Publications

Filter by type:

Under the Shadow of Sunshine: Understanding and Detecting BulletProof Hosting on Legitimate Service Provider Networks

Details PDF

Dark Hazard: Learning-based, Large-scale Discovery of Hidden Sensitive Operations in Android Apps

Details PDF Slides Bib

Catching Predators at Watering Holes: Finding and Understanding Strategically Compromised Websites

Details PDF Bib

Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service

Details PDF Bib

Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence

Details PDF Bib

Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf

Details PDF Bib

Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search

Details PDF Bib

Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS

Details PDF Bib

Practicing oblivious access on cloud storage: the gap, the fallacy, and the new way forward

Details PDF Bib

Perplexed messengers from the cloud: Automated security analysis of push-messaging integrations

Details PDF Bib

Hare hunting in the wild android: A study on the threat of hanging attribute references

Details PDF Bib

Efficient genome-wide, privacy-preserving similar patient query based on private edit distance

Details PDF Bib

Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS

Details PDF Bib

Uipicker: User-input privacy identification in mobile applications

Details PDF Bib

Finding unknown malice in 10 seconds: Mass vetting for new threats at the google-play scale

Details PDF Bib

Leave me alone: App-level protection against runtime information gathering on Android

Details PDF Bib

What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources.

Details PDF Bib

Mayhem in the push clouds: Understanding and mitigating security hazards in mobile push-messaging services

Details PDF Bib

Controlled functional encryption

Details PDF Bib

Understanding the dark side of domain parking

Details PDF Bib

Upgrading your android, elevating my malware: Privilege escalation through mobile os updating

Details PDF Bib

The peril of fragmentation: Security hazards in android device driver customizations

Details PDF Bib

Hunting the red fox online: Understanding and detection of mass redirect-script injections

Details PDF Bib

The Tangled Web of Password Reuse.

Details PDF Bib

Screenmilker: How to Milk Your Android Screen for Secrets.

Details PDF Bib

Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android.

Details PDF Bib

Privacy Risk in Anonymized Heterogeneous Information Networks.

Details PDF Bib

Choosing blindly but wisely: differentially private solicitation of DNA datasets for disease marker discovery

Details PDF Bib

Unauthorized origin crossing on mobile platforms: Threats and mitigation

Details PDF Bib

Identity, location, disease and more: Inferring your secrets from android public resources

Details PDF Bib

Finding the linchpins of the dark web: a study on topologically dedicated hosts on malicious web infrastructures

Details PDF Bib

InteGuard: Toward Automatic Protection of Third-Party Web Service Integrations.

Details PDF Bib

Knowing your enemy: understanding and detecting malicious web advertising

Details PDF Bib

Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services

Details PDF Bib

Large-Scale Privacy-Preserving Mapping of Human Genomic Sequences on Hybrid Clouds.

Details PDF Bib

Sedic: privacy-aware data intensive computing on hybrid clouds

Details PDF Bib

To release or not to release: evaluating information leaks in aggregate human-genome data

Details PDF Bib

How to Shop for Free Online--Security Analysis of Cashier-as-a-Service Based Web Stores

Details PDF Bib

Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones.

Details PDF Bib

FIRM: Capability-based inline mediation of Flash behaviors

Details PDF Bib

Sidebuster: automated detection and quantification of side-channel leaks in web application development

Details PDF Bib

Mash-if: Practical information-flow control within client-side mashups

Details PDF Bib

Side-channel leaks in web applications: A reality today, a challenge tomorrow

Details PDF Bib

Privacy-preserving genomic computation through program specialization

Details PDF Bib

Learning your identity and disease from research papers: information leaks in genome wide association study

Details PDF Bib

Effective and Efficient Malware Detection at the End Host.

Details PDF Bib

Mitigating inadvertent insider threats with incentives

Details PDF Bib

Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems

Details PDF Bib

Denial of service attacks and defenses in decentralized trust management

Details PDF Bib

Towards automatic reverse engineering of software security configurations

Details PDF Bib

Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software.

Details PDF Bib

Agis: Towards automatic generation of infection signatures

Details PDF Bib

PRECIP: Towards Practical and Retrofittable Confidential Information Protection.

Details PDF Bib

Making captchas clickable

Details PDF Bib

A multi-layer framework for puzzle-based denial-of-service defense

Details PDF Bib

Spyshield: Preserving privacy from spy add-ons

Details PDF Bib

Wraps: Denial-of-service defense through web referrals

Details PDF Bib

Packet vaccine: Black-box exploit detection and signature generation

Details PDF Bib

Deterring voluntary trace disclosure in re-encryption mix networks

Details PDF Bib

Building reliable mix networks with fair exchange

Details PDF Bib

Mitigating bandwidth-exhaustion attacks using congestion puzzles

Details PDF Bib

Fragile mixing

Details PDF Bib

Stealth Attacks on Vehicular Wireless Networks

Details PDF Bib

Defending against denial-of-service attacks with puzzle auctions

Details PDF Bib

Learning near-Pareto-optimal conventions in polynomial time

Details PDF Bib

Reinforcement learning to play an optimal Nash equilibrium in team Markov games

Details PDF Bib

(Im) possibility of safe exchange mechanism design

Details PDF Bib