"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Enlightening Ph.D. Students with the Elegance of Logic - My Personal Memory About Prof. José Meseguer.
Proceedings of the Logic, Rewriting, and Concurrency, 2015
2014
IEEE Trans. Wirel. Commun., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Signing Me onto Your Accounts through Facebook and Google: A Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services.
Proceedings of the IEEE Symposium on Security and Privacy, 2012
2011
How to Shop for Free Online - Security Analysis of Cashier-as-a-Service Based Web Stores.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010
Sidebuster: automated detection and quantification of side-channel leaks in web application development.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2008
Workshop on compiler and architectural techniques for application reliability and security (CATARS).
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008
2006
Proc. IEEE, 2006
2005
PhD thesis, 2005
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005
2004
Modeling and evaluating the security threats of transient errors in firewall software.
Perform. Evaluation, 2004
Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities by Pointer Taintedness Semantics.
Proceedings of the Security and Protection in Information Processing Systems, 2004
2003
Proceedings of the 9th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS Fall 2003), 2003
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003
2002
Evaluating the Security Threat of Firewall Data Corruption Caused by Transient Errors.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002
2001
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001