Biblio

Export 14 results:
Filters: Author is Haixin Duan  [Clear All Filters]
2023
Li X, Lu C, Liu B, Zhang Q, Li Z, Duan H, Li Q.  2023.  The Maginot Line: Attacking the Boundary of DNS Caching Protection. 32nd USENIX Security Symposium (USENIX Security 23). :3153--3170.
Chen X, Shi Y, Jiang Z, Li Y, Wang R, Duan H, Wang H, Zhang C.  2023.  MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries. 32nd USENIX Security Symposium (USENIX Security 23). :841--858.
Guo R, Chen J, Wang Y, Mu K, Liu B, Li X, Zhang C, Duan H, Wu J.  2023.  Temporal CDN-Convex Lens: A CDN-Assisted Practical Pulsing DDoS Attack. 32nd USENIX Security Symposium (USENIX Security 23). :6185--6202.
2022
Xie Q, Tang S, Zheng X, Lin Q, Liu B, Duan H, Li F.  2022.  Building an Open, Robust, and Stable Voting-Based Domain Top List. 31st USENIX Security Symposium (USENIX Security 22). :625--642.
Wang C, Shen K, Guo M, Zhao Y, Zhang M, Chen J, Liu B, Zheng X, Duan H, Lin Y et al..  2022.  A Large-scale and Longitudinal Measurement Study of DKIM Deployment. 31st USENIX Security Symposium (USENIX Security 22). :1185--1201.
2018
Zhang X, Zhang Y, Mo Q, Xia H, Yang Z, Yang M, Wang XF, Lu L, Duan H.  2018.  An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications. 27th USENIX Security Symposium (USENIX Security 18). :1183--1198.
Zhang M, Liu B, Lu C, Zhang J, Hao S, Duan H.  2018.  Measuring Privacy Threats in China-Wide Mobile Networks. 8th USENIX Workshop on Free and Open Communications on the Internet (FOCI 18).
Chen J, Jiang J, Duan H, Wan T, Chen S, Paxson V, Yang M.  2018.  We Still Don’t Have Secure Cross-Domain Requests: an Empirical Study of CORS. 27th USENIX Security Symposium (USENIX Security 18). :1079--1093.
Liu B, Lu C, Duan H, Liu Y, Li Z, Hao S, Yang M.  2018.  Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path. 27th USENIX Security Symposium (USENIX Security 18). :1113--1128.
2016
Du K, Yang H, Li Z, Duan H, Zhang K.  2016.  The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO. 25th USENIX Security Symposium (USENIX Security 16). :245--262.
2015
Zheng X, Jiang J, Liang J, Duan H, Chen S, Wan T, Weaver N.  2015.  Cookies Lack Integrity: Real-World Implications. 24th USENIX Security Symposium (USENIX Security 15). :707--721.