Export 12 results:
Filters: Author is Helen J. Wang  [Clear All Filters]
Wang HJ, Moshchuk A, Gamon M, Iqbal S, Brown ET, Kapoor A, Meek C, Chen E, Tian Y, Teevan J et al..  2015.  The Activity Platform. 15th Workshop on Hot Topics in Operating Systems (HotOS XV).
Huang L-S, Moshchuk A, Wang HJ, Schecter S, Jackson C.  2012.  Clickjacking: Attacks and Defenses. 21st USENIX Security Symposium (USENIX Security 12). :413--428.
Popa RAda, Lorch JR, Molnar D, Wang HJ, Zhuang L.  2011.  Enabling Security in Cloud Storage SLAs with CloudProof. 2011 USENIX Annual Technical Conference (USENIX ATC 11).
Felt APorter, Wang HJ, Moshchuk A, Hanna S, Chin E.  2011.  Permission Re-Delegation: Attacks and Defenses. 20th USENIX Security Symposium (USENIX Security 11).
Zhuang L, Dunagan J, Simon DR, Wang HJ, Osipkov I, Hulten G, Tygar J.D..  2008.  Characterizing Botnets from Email Spam Records. First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 08).
Reis C, Dunagan J, Wang HJ, Dubrovsky O, Esmeir S.  2006.  BrowserShield: Vulnerability-Driven Filtering of Dynamic HTML. 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI 06).
Wang HJ, Platt JC, Chen Y, Zhang R, Wang Y-M.  2004.  Automatic Misconfiguration Troubleshooting with PeerPressure. 6th Symposium on Operating Systems Design & Implementation (OSDI 04).