Biblio

Export 12 results:
Filters: Author is Baojun Liu  [Clear All Filters]
2024
Zhang Y, Zhang M, Liu B, Liu Z, Zhang J, Duan H, Zhang M, Shi F, Xu C.  2024.  Cross the Zone: Toward a Covert Domain Hijacking via Shared DNS Infrastructure. 33rd USENIX Security Symposium (USENIX Security 24). :5751--5768.
Zhang Y, Liu M, Liu B, Zhang Y, Duan H, Zhang M, Jiang H, Li Y, Shi F.  2024.  Into the Dark: Unveiling Internal Site Search Abused for Black Hat SEO. 33rd USENIX Security Symposium (USENIX Security 24). :1561--1578.
Zhang Y, Liu B, Duan H, Zhang M, Li X, Shi F, Xu C, Alowaisheq E.  2024.  Rethinking the Security Threats of Stale DNS Glue Records. 33rd USENIX Security Symposium (USENIX Security 24). :1261--1277.
Liu Y, Zhang Y, Liu B, Duan H, Li Q, Liu M, Li R, Yao J.  2024.  Tickets or Privacy? Understand the Ecosystem of Chinese Ticket Grabbing Apps 33rd USENIX Security Symposium (USENIX Security 24). :5107--5124.
2023
Li X, Lu C, Liu B, Zhang Q, Li Z, Duan H, Li Q.  2023.  The Maginot Line: Attacking the Boundary of DNS Caching Protection. 32nd USENIX Security Symposium (USENIX Security 23). :3153--3170.
Guo R, Chen J, Wang Y, Mu K, Liu B, Li X, Zhang C, Duan H, Wu J.  2023.  Temporal CDN-Convex Lens: A CDN-Assisted Practical Pulsing DDoS Attack. 32nd USENIX Security Symposium (USENIX Security 23). :6185--6202.
2022
Xie Q, Tang S, Zheng X, Lin Q, Liu B, Duan H, Li F.  2022.  Building an Open, Robust, and Stable Voting-Based Domain Top List. 31st USENIX Security Symposium (USENIX Security 22). :625--642.
Wang C, Shen K, Guo M, Zhao Y, Zhang M, Chen J, Liu B, Zheng X, Duan H, Lin Y et al..  2022.  A Large-scale and Longitudinal Measurement Study of DKIM Deployment. 31st USENIX Security Symposium (USENIX Security 22). :1185--1201.
2018
Zhang M, Liu B, Lu C, Zhang J, Hao S, Duan H.  2018.  Measuring Privacy Threats in China-Wide Mobile Networks. 8th USENIX Workshop on Free and Open Communications on the Internet (FOCI 18).
Liu B, Lu C, Duan H, Liu Y, Li Z, Hao S, Yang M.  2018.  Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path. 27th USENIX Security Symposium (USENIX Security 18). :1113--1128.