Zhenyu Wu

Affiliations:
  • Google Inc., New York, NY, USA
  • NEC Laboratories America, Inc., Princeton, NJ, USA (former)


According to our database1, Zhenyu Wu authored at least 29 papers between 2007 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
UTrack: Enterprise User Tracking Based on OS-Level Audit Logs.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

2020
Detecting Malware Injection with Program-DNS Behavior.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

2019
A Stream-based Query System for Efficiently Detecting Abnormal System Behaviors for Enterprise Security.
CoRR, 2019

Countering Malicious Processes with Process-DNS Association.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection.
Proceedings of the 27th USENIX Security Symposium, 2018

Towards a Timely Causality Analysis for Enterprise Security.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2016
Profiling Online Social Behaviors for Compromised Account Detection.
IEEE Trans. Inf. Forensics Secur., 2016

High Fidelity Data Reduction for Big Data Security Dependency Analyses.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Whispers in the Hyper-Space: High-Bandwidth and Reliable Covert Channel Attacks Inside the Cloud.
IEEE/ACM Trans. Netw., 2015

Behavior Query Discovery in System-Generated Temporal Graphs.
Proc. VLDB Endow., 2015

A Measurement Study on Co-residence Threat inside the Cloud.
Proceedings of the 24th USENIX Security Symposium, 2015

SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps.
Proceedings of the 24th USENIX Security Symposium, 2015

Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Discover and Tame Long-running Idling Processes in Enterprise Systems.
Proceedings of the 10th ACM Symposium on Information, 2015

2013
Automating Cloud Network Optimization and Evolution.
IEEE J. Sel. Areas Commun., 2013

2012
On Energy Security of Server Systems.
IEEE Trans. Dependable Secur. Comput., 2012

Secure instant messaging in enterprise-like networks.
Comput. Networks, 2012

Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

NetDEO: Automating network design, evolution, and optimization.
Proceedings of the 20th IEEE International Workshop on Quality of Service, 2012

CHEX: statically vetting Android apps for component hijacking vulnerabilities.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Design and Implementation of a Fast Dynamic Packet Filter.
IEEE/ACM Trans. Netw., 2011

Humans and Bots in Internet Chat: Measurement, Analysis, and Automated Classification.
IEEE/ACM Trans. Netw., 2011

Energy Attack on Server Systems.
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011

2010
Mimimorphism: a new approach to binary code obfuscation.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Battle of Botcraft: fighting bots in online games with human observational proofs.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Swift: A Fast Dynamic Packet Filter.
Proceedings of the 5th USENIX Symposium on Networked Systems Design & Implementation, 2008

2007
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007


  Loading...