Export 9 results:
Filters: Author is Haixin Duan  [Clear All Filters]
Zhang X, Zhang Y, Mo Q, Xia H, Yang Z, Yang M, Wang XF, Lu L, Duan H.  2018.  An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications. 27th USENIX Security Symposium (USENIX Security 18). :1183--1198.
Zhang M, Liu B, Lu C, Zhang J, Hao S, Duan H.  2018.  Measuring Privacy Threats in China-Wide Mobile Networks. 8th USENIX Workshop on Free and Open Communications on the Internet (FOCI 18).
Chen J, Jiang J, Duan H, Wan T, Chen S, Paxson V, Yang M.  2018.  We Still Don’t Have Secure Cross-Domain Requests: an Empirical Study of CORS. 27th USENIX Security Symposium (USENIX Security 18). :1079--1093.
Liu B, Lu C, Duan H, Liu Y, Li Z, Hao S, Yang M.  2018.  Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path. 27th USENIX Security Symposium (USENIX Security 18). :1113--1128.
Du K, Yang H, Li Z, Duan H, Zhang K.  2016.  The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO. 25th USENIX Security Symposium (USENIX Security 16). :245--262.
Zheng X, Jiang J, Liang J, Duan H, Chen S, Wan T, Weaver N.  2015.  Cookies Lack Integrity: Real-World Implications. 24th USENIX Security Symposium (USENIX Security 15). :707--721.