Biblio

Export 12 results:
Filters: Author is Helen J. Wang  [Clear All Filters]
2015
Wang HJ, Moshchuk A, Gamon M, Iqbal S, Brown ET, Kapoor A, Meek C, Chen E, Tian Y, Teevan J et al..  2015.  The Activity Platform. 15th Workshop on Hot Topics in Operating Systems (HotOS XV).
2012
Huang L-S, Moshchuk A, Wang HJ, Schecter S, Jackson C.  2012.  Clickjacking: Attacks and Defenses. 21st USENIX Security Symposium (USENIX Security 12). :413--428.
2011
Popa RAda, Lorch JR, Molnar D, Wang HJ, Zhuang L.  2011.  Enabling Security in Cloud Storage SLAs with CloudProof. 2011 USENIX Annual Technical Conference (USENIX ATC 11).
Felt APorter, Wang HJ, Moshchuk A, Hanna S, Chin E.  2011.  Permission Re-Delegation: Attacks and Defenses. 20th USENIX Security Symposium (USENIX Security 11).
2008
Zhuang L, Dunagan J, Simon DR, Wang HJ, Osipkov I, Hulten G, Tygar J.D..  2008.  Characterizing Botnets from Email Spam Records. First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 08).
2006
Reis C, Dunagan J, Wang HJ, Dubrovsky O, Esmeir S.  2006.  BrowserShield: Vulnerability-Driven Filtering of Dynamic HTML. 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI 06).
2004
Wang HJ, Platt JC, Chen Y, Zhang R, Wang Y-M.  2004.  Automatic Misconfiguration Troubleshooting with PeerPressure. 6th Symposium on Operating Systems Design & Implementation (OSDI 04).