Export 11 results:
Filters: Author is Helen J. Wang  [Clear All Filters]
Wang HJ, Moshchuk A, Gamon M, Iqbal S, Brown ET, Kapoor A, Meek C, Chen E, Tian Y, Teevan J et al..  2015.  The Activity Platform. 15th Workshop on Hot Topics in Operating Systems (HotOS {XV}).
Huang L-S, Moshchuk A, Wang HJ, Schecter S, Jackson C.  2012.  Clickjacking: Attacks and Defenses. 21st {USENIX} Security Symposium ({USENIX} Security 12). :413--428.
Popa RAda, Lorch JR, Molnar D, Wang HJ, Zhuang L.  2011.  Enabling Security in Cloud Storage SLAs with CloudProof. 2011 {USENIX} Annual Technical Conference ({USENIX} {ATC} 11).
Zhuang L, Dunagan J, Simon DR, Wang HJ, Osipkov I, Hulten G, Tygar J.D..  2008.  Characterizing Botnets from Email Spam Records. First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 08).
Reis C, Dunagan J, Wang HJ, Dubrovsky O, Esmeir S.  2006.  BrowserShield: Vulnerability-Driven Filtering of Dynamic HTML. 7th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 06).
Wang HJ, Platt JC, Chen Y, Zhang R, Wang Y-M.  2004.  Automatic Misconfiguration Troubleshooting with PeerPressure. 6th Symposium on Operating Systems Design & Implementation ({OSDI} 04).