USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 12 results:
Filters: Author is Guofei Gu [Clear All Filters]
You Can Obfuscate, but You Cannot Hide: CrossPoint Attacks against Network Topology Obfuscation. 33rd USENIX Security Symposium (USENIX Security 24). :5735--5750.
.
2024. SAID: State-aware Defense Against Injection Attacks on In-vehicle Network. 31st USENIX Security Symposium (USENIX Security 22). :1921--1938.
.
2022. SWAPP: A New Programmable Playground for Web Application Security. 31st USENIX Security Symposium (USENIX Security 22). :2029--2046.
.
2022. Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols. 31st USENIX Security Symposium (USENIX Security 22). :1939--1956.
.
2022. Abusing Hidden Properties to Attack the Node.js Ecosystem. 30th USENIX Security Symposium (USENIX Security 21). :2951--2968.
.
2021. The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links. 28th USENIX Security Symposium (USENIX Security 19). :19--36.
.
2019. Iframes/Popups Are Dangerous in Mobile WebView: Studying and Mitigating Differential Context Vulnerabilities. 28th USENIX Security Symposium (USENIX Security 19). :977--994.
.
2019. Attacking the Brain: Races in the SDN Control Plane. 26th USENIX Security Symposium (USENIX Security 17). :451--468.
.
2017. Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART. 26th USENIX Security Symposium (USENIX Security 17). :289--306.
.
2017. UIPicker: User-Input Privacy Identification in Mobile Applications. 24th USENIX Security Symposium (USENIX Security 15). :993--1008.
.
2015. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. 17th USENIX Security Symposium (USENIX Security 08).
.
2008. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation. 16th USENIX Security Symposium (USENIX Security 07).
.
2007.