BibTeX records: Guofei Gu

download as .bib file

@article{DBLP:journals/tdsc/ZhangLKLXGW23,
  author       = {Menghao Zhang and
                  Guanyu Li and
                  Xiao Kong and
                  Chang Liu and
                  Mingwei Xu and
                  Guofei Gu and
                  Jianping Wu},
  title        = {NetHCF: Filtering Spoofed {IP} Traffic With Programmable Switches},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {2},
  pages        = {1641--1655},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3161015},
  doi          = {10.1109/TDSC.2022.3161015},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhangLKLXGW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AltaweelSGMB23,
  author       = {Ala Altaweel and
                  Radu Stoleru and
                  Guofei Gu and
                  Arnab Kumar Maity and
                  Suman Bhunia},
  title        = {On Detecting Route Hijacking Attack in Opportunistic Mobile Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {3},
  pages        = {2516--2532},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3186029},
  doi          = {10.1109/TDSC.2022.3186029},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/AltaweelSGMB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HongXHLHG23,
  author       = {Sungmin Hong and
                  Lei Xu and
                  Jianwei Huang and
                  Hongda Li and
                  Hongxin Hu and
                  Guofei Gu},
  title        = {SysFlow: Toward a Programmable Zero Trust Framework for System Security},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {2794--2809},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3264152},
  doi          = {10.1109/TIFS.2023.3264152},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HongXHLHG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/VardhanCCZG23,
  author       = {Raj Vardhan and
                  Alok Chandrawal and
                  Phakpoom Chinprutthiwong and
                  Yangyong Zhang and
                  Guofei Gu},
  editor       = {Joseph K. Liu and
                  Yang Xiang and
                  Surya Nepal and
                  Gene Tsudik},
  title        = {{\#}DM-Me: Susceptibility to Direct Messaging-Based Scams},
  booktitle    = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14,
                  2023},
  pages        = {494--508},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579856.3582815},
  doi          = {10.1145/3579856.3582815},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/VardhanCCZG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/ZhangVCG23,
  author       = {Yangyong Zhang and
                  Raj Vardhan and
                  Phakpoom Chinprutthiwong and
                  Guofei Gu},
  editor       = {Joseph K. Liu and
                  Yang Xiang and
                  Surya Nepal and
                  Gene Tsudik},
  title        = {Do Users Really Know Alexa? Understanding Alexa Skill Security Indicators},
  booktitle    = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14,
                  2023},
  pages        = {870--883},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579856.3595795},
  doi          = {10.1145/3579856.3595795},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/ZhangVCG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/XuZCG23,
  author       = {Lei Xu and
                  Yangyong Zhang and
                  Phakpoom Chinprutthiwong and
                  Guofei Gu},
  title        = {Automatic Synthesis of Network Security Services: {A} First Step},
  booktitle    = {32nd International Conference on Computer Communications and Networks,
                  {ICCCN} 2023, Honolulu, HI, USA, July 24-27, 2023},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCCN58024.2023.10230115},
  doi          = {10.1109/ICCCN58024.2023.10230115},
  timestamp    = {Wed, 13 Sep 2023 08:43:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/XuZCG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhouHLLLG23,
  author       = {Huancheng Zhou and
                  Sungmin Hong and
                  Yangyang Liu and
                  Xiapu Luo and
                  Weichao Li and
                  Guofei Gu},
  title        = {Mew: Enabling Large-Scale and Dynamic Link-Flooding Defenses on Programmable
                  Switches},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {3178--3192},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179404},
  doi          = {10.1109/SP46215.2023.10179404},
  timestamp    = {Thu, 27 Jul 2023 08:17:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ZhouHLLLG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/XieCLSGXY22,
  author       = {Renjie Xie and
                  Jiahao Cao and
                  Qi Li and
                  Kun Sun and
                  Guofei Gu and
                  Mingwei Xu and
                  Yuan Yang},
  title        = {Disrupting the {SDN} Control Channel via Shared Links: Attacks and
                  Countermeasures},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {30},
  number       = {5},
  pages        = {2158--2172},
  year         = {2022},
  url          = {https://doi.org/10.1109/TNET.2022.3169136},
  doi          = {10.1109/TNET.2022.3169136},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ton/XieCLSGXY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/LiHDH0G022,
  author       = {Hongda Li and
                  Qiqing Huang and
                  Fei Ding and
                  Hongxin Hu and
                  Long Cheng and
                  Guofei Gu and
                  Ziming Zhao},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {Understanding and Detecting Remote Infection on Linux-based IoT Devices},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {873--887},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3517423},
  doi          = {10.1145/3488932.3517423},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiaccs/LiHDH0G022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0001LLZLYLZG22,
  author       = {Lei Xue and
                  Yangyang Liu and
                  Tianqi Li and
                  Kaifa Zhao and
                  Jianfeng Li and
                  Le Yu and
                  Xiapu Luo and
                  Yajin Zhou and
                  Guofei Gu},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {{SAID:} State-aware Defense Against Injection Attacks on In-vehicle
                  Network},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {1921--1938},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/xue-lei},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/0001LLZLYLZG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/YuLJL0ZZ0GNW22,
  author       = {Le Yu and
                  Yangyang Liu and
                  Pengfei Jing and
                  Xiapu Luo and
                  Lei Xue and
                  Kaifa Zhao and
                  Yajin Zhou and
                  Ting Wang and
                  Guofei Gu and
                  Sen Nie and
                  Shi Wu},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {1939--1956},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/yu-le},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/YuLJL0ZZ0GNW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Chinprutthiwong22,
  author       = {Phakpoom Chinprutthiwong and
                  Jianwei Huang and
                  Guofei Gu},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {{SWAPP:} {A} New Programmable Playground for Web Application Security},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {2029--2046},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/chinprutthiwong},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Chinprutthiwong22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/WalkerMZSG22,
  author       = {Payton Walker and
                  Nathan McClaran and
                  Zihao Zheng and
                  Nitesh Saxena and
                  Guofei Gu},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {BiasHacker: Voice Command Disruption by Exploiting Speaker Biases
                  in Automatic Speech Recognition},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {119--124},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3528558},
  doi          = {10.1145/3507657.3528558},
  timestamp    = {Wed, 11 May 2022 08:49:13 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/WalkerMZSG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/ZhangLXBXGW21,
  author       = {Menghao Zhang and
                  Guanyu Li and
                  Lei Xu and
                  Jiasong Bai and
                  Mingwei Xu and
                  Guofei Gu and
                  Jianping Wu},
  title        = {Control Plane Reflection Attacks and Defenses in Software-Defined
                  Networks},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {29},
  number       = {2},
  pages        = {623--636},
  year         = {2021},
  url          = {https://doi.org/10.1109/TNET.2020.3040773},
  doi          = {10.1109/TNET.2020.3040773},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/ZhangLXBXGW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/LiZWLXCHGLW21,
  author       = {Guanyu Li and
                  Menghao Zhang and
                  Shicheng Wang and
                  Chang Liu and
                  Mingwei Xu and
                  Ang Chen and
                  Hongxin Hu and
                  Guofei Gu and
                  Qi Li and
                  Jianping Wu},
  title        = {Enabling Performant, Flexible and Cost-Efficient DDoS Defense With
                  Programmable Switches},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {29},
  number       = {4},
  pages        = {1509--1526},
  year         = {2021},
  url          = {https://doi.org/10.1109/TNET.2021.3062621},
  doi          = {10.1109/TNET.2021.3062621},
  timestamp    = {Thu, 22 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ton/LiZWLXCHGLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccsw-ws/Gu21,
  author       = {Guofei Gu},
  editor       = {Yinqian Zhang and
                  Marten van Dijk},
  title        = {Programmable Security in the Age of Software-Defined Infrastructure},
  booktitle    = {CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security
                  Workshop, Virtual Event, Republic of Korea, 15 November 2021},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474123.3486765},
  doi          = {10.1145/3474123.3486765},
  timestamp    = {Thu, 12 Oct 2023 12:32:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccsw-ws/Gu21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZhangASHG21,
  author       = {Yangyong Zhang and
                  Sunpreet S. Arora and
                  Maliheh Shirvanian and
                  Jianwei Huang and
                  Guofei Gu},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {Practical Speech Re-use Prevention in Voice-driven Services},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {282--295},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471855},
  doi          = {10.1145/3471621.3471855},
  timestamp    = {Fri, 08 Oct 2021 09:46:25 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ZhangASHG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Chinprutthiwong21,
  author       = {Phakpoom Chinprutthiwong and
                  Raj Vardhan and
                  Guangliang Yang and
                  Yangyong Zhang and
                  Guofei Gu},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {The Service Worker Hiding in Your Browser: The Next Web Attack Target?},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {312--323},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471845},
  doi          = {10.1145/3471621.3471845},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/Chinprutthiwong21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/XueZLZSGZA21,
  author       = {Lei Xue and
                  Hao Zhou and
                  Xiapu Luo and
                  Yajin Zhou and
                  Yang Shi and
                  Guofei Gu and
                  Fengwei Zhang and
                  Man Ho Au},
  title        = {Happer: Unpacking Android Apps via a Hardware-Assisted Approach},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {1641--1658},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00105},
  doi          = {10.1109/SP40001.2021.00105},
  timestamp    = {Thu, 21 Sep 2023 15:57:26 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/XueZLZSGZA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/XiaoHXY0GL21,
  author       = {Feng Xiao and
                  Jianwei Huang and
                  Yichang Xiong and
                  Guangliang Yang and
                  Hong Hu and
                  Guofei Gu and
                  Wenke Lee},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Abusing Hidden Properties to Attack the Node.js Ecosystem},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2951--2968},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/xiao},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/XiaoHXY0GL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-04773,
  author       = {Yangyong Zhang and
                  Maliheh Shirvanian and
                  Sunpreet S. Arora and
                  Jianwei Huang and
                  Guofei Gu},
  title        = {Practical Speech Re-use Prevention in Voice-driven Services},
  journal      = {CoRR},
  volume       = {abs/2101.04773},
  year         = {2021},
  url          = {https://arxiv.org/abs/2101.04773},
  eprinttype    = {arXiv},
  eprint       = {2101.04773},
  timestamp    = {Fri, 22 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2101-04773.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-11526,
  author       = {Raj Vardhan and
                  Ninghao Liu and
                  Phakpoom Chinprutthiwong and
                  Weijie Fu and
                  Zhenyu Hu and
                  Xia Ben Hu and
                  Guofei Gu},
  title        = {ExAD: An Ensemble Approach for Explanation-based Adversarial Detection},
  journal      = {CoRR},
  volume       = {abs/2103.11526},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.11526},
  eprinttype    = {arXiv},
  eprint       = {2103.11526},
  timestamp    = {Wed, 24 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-11526.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Chinprutthiwong20,
  author       = {Phakpoom Chinprutthiwong and
                  Raj Vardhan and
                  Guangliang Yang and
                  Guofei Gu},
  title        = {Security Study of Service Worker Cross-Site Scripting},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {643--654},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427290},
  doi          = {10.1145/3427228.3427290},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Chinprutthiwong20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccsscc/Gu20,
  author       = {Guofei Gu},
  title        = {Your Cybersecurity Is Now Programmable: Experiments on Networking
                  and Blockchain Systems},
  booktitle    = {Proceedings of the 8th International Workshop on Security in Blockchain
                  and Cloud Computing, SBC@AsiaCCS 2020, Virtual Online Conference,
                  October 6, 2020},
  pages        = {2},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3384942.3418745},
  doi          = {10.1145/3384942.3418745},
  timestamp    = {Mon, 16 Nov 2020 15:55:53 +0100},
  biburl       = {https://dblp.org/rec/conf/asiaccsscc/Gu20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangZJPG20,
  author       = {Benyu Zhang and
                  Matei Zaharia and
                  Shouling Ji and
                  Raluca Ada Popa and
                  Guofei Gu},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {{PPMLP} 2020: Workshop on Privacy-Preserving Machine Learning In Practice},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {2139--2140},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3416245},
  doi          = {10.1145/3372297.3416245},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangZJPG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cncert/Yu0LHGZG20,
  author       = {Guorui Yu and
                  Guangliang Yang and
                  Tongxin Li and
                  Xinhui Han and
                  Shijie Guan and
                  Jialong Zhang and
                  Guofei Gu},
  editor       = {Wei Lu and
                  Qiaoyan Wen and
                  Yuqing Zhang and
                  Bo Lang and
                  Weiping Wen and
                  Hanbing Yan and
                  Chao Li and
                  Li Ding and
                  Ruiguang Li and
                  Yu Zhou},
  title        = {MinerGate: {A} Novel Generic and Accurate Defense Solution Against
                  Web Based Cryptocurrency Mining Attacks},
  booktitle    = {Cyber Security - 17th China Annual Conference, {CNCERT} 2020, Beijing,
                  China, August 12, 2020, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1299},
  pages        = {50--70},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-981-33-4922-3\_5},
  doi          = {10.1007/978-981-33-4922-3\_5},
  timestamp    = {Thu, 15 Dec 2022 13:17:06 +0100},
  biburl       = {https://dblp.org/rec/conf/cncert/Yu0LHGZG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/0002CLLGZLZCHTL20,
  author       = {Ting Chen and
                  Rong Cao and
                  Ting Li and
                  Xiapu Luo and
                  Guofei Gu and
                  Yufei Zhang and
                  Zhou Liao and
                  Hang Zhu and
                  Gang Chen and
                  Zheyuan He and
                  Yuxing Tang and
                  Xiaodong Lin and
                  Xiaosong Zhang},
  title        = {{SODA:} {A} Generic Online Detection Framework for Smart Contracts},
  booktitle    = {27th Annual Network and Distributed System Security Symposium, {NDSS}
                  2020, San Diego, California, USA, February 23-26, 2020},
  publisher    = {The Internet Society},
  year         = {2020},
  url          = {https://www.ndss-symposium.org/ndss-paper/soda-a-generic-online-detection-framework-for-smart-contracts/},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/0002CLLGZLZCHTL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/CaoXS0GX20,
  author       = {Jiahao Cao and
                  Renjie Xie and
                  Kun Sun and
                  Qi Li and
                  Guofei Gu and
                  Mingwei Xu},
  title        = {When Match Fields Do Not Need to Match: Buffered Packets Hijacking
                  in {SDN}},
  booktitle    = {27th Annual Network and Distributed System Security Symposium, {NDSS}
                  2020, San Diego, California, USA, February 23-26, 2020},
  publisher    = {The Internet Society},
  year         = {2020},
  url          = {https://www.ndss-symposium.org/ndss-paper/when-match-fields-do-not-need-to-match-buffered-packets-hijacking-in-sdn/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/CaoXS0GX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ZhangLWLCHG0XW20,
  author       = {Menghao Zhang and
                  Guanyu Li and
                  Shicheng Wang and
                  Chang Liu and
                  Ang Chen and
                  Hongxin Hu and
                  Guofei Gu and
                  Qi Li and
                  Mingwei Xu and
                  Jianping Wu},
  title        = {Poseidon: Mitigating Volumetric DDoS Attacks with Programmable Switches},
  booktitle    = {27th Annual Network and Distributed System Security Symposium, {NDSS}
                  2020, San Diego, California, USA, February 23-26, 2020},
  publisher    = {The Internet Society},
  year         = {2020},
  url          = {https://www.ndss-symposium.org/ndss-paper/poseidon-mitigating-volumetric-ddos-attacks-with-programmable-switches/},
  timestamp    = {Thu, 22 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ZhangLWLCHG0XW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/XiaoZHGWL20,
  author       = {Feng Xiao and
                  Jinquan Zhang and
                  Jianwei Huang and
                  Guofei Gu and
                  Dinghao Wu and
                  Peng Liu},
  title        = {Unexpected Data Dependency Creation and Chaining: {A} New Attack to
                  {SDN}},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {1512--1526},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00017},
  doi          = {10.1109/SP40000.2020.00017},
  timestamp    = {Thu, 21 Sep 2023 15:57:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/XiaoZHGWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2020asia,
  editor       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Guofei Gu and
                  Giuseppe Ateniese},
  title        = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications
                  Security, Taipei, Taiwan, October 5-9, 2020},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3320269},
  doi          = {10.1145/3320269},
  isbn         = {978-1-4503-6750-9},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2020asia.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2020ppmlp,
  editor       = {Benyu Zhang and
                  Raluca Ada Popa and
                  Matei Zaharia and
                  Guofei Gu and
                  Shouling Ji},
  title        = {PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine
                  Learning in Practice, Virtual Event, USA, November, 2020},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3411501},
  doi          = {10.1145/3411501},
  isbn         = {978-1-4503-8088-1},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2020ppmlp.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-03283,
  author       = {Jianwei Huang and
                  Vinod Yegneswaran and
                  Phillip A. Porras and
                  Guofei Gu},
  title        = {On the Privacy and Integrity Risks of Contact-Tracing Applications},
  journal      = {CoRR},
  volume       = {abs/2012.03283},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.03283},
  eprinttype    = {arXiv},
  eprint       = {2012.03283},
  timestamp    = {Wed, 09 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-03283.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcan/0029GLH19,
  author       = {Lei Chen and
                  Guofei Gu and
                  Wenjia Li and
                  Rami J. Haddad},
  title        = {Editorial: special issue on "The security, privacy, and digital
                  forensics of mobile networks and mobile cloud"},
  journal      = {Digit. Commun. Networks},
  volume       = {5},
  number       = {4},
  pages        = {203--204},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.dcan.2019.11.002},
  doi          = {10.1016/J.DCAN.2019.11.002},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcan/0029GLH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AhnGHS19,
  author       = {Gail{-}Joon Ahn and
                  Guofei Gu and
                  Hongxin Hu and
                  Seungwon Shin},
  title        = {Guest Editors' Introduction: Special Section on Security in Emerging
                  Networking Technologies},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {16},
  number       = {6},
  pages        = {913--914},
  year         = {2019},
  url          = {https://doi.org/10.1109/TDSC.2019.2906921},
  doi          = {10.1109/TDSC.2019.2906921},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/AhnGHS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AltaweelSGM19,
  author       = {Ala Altaweel and
                  Radu Stoleru and
                  Guofei Gu and
                  Arnab Kumar Maity},
  title        = {CollusiveHijack: {A} New Route Hijacking Attack and Countermeasures
                  in Opportunistic Networks},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {73--81},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802699},
  doi          = {10.1109/CNS.2019.8802699},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AltaweelSGM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/LiZLKCGD19,
  author       = {Guanyu Li and
                  Menghao Zhang and
                  Chang Liu and
                  Xiao Kong and
                  Ang Chen and
                  Guofei Gu and
                  Haixin Duan},
  title        = {{NETHCF:} Enabling Line-rate and Adaptive Spoofed {IP} Traffic Filtering},
  booktitle    = {27th {IEEE} International Conference on Network Protocols, {ICNP}
                  2019, Chicago, IL, USA, October 8-10, 2019},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICNP.2019.8888057},
  doi          = {10.1109/ICNP.2019.8888057},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icnp/LiZLKCGD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ZhangXMYCG19,
  author       = {Yangyong Zhang and
                  Lei Xu and
                  Abner Mendoza and
                  Guangliang Yang and
                  Phakpoom Chinprutthiwong and
                  Guofei Gu},
  title        = {Life after Speech Recognition: Fuzzing Semantic Misinterpretation
                  for Voice Assistant Applications},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/life-after-speech-recognition-fuzzing-semantic-misinterpretation-for-voice-assistant-applications/},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ZhangXMYCG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Cao0XSGX019,
  author       = {Jiahao Cao and
                  Qi Li and
                  Renjie Xie and
                  Kun Sun and
                  Guofei Gu and
                  Mingwei Xu and
                  Yuan Yang},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {The CrossPath Attack: Disrupting the {SDN} Control Channel via Shared
                  Links},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {19--36},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/cao},
  timestamp    = {Mon, 01 Feb 2021 08:43:12 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Cao0XSGX019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Yang0G19,
  author       = {Guangliang Yang and
                  Jeff Huang and
                  Guofei Gu},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {Iframes/Popups Are Dangerous in Mobile WebView: Studying and Mitigating
                  Differential Context Vulnerabilities},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {977--994},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/yang-guangliang},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Yang0G19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2019sdn-nfv,
  editor       = {Gail{-}Joon Ahn and
                  Guofei Gu and
                  Hongxin Hu and
                  Seungwon Shin},
  title        = {SDN-NFV@CODASPY 2019 - roceedings of the {ACM} International Workshop
                  on Security in Software Defined Networks {\&} Network Function
                  Virtualization, Richardson, TX, USA, March 27, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3309194},
  doi          = {10.1145/3309194},
  isbn         = {978-1-4503-6179-8},
  timestamp    = {Fri, 25 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/2019sdn-nfv.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/HausheerHSG18,
  author       = {David Hausheer and
                  Oliver Hohlfeld and
                  Stefan Schmid and
                  Guofei Gu},
  title        = {Security and performance of software-defined networks and functions
                  virtualization},
  journal      = {Comput. Networks},
  volume       = {138},
  pages        = {15--17},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.comnet.2018.03.025},
  doi          = {10.1016/J.COMNET.2018.03.025},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/HausheerHSG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HanLNGX18,
  author       = {Weili Han and
                  Zhigong Li and
                  Minyue Ni and
                  Guofei Gu and
                  Wenyuan Xu},
  title        = {Shadow Attacks Based on Password Reuses: {A} Quantitative Empirical
                  Analysis},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {15},
  number       = {2},
  pages        = {309--320},
  year         = {2018},
  url          = {https://doi.org/10.1109/TDSC.2016.2568187},
  doi          = {10.1109/TDSC.2016.2568187},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HanLNGX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhengLGCYW18,
  author       = {Jing Zheng and
                  Qi Li and
                  Guofei Gu and
                  Jiahao Cao and
                  David K. Y. Yau and
                  Jianping Wu},
  title        = {Realtime DDoS Defense Using {COTS} {SDN} Switches via Adaptive Correlation
                  Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {7},
  pages        = {1838--1853},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2805600},
  doi          = {10.1109/TIFS.2018.2805600},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhengLGCYW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XueMLCMG18,
  author       = {Lei Xue and
                  Xiaobo Ma and
                  Xiapu Luo and
                  Edmond W. W. Chan and
                  TungNgai Miu and
                  Guofei Gu},
  title        = {LinkScope: Toward Detecting Target Link Flooding Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {10},
  pages        = {2423--2438},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2815555},
  doi          = {10.1109/TIFS.2018.2815555},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XueMLCMG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangYCXZG18,
  author       = {Haopei Wang and
                  Guangliang Yang and
                  Phakpoom Chinprutthiwong and
                  Lei Xu and
                  Yangyong Zhang and
                  Guofei Gu},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {Towards Fine-grained Network Security Forensics and Diagnosis in the
                  {SDN} Era},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {3--16},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243749},
  doi          = {10.1145/3243734.3243749},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WangYCXZG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiHGAZ18,
  author       = {Hongda Li and
                  Hongxin Hu and
                  Guofei Gu and
                  Gail{-}Joon Ahn and
                  Fuqiang Zhang},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {vNIDS: Towards Elastic Security with Safe and Efficient Virtualization
                  of Network Intrusion Detection Systems},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {17--34},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243862},
  doi          = {10.1145/3243734.3243862},
  timestamp    = {Mon, 12 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LiHGAZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/SkowyraXGDHOL18,
  author       = {Richard Skowyra and
                  Lei Xu and
                  Guofei Gu and
                  Veer Dedhia and
                  Thomas Hobson and
                  Hamed Okhravi and
                  James Landry},
  title        = {Effective Topology Tampering Attacks and Defenses in Software-Defined
                  Networks},
  booktitle    = {48th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2018, Luxembourg City, Luxembourg, June 25-28,
                  2018},
  pages        = {374--385},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/DSN.2018.00047},
  doi          = {10.1109/DSN.2018.00047},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/SkowyraXGDHOL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/ShinXKG18,
  author       = {Seungwon Shin and
                  Zhaoyan Xu and
                  Yeonkeun Kim and
                  Guofei Gu},
  title        = {CloudRand: Building Heterogeneous and Moving-Target Network Interfaces},
  booktitle    = {27th International Conference on Computer Communication and Networks,
                  {ICCCN} 2018, Hangzhou, China, July 30 - August 2, 2018},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICCCN.2018.8487356},
  doi          = {10.1109/ICCCN.2018.8487356},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/ShinXKG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Yang0G18,
  author       = {Guangliang Yang and
                  Jeff Huang and
                  Guofei Gu},
  title        = {Automated Generation of Event-Oriented Exploits in Android Hybrid
                  Apps},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_04B-3\_Yang\_paper.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/Yang0G18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZhangLXBGB18,
  author       = {Menghao Zhang and
                  Guanyu Li and
                  Lei Xu and
                  Jun Bi and
                  Guofei Gu and
                  Jiasong Bai},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {Control Plane Reflection Attacks in SDNs: New Attacks and Countermeasures},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {161--183},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_8},
  doi          = {10.1007/978-3-030-00470-5\_8},
  timestamp    = {Mon, 20 Nov 2023 09:00:29 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/ZhangLXBGB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZhangJGS018,
  author       = {Jialong Zhang and
                  Jiyong Jang and
                  Guofei Gu and
                  Marc Ph. Stoecklin and
                  Xin Hu},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {Error-Sensor: Mining Information from {HTTP} Error Traffic for Malware
                  Intelligence},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {467--489},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_22},
  doi          = {10.1007/978-3-030-00470-5\_22},
  timestamp    = {Fri, 07 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ZhangJGS018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Yang0GM18,
  author       = {Guangliang Yang and
                  Jeff Huang and
                  Guofei Gu and
                  Abner Mendoza},
  title        = {Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage
                  Enabled Mobile Applications},
  booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  pages        = {742--755},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SP.2018.00043},
  doi          = {10.1109/SP.2018.00043},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/Yang0GM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MendozaG18,
  author       = {Abner Mendoza and
                  Guofei Gu},
  title        = {Mobile Application Web {API} Reconnaissance: Web-to-Mobile Inconsistencies
                  {\&} Vulnerabilities},
  booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  pages        = {756--769},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SP.2018.00039},
  doi          = {10.1109/SP.2018.00039},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/MendozaG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/MendozaCG18,
  author       = {Abner Mendoza and
                  Phakpoom Chinprutthiwong and
                  Guofei Gu},
  editor       = {Pierre{-}Antoine Champin and
                  Fabien Gandon and
                  Mounia Lalmas and
                  Panagiotis G. Ipeirotis},
  title        = {Uncovering {HTTP} Header Inconsistencies and the Impact on Desktop/Mobile
                  Websites},
  booktitle    = {Proceedings of the 2018 World Wide Web Conference on World Wide Web,
                  {WWW} 2018, Lyon, France, April 23-27, 2018},
  pages        = {247--256},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3178876.3186091},
  doi          = {10.1145/3178876.3186091},
  timestamp    = {Fri, 16 Apr 2021 10:04:12 +0200},
  biburl       = {https://dblp.org/rec/conf/www/MendozaCG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2018sdn-nfv,
  editor       = {Gail{-}Joon Ahn and
                  Guofei Gu and
                  Hongxin Hu and
                  Seungwon Shin},
  title        = {Proceedings of the 2018 {ACM} International Workshop on Security in
                  Software Defined Networks {\&} Network Function Virtualization,
                  SDN-NFVSec@CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {http://dl.acm.org/citation.cfm?id=3180465},
  timestamp    = {Sun, 18 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/2018sdn-nfv.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NanYYZZGWS17,
  author       = {Yuhong Nan and
                  Zhemin Yang and
                  Min Yang and
                  Shunfan Zhou and
                  Yuan Zhang and
                  Guofei Gu and
                  Xiaofeng Wang and
                  Limin Sun},
  title        = {Identifying User-Input Privacy in Mobile Applications at a Large Scale},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {3},
  pages        = {647--661},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2631949},
  doi          = {10.1109/TIFS.2016.2631949},
  timestamp    = {Sat, 09 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/NanYYZZGWS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/YoonLKPSYPG17,
  author       = {Changhoon Yoon and
                  Seungsoo Lee and
                  Heedo Kang and
                  Taejune Park and
                  Seungwon Shin and
                  Vinod Yegneswaran and
                  Phillip A. Porras and
                  Guofei Gu},
  title        = {Flow Wars: Systemizing the Attack Surface and Defenses in Software-Defined
                  Networks},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {25},
  number       = {6},
  pages        = {3514--3530},
  year         = {2017},
  url          = {https://doi.org/10.1109/TNET.2017.2748159},
  doi          = {10.1109/TNET.2017.2748159},
  timestamp    = {Wed, 18 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/YoonLKPSYPG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsys/GuHKLP17,
  author       = {Guofei Gu and
                  Hongxin Hu and
                  Eric Keller and
                  Zhiqiang Lin and
                  Donald E. Porter},
  title        = {Building a Security {OS} With Software Defined Infrastructure},
  booktitle    = {Proceedings of the 8th Asia-Pacific Workshop on Systems, Mumbai, India,
                  September 2, 2017},
  pages        = {4:1--4:8},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3124680.3124720},
  doi          = {10.1145/3124680.3124720},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apsys/GuHKLP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/AltaweelSG17,
  author       = {Ala Altaweel and
                  Radu Stoleru and
                  Guofei Gu},
  title        = {EvilDirect: {A} New Wi-Fi Direct Hijacking Attack and Countermeasures},
  booktitle    = {26th International Conference on Computer Communication and Networks,
                  {ICCCN} 2017, Vancouver, BC, Canada, July 31 - Aug. 3, 2017},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICCCN.2017.8038416},
  doi          = {10.1109/ICCCN.2017.8038416},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/AltaweelSG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/YangZG17,
  author       = {Chao Yang and
                  Jialong Zhang and
                  Guofei Gu},
  editor       = {Kisung Lee and
                  Ling Liu},
  title        = {Understanding the Market-Level and Network-Level Behaviors of the
                  Android Malware Ecosystem},
  booktitle    = {37th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017},
  pages        = {2452--2457},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICDCS.2017.297},
  doi          = {10.1109/ICDCS.2017.297},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/YangZG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/WangSXHG17,
  author       = {Haopei Wang and
                  Abhinav Srivastava and
                  Lei Xu and
                  Sungmin Hong and
                  Guofei Gu},
  title        = {Bring your own controller: Enabling tenant-defined {SDN} apps in IaaS
                  clouds},
  booktitle    = {2017 {IEEE} Conference on Computer Communications, {INFOCOM} 2017,
                  Atlanta, GA, USA, May 1-4, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/INFOCOM.2017.8057137},
  doi          = {10.1109/INFOCOM.2017.8057137},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/WangSXHG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/YangMZG17,
  author       = {Guangliang Yang and
                  Abner Mendoza and
                  Jialong Zhang and
                  Guofei Gu},
  editor       = {Marc Dacier and
                  Michael D. Bailey and
                  Michalis Polychronakis and
                  Manos Antonakakis},
  title        = {Precisely and Scalably Vetting JavaScript Bridge in Android Hybrid
                  Apps},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 20th International
                  Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10453},
  pages        = {143--166},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66332-6\_7},
  doi          = {10.1007/978-3-319-66332-6\_7},
  timestamp    = {Mon, 20 Nov 2023 09:00:29 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/YangMZG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/XueZCLG17,
  author       = {Lei Xue and
                  Yajin Zhou and
                  Ting Chen and
                  Xiapu Luo and
                  Guofei Gu},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for
                  {ART}},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {289--306},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/xue},
  timestamp    = {Mon, 01 Feb 2021 08:42:59 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/XueZCLG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/XuHHZG17,
  author       = {Lei Xu and
                  Jeff Huang and
                  Sungmin Hong and
                  Jialong Zhang and
                  Guofei Gu},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {Attacking the Brain: Races in the {SDN} Control Plane},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {451--468},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/xu-lei},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/XuHHZG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2017sdn-nfv,
  editor       = {Gail{-}Joon Ahn and
                  Guofei Gu and
                  Hongxin Hu and
                  Seungwon Shin},
  title        = {Proceedings of the {ACM} International Workshop on Security in Software
                  Defined Networks {\&} Network Function Virtualization, SDN-NFVSec@CODASPY
                  2017, Scottsdale, Arizona, USA, March 24, 2017},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3040992},
  doi          = {10.1145/3040992},
  isbn         = {978-1-4503-4908-6},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/2017sdn-nfv.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HassanzadehXSGP16,
  author       = {Amin Hassanzadeh and
                  Zhaoyan Xu and
                  Radu Stoleru and
                  Guofei Gu and
                  Michalis Polychronakis},
  title        = {{PRIDE:} {A} practical intrusion detection system for resource constrained
                  wireless mesh networks},
  journal      = {Comput. Secur.},
  volume       = {62},
  pages        = {114--132},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.06.007},
  doi          = {10.1016/J.COSE.2016.06.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HassanzadehXSGP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangYG016,
  author       = {Yuan Zhang and
                  Min Yang and
                  Guofei Gu and
                  Hao Chen},
  title        = {Rethinking Permission Enforcement Mechanism on Mobile Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {10},
  pages        = {2227--2240},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2581304},
  doi          = {10.1109/TIFS.2016.2581304},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangYG016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/ShinXHG16,
  author       = {Seungwon Shin and
                  Lei Xu and
                  Sungmin Hong and
                  Guofei Gu},
  title        = {Enhancing Network Security through Software Defined Networking {(SDN)}},
  booktitle    = {25th International Conference on Computer Communication and Networks,
                  {ICCCN} 2016, Waikoloa, HI, USA, August 1-4, 2016},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICCCN.2016.7568520},
  doi          = {10.1109/ICCCN.2016.7568520},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/ShinXHG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ZhangHJWGS16,
  author       = {Jialong Zhang and
                  Xin Hu and
                  Jiyong Jang and
                  Ting Wang and
                  Guofei Gu and
                  Marc Ph. Stoecklin},
  title        = {Hunting for invisibility: Characterizing and detecting malicious web
                  infrastructures through server visibility analysis},
  booktitle    = {35th Annual {IEEE} International Conference on Computer Communications,
                  {INFOCOM} 2016, San Francisco, CA, USA, April 10-14, 2016},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/INFOCOM.2016.7524582},
  doi          = {10.1109/INFOCOM.2016.7524582},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ZhangHJWGS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/HongBXNG16,
  author       = {Sungmin Hong and
                  Robert Baykov and
                  Lei Xu and
                  Srinath Nadimpalli and
                  Guofei Gu},
  title        = {Towards SDN-Defined Programmable {BYOD} (Bring Your Own Device) Security},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/towards-sdn-defined-programmable-bring-your-own-device-security.pdf},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/HongBXNG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2016sdn-nfv,
  editor       = {Gail{-}Joon Ahn and
                  Guofei Gu and
                  Hongxin Hu and
                  Seungwon Shin},
  title        = {Proceedings of the 2016 {ACM} International Workshop on Security in
                  Software Defined Networks {\&} Network Function Virtualization,
                  SDN-NFV@CODASPY 2016, New Orleans, LA, USA, March 11, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2876019},
  isbn         = {978-1-4503-4078-6},
  timestamp    = {Tue, 15 Mar 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/2016sdn-nfv.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/micro/QianLLG15,
  author       = {Chenxiong Qian and
                  Xiapu Luo and
                  Le Yu and
                  Guofei Gu},
  title        = {VulHunter: Toward Discovering Vulnerabilities in Android Applications},
  journal      = {{IEEE} Micro},
  volume       = {35},
  number       = {1},
  pages        = {44--53},
  year         = {2015},
  url          = {https://doi.org/10.1109/MM.2015.25},
  doi          = {10.1109/MM.2015.25},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/micro/QianLLG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShinWG15,
  author       = {Seungwon Shin and
                  Haopei Wang and
                  Guofei Gu},
  title        = {A First Step Toward Network Security Virtualization: From Concept
                  To Prototype},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {10},
  pages        = {2236--2249},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2453936},
  doi          = {10.1109/TIFS.2015.2453936},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ShinWG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/YuGBGS15,
  author       = {Shui Yu and
                  Guofei Gu and
                  Ahmed Barnawi and
                  Song Guo and
                  Ivan Stojmenovic},
  title        = {Malware Propagation in Large-Scale Networks},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {27},
  number       = {1},
  pages        = {170--179},
  year         = {2015},
  url          = {https://doi.org/10.1109/TKDE.2014.2320725},
  doi          = {10.1109/TKDE.2014.2320725},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tkde/YuGBGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/WangXG15,
  author       = {Haopei Wang and
                  Lei Xu and
                  Guofei Gu},
  title        = {FloodGuard: {A} DoS Attack Prevention Extension in Software-Defined
                  Networks},
  booktitle    = {45th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2015, Rio de Janeiro, Brazil, June 22-25, 2015},
  pages        = {239--250},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/DSN.2015.27},
  doi          = {10.1109/DSN.2015.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/WangXG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/ZhangSGLM15,
  author       = {Jialong Zhang and
                  Sabyasachi Saha and
                  Guofei Gu and
                  Sung{-}Ju Lee and
                  Marco Mellia},
  title        = {Systematic Mining of Associated Server Herds for Malware Campaign
                  Discovery},
  booktitle    = {35th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2015, Columbus, OH, USA, June 29 - July 2, 2015},
  pages        = {630--641},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICDCS.2015.70},
  doi          = {10.1109/ICDCS.2015.70},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/ZhangSGLM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/MendozaSG15,
  author       = {Abner Mendoza and
                  Kapil Singh and
                  Guofei Gu},
  title        = {What is wrecking your data plan? {A} measurement study of mobile web
                  overhead},
  booktitle    = {2015 {IEEE} Conference on Computer Communications, {INFOCOM} 2015,
                  Kowloon, Hong Kong, April 26 - May 1, 2015},
  pages        = {2740--2748},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INFOCOM.2015.7218666},
  doi          = {10.1109/INFOCOM.2015.7218666},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/MendozaSG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/HongXWG15,
  author       = {Sungmin Hong and
                  Lei Xu and
                  Haopei Wang and
                  Guofei Gu},
  title        = {Poisoning Network Visibility in Software-Defined Networks: New Attacks
                  and Countermeasures},
  booktitle    = {22nd Annual Network and Distributed System Security Symposium, {NDSS}
                  2015, San Diego, California, USA, February 8-11, 2015},
  publisher    = {The Internet Society},
  year         = {2015},
  url          = {https://www.ndss-symposium.org/ndss2015/poisoning-network-visibility-software-defined-networks-new-attacks-and-countermeasures},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/HongXWG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ZhangYGC15,
  author       = {Yuan Zhang and
                  Min Yang and
                  Guofei Gu and
                  Hao Chen},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {FineDroid: Enforcing Permissions with System-Wide Application Execution
                  Context},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_1},
  doi          = {10.1007/978-3-319-28865-9\_1},
  timestamp    = {Wed, 29 Jun 2022 15:37:43 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/ZhangYGC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/YangYGYTG15,
  author       = {Chao Yang and
                  Guangliang Yang and
                  Ashish Gehani and
                  Vinod Yegneswaran and
                  Dawood Tariq and
                  Guofei Gu},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {58--77},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_4},
  doi          = {10.1007/978-3-319-28865-9\_4},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/YangYGYTG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/NanYYZGW15,
  author       = {Yuhong Nan and
                  Min Yang and
                  Zhemin Yang and
                  Shunfan Zhou and
                  Guofei Gu and
                  Xiaofeng Wang},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {UIPicker: User-Input Privacy Identification in Mobile Applications},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {993--1008},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/nan},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/NanYYZGW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangYYGNZ14,
  author       = {Yuan Zhang and
                  Min Yang and
                  Zhemin Yang and
                  Guofei Gu and
                  Peng Ning and
                  Binyu Zang},
  title        = {Permission Use Analysis for Vetting Undesirable Behaviors in Android
                  Apps},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {9},
  number       = {11},
  pages        = {1828--1842},
  year         = {2014},
  url          = {https://doi.org/10.1109/TIFS.2014.2347206},
  doi          = {10.1109/TIFS.2014.2347206},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangYYGNZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YangZG14,
  author       = {Chao Yang and
                  Jialong Zhang and
                  Guofei Gu},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {A taste of tweets: reverse engineering Twitter spammers},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {86--95},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664258},
  doi          = {10.1145/2664243.2664258},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/YangZG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuNBYCG14,
  author       = {Zhaoyan Xu and
                  Antonio Nappa and
                  Robert Baykov and
                  Guangliang Yang and
                  Juan Caballero and
                  Guofei Gu},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {{AUTOPROBE:} Towards Automatic Active Malicious Server Probing Using
                  Dynamic Binary Analysis},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {179--190},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660352},
  doi          = {10.1145/2660267.2660352},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XuNBYCG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/YangXGYP14,
  author       = {Chao Yang and
                  Zhaoyan Xu and
                  Guofei Gu and
                  Vinod Yegneswaran and
                  Phillip A. Porras},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {DroidMiner: Automated Mining and Characterization of Fine-grained
                  Malicious Behaviors in Android Applications},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8712},
  pages        = {163--182},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11203-9\_10},
  doi          = {10.1007/978-3-319-11203-9\_10},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/YangXGYP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WangXZXWG14,
  author       = {Yong Wang and
                  Zhaoyan Xu and
                  Jialong Zhang and
                  Lei Xu and
                  Haopei Wang and
                  Guofei Gu},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {{SRID:} State Relation Based Intrusion Detection for False Data Injection
                  Attacks in {SCADA}},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {401--418},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_23},
  doi          = {10.1007/978-3-319-11212-1\_23},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WangXZXWG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/NappaXRCG14,
  author       = {Antonio Nappa and
                  Zhaoyan Xu and
                  M. Zubair Rafique and
                  Juan Caballero and
                  Guofei Gu},
  title        = {CyberProbe: Towards Internet-Scale Active Detection of Malicious Servers},
  booktitle    = {21st Annual Network and Distributed System Security Symposium, {NDSS}
                  2014, San Diego, California, USA, February 23-26, 2014},
  publisher    = {The Internet Society},
  year         = {2014},
  url          = {https://www.ndss-symposium.org/ndss2014/cyberprobe-towards-internet-scale-active-detection-malicious-servers},
  timestamp    = {Mon, 01 Feb 2021 08:42:18 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/NappaXRCG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/XuZGL14,
  author       = {Zhaoyan Xu and
                  Jialong Zhang and
                  Guofei Gu and
                  Zhiqiang Lin},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {GoldenEye: Efficiently and Effectively Unveiling Malware's Targeted
                  Environment},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {22--45},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_2},
  doi          = {10.1007/978-3-319-11379-1\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/XuZGL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/CaoYRCG14,
  author       = {Yinzhi Cao and
                  Chao Yang and
                  Vaibhav Rastogi and
                  Yan Chen and
                  Guofei Gu},
  editor       = {Jing Tian and
                  Jiwu Jing and
                  Mudhakar Srivatsa},
  title        = {Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation
                  of Add-On Cross Site Scripting Attacks},
  booktitle    = {International Conference on Security and Privacy in Communication
                  Networks - 10th International {ICST} Conference, SecureComm 2014,
                  Beijing, China, September 24-26, 2014, Revised Selected Papers, Part
                  {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {152},
  pages        = {582--601},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-23829-6\_45},
  doi          = {10.1007/978-3-319-23829-6\_45},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/CaoYRCG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ZhangNG14,
  author       = {Jialong Zhang and
                  Jayant Notani and
                  Guofei Gu},
  editor       = {Jing Tian and
                  Jiwu Jing and
                  Mudhakar Srivatsa},
  title        = {Characterizing Google Hacking: {A} First Large-Scale Quantitative
                  Study},
  booktitle    = {International Conference on Security and Privacy in Communication
                  Networks - 10th International {ICST} Conference, SecureComm 2014,
                  Beijing, China, September 24-26, 2014, Revised Selected Papers, Part
                  {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {152},
  pages        = {602--622},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-23829-6\_46},
  doi          = {10.1007/978-3-319-23829-6\_46},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/ZhangNG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/SallesGS13,
  author       = {Ronaldo M. Salles and
                  Guofei Gu and
                  Morton Swimmer},
  title        = {Editorial for Computer Networks special issue on ''Botnet Activity:
                  Analysis, Detection and Shutdown''},
  journal      = {Comput. Networks},
  volume       = {57},
  number       = {2},
  pages        = {375--377},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.comnet.2012.08.008},
  doi          = {10.1016/J.COMNET.2012.08.008},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/SallesGS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ShinXG13,
  author       = {Seungwon Shin and
                  Zhaoyan Xu and
                  Guofei Gu},
  title        = {{EFFORT:} {A} new host-network cooperated framework for efficient
                  and effective bot malware detection},
  journal      = {Comput. Networks},
  volume       = {57},
  number       = {13},
  pages        = {2628--2642},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.comnet.2013.05.010},
  doi          = {10.1016/J.COMNET.2013.05.010},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/ShinXG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangHG13,
  author       = {Chao Yang and
                  Robert Chandler Harkreader and
                  Guofei Gu},
  title        = {Empirical Evaluation and New Design for Fighting Evolving Twitter
                  Spammers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {8},
  number       = {8},
  pages        = {1280--1293},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIFS.2013.2267732},
  doi          = {10.1109/TIFS.2013.2267732},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangHG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShinYPG13,
  author       = {Seungwon Shin and
                  Vinod Yegneswaran and
                  Phillip A. Porras and
                  Guofei Gu},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {{AVANT-GUARD:} scalable and vigilant switch flow management in software-defined
                  networks},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {413--424},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516684},
  doi          = {10.1145/2508859.2516684},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ShinYPG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangYXYGNWZ13,
  author       = {Yuan Zhang and
                  Min Yang and
                  Bingquan Xu and
                  Zhemin Yang and
                  Guofei Gu and
                  Peng Ning and
                  Xiaoyang Sean Wang and
                  Binyu Zang},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Vetting undesirable behaviors in android apps with permission use
                  analysis},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {611--622},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516689},
  doi          = {10.1145/2508859.2516689},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangYXYGNWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YangYZGNW13,
  author       = {Zhemin Yang and
                  Min Yang and
                  Yuan Zhang and
                  Guofei Gu and
                  Peng Ning and
                  Xiaoyang Sean Wang},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {AppIntent: analyzing sensitive data transmission in android for privacy
                  leakage detection},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {1043--1054},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516676},
  doi          = {10.1145/2508859.2516676},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YangYZGNW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/VikramYG13,
  author       = {Shardul Vikram and
                  Chao Yang and
                  Guofei Gu},
  title        = {{NOMAD:} Towards non-intrusive moving-target defense against web bots},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {55--63},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682692},
  doi          = {10.1109/CNS.2013.6682692},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/VikramYG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comsnets/AmleshwaramRYGY13,
  author       = {Amit A. Amleshwaram and
                  A. L. Narasimha Reddy and
                  Sandeep Yadav and
                  Guofei Gu and
                  Chao Yang},
  title        = {{CATS:} Characterizing automation of Twitter spammers},
  booktitle    = {Fifth International Conference on Communication Systems and Networks,
                  {COMSNETS} 2013, Bangalore, India, January 7-10, 2013},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/COMSNETS.2013.6465541},
  doi          = {10.1109/COMSNETS.2013.6465541},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/comsnets/AmleshwaramRYGY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/SonSYPG13,
  author       = {Sooel Son and
                  Seungwon Shin and
                  Vinod Yegneswaran and
                  Phillip A. Porras and
                  Guofei Gu},
  title        = {Model checking invariant security properties in OpenFlow},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2013, Budapest, Hungary, June 9-13, 2013},
  pages        = {1974--1979},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICC.2013.6654813},
  doi          = {10.1109/ICC.2013.6654813},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/SonSYPG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/XuZGL13,
  author       = {Zhaoyan Xu and
                  Jialong Zhang and
                  Guofei Gu and
                  Zhiqiang Lin},
  title        = {{AUTOVAC:} Automatically Extracting System Resource Constraints and
                  Generating Vaccines for Malware Immunization},
  booktitle    = {{IEEE} 33rd International Conference on Distributed Computing Systems,
                  {ICDCS} 2013, 8-11 July, 2013, Philadelphia, Pennsylvania, {USA}},
  pages        = {112--123},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICDCS.2013.69},
  doi          = {10.1109/ICDCS.2013.69},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/XuZGL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/HassanzadehXSGP13,
  author       = {Amin Hassanzadeh and
                  Zhaoyan Xu and
                  Radu Stoleru and
                  Guofei Gu and
                  Michalis Polychronakis},
  editor       = {Sihan Qing and
                  Jianying Zhou and
                  Dongmei Liu},
  title        = {{PRIDE:} Practical Intrusion Detection in Resource Constrained Wireless
                  Mesh Networks},
  booktitle    = {Information and Communications Security - 15th International Conference,
                  {ICICS} 2013, Beijing, China, November 20-22, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8233},
  pages        = {213--228},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02726-5\_16},
  doi          = {10.1007/978-3-319-02726-5\_16},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/HassanzadehXSGP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ShinPYFGT13,
  author       = {Seungwon Shin and
                  Phillip A. Porras and
                  Vinod Yegneswaran and
                  Martin W. Fong and
                  Guofei Gu and
                  Mabry Tyson},
  title        = {{FRESCO:} Modular Composable Security Services for Software-Defined
                  Networks},
  booktitle    = {20th Annual Network and Distributed System Security Symposium, {NDSS}
                  2013, San Diego, California, USA, February 24-27, 2013},
  publisher    = {The Internet Society},
  year         = {2013},
  url          = {https://www.ndss-symposium.org/ndss2013/fresco-modular-composable-security-services-software-defined-networks},
  timestamp    = {Mon, 01 Feb 2021 08:42:13 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ShinPYFGT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ZhangG13,
  author       = {Jialong Zhang and
                  Guofei Gu},
  title        = {{NEIGHBORWATCHER:} {A} Content-Agnostic Comment Spam Inference System},
  booktitle    = {20th Annual Network and Distributed System Security Symposium, {NDSS}
                  2013, San Diego, California, USA, February 24-27, 2013},
  publisher    = {The Internet Society},
  year         = {2013},
  url          = {https://www.ndss-symposium.org/ndss2013/neighborwatcher-content-agnostic-comment-spam-inference-system},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ZhangG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/ShinG13,
  author       = {Seungwon Shin and
                  Guofei Gu},
  editor       = {Nate Foster and
                  Rob Sherwood},
  title        = {Attacking software-defined networks: a first feasibility study},
  booktitle    = {Proceedings of the Second {ACM} {SIGCOMM} Workshop on Hot Topics in
                  Software Defined Networking, HotSDN 2013, The Chinese University of
                  Hong Kong, Hong Kong, China, Friday, August 16, 2013},
  pages        = {165--166},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2491185.2491220},
  doi          = {10.1145/2491185.2491220},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/ShinG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HandLGT12,
  author       = {Scott Hand and
                  Zhiqiang Lin and
                  Guofei Gu and
                  Bhavani Thuraisingham},
  title        = {Bin-Carver: Automatic recovery of binary executable files},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {Supplement},
  pages        = {S108--S117},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.05.014},
  doi          = {10.1016/J.DIIN.2012.05.014},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HandLGT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShinGRL12,
  author       = {Seungwon Shin and
                  Guofei Gu and
                  A. L. Narasimha Reddy and
                  Christopher P. Lee},
  title        = {A Large-Scale Empirical Study of Conficker},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {7},
  number       = {2},
  pages        = {676--690},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIFS.2011.2173486},
  doi          = {10.1109/TIFS.2011.2173486},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ShinGRL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangSG12,
  author       = {Chao Yang and
                  Yimin Song and
                  Guofei Gu},
  title        = {Active User-Side Evil Twin Access Point Detection Using Statistical
                  Techniques},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {7},
  number       = {5},
  pages        = {1638--1651},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIFS.2012.2207383},
  doi          = {10.1109/TIFS.2012.2207383},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangSG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/MaDLGL12,
  author       = {Weiqin Ma and
                  Pu Duan and
                  Sanmin Liu and
                  Guofei Gu and
                  Jyh{-}Charn Liu},
  title        = {Shadow attacks: automatically evading system-call-behavior based malware
                  detection},
  journal      = {J. Comput. Virol.},
  volume       = {8},
  number       = {1-2},
  pages        = {1--13},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11416-011-0157-5},
  doi          = {10.1007/S11416-011-0157-5},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/MaDLGL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Gu12,
  author       = {Guofei Gu},
  editor       = {Ting Yu and
                  V. N. Venkatakrishan and
                  Apu Kapadia},
  title        = {Machine learning meets social networking security: detecting and analyzing
                  malicious social networks for fun and profit},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2012, Raleigh, NC, USA, October 19, 2012},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381896.2381898},
  doi          = {10.1145/2381896.2381898},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Gu12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhengZDGGHZ12,
  author       = {Cong Zheng and
                  Shixiong Zhu and
                  Shuaifu Dai and
                  Guofei Gu and
                  Xiaorui Gong and
                  Xinhui Han and
                  Wei Zou},
  editor       = {Ting Yu and
                  William Enck and
                  Xuxian Jiang},
  title        = {SmartDroid: an automatic system for revealing UI-based trigger conditions
                  in android applications},
  booktitle    = {SPSM'12, Proceedings of the Workshop on Security and Privacy in Smartphones
                  and Mobile Devices, Co-located with {CCS} 2012, October 19, 2012,
                  Raleigh, NC, {USA}},
  pages        = {93--104},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381934.2381950},
  doi          = {10.1145/2381934.2381950},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhengZDGGHZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuCGK12,
  author       = {Zhaoyan Xu and
                  Lingfeng Chen and
                  Guofei Gu and
                  Christopher Kruegel},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {PeerPress: utilizing enemies' {P2P} strength against them},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {581--592},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382257},
  doi          = {10.1145/2382196.2382257},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/XuCGK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YangYPG12,
  author       = {Chao Yang and
                  Vinod Yegneswaran and
                  Phillip A. Porras and
                  Guofei Gu},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Detecting money-stealing apps in alternative Android markets},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1034--1036},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382316},
  doi          = {10.1145/2382196.2382316},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YangYPG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuZGL12,
  author       = {Zhaoyan Xu and
                  Jialong Zhang and
                  Guofei Gu and
                  Zhiqiang Lin},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Automatic generation of vaccines for malware immunization},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1037--1039},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382317},
  doi          = {10.1145/2382196.2382317},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XuZGL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/ShinG12,
  author       = {Seungwon Shin and
                  Guofei Gu},
  title        = {CloudWatcher: Network security monitoring using OpenFlow in dynamic
                  cloud networks (or: How to provide security monitoring as a service
                  in clouds?)},
  booktitle    = {20th {IEEE} International Conference on Network Protocols, {ICNP}
                  2012, Austin, TX, USA, October 30 - Nov. 2, 2012},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICNP.2012.6459946},
  doi          = {10.1109/ICNP.2012.6459946},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/ShinG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ShinXG12,
  author       = {Seungwon Shin and
                  Zhaoyan Xu and
                  Guofei Gu},
  editor       = {Albert G. Greenberg and
                  Kazem Sohraby},
  title        = {{EFFORT:} Efficient and effective bot malware detection},
  booktitle    = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March
                  25-30, 2012},
  pages        = {2846--2850},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/INFCOM.2012.6195713},
  doi          = {10.1109/INFCOM.2012.6195713},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ShinXG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZhangYXG12,
  author       = {Jialong Zhang and
                  Chao Yang and
                  Zhaoyan Xu and
                  Guofei Gu},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {PoisonAmplifier: {A} Guided Approach of Discovering Compromised Websites
                  through Reversing Search Poisoning Attacks},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {230--253},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_12},
  doi          = {10.1007/978-3-642-33338-5\_12},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/ZhangYXG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/PorrasSYFTG12,
  author       = {Phillip A. Porras and
                  Seungwon Shin and
                  Vinod Yegneswaran and
                  Martin W. Fong and
                  Mabry Tyson and
                  Guofei Gu},
  editor       = {Nick Feamster and
                  Jennifer Rexford},
  title        = {A security enforcement kernel for OpenFlow networks},
  booktitle    = {Proceedings of the first workshop on Hot topics in software defined
                  networks, HotSDN@SIGCOMM 2012, Helsinki, Finland, August 13, 2012},
  pages        = {121--126},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2342441.2342466},
  doi          = {10.1145/2342441.2342466},
  timestamp    = {Mon, 12 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/PorrasSYFTG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/YangHZSG12,
  author       = {Chao Yang and
                  Robert Chandler Harkreader and
                  Jialong Zhang and
                  Seungwon Shin and
                  Guofei Gu},
  editor       = {Alain Mille and
                  Fabien Gandon and
                  Jacques Misselis and
                  Michael Rabinovich and
                  Steffen Staab},
  title        = {Analyzing spammers' social networks for fun and profit: a case study
                  of cyber criminal ecosystem on twitter},
  booktitle    = {Proceedings of the 21st World Wide Web Conference 2012, {WWW} 2012,
                  Lyon, France, April 16-20, 2012},
  pages        = {71--80},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2187836.2187847},
  doi          = {10.1145/2187836.2187847},
  timestamp    = {Fri, 16 Apr 2021 10:04:12 +0200},
  biburl       = {https://dblp.org/rec/conf/www/YangHZSG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WangWGZ11,
  author       = {Tielei Wang and
                  Tao Wei and
                  Guofei Gu and
                  Wei Zou},
  title        = {Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic
                  Execution},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {15:1--15:28},
  year         = {2011},
  url          = {https://doi.org/10.1145/2019599.2019600},
  doi          = {10.1145/2019599.2019600},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/WangWGZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/VikramFG11,
  author       = {Shardul Vikram and
                  Yinan Fan and
                  Guofei Gu},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {{SEMAGE:} a new image-based two-factor {CAPTCHA}},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {237--246},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076766},
  doi          = {10.1145/2076732.2076766},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/VikramFG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangLPGLF11,
  author       = {Junjie Zhang and
                  Xiapu Luo and
                  Roberto Perdisci and
                  Guofei Gu and
                  Wenke Lee and
                  Nick Feamster},
  editor       = {Bruce S. N. Cheung and
                  Lucas Chi Kwong Hui and
                  Ravi S. Sandhu and
                  Duncan S. Wong},
  title        = {Boosting the scalability of botnet detection using adaptive traffic
                  sampling},
  booktitle    = {Proceedings of the 6th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24,
                  2011},
  pages        = {124--134},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1966913.1966930},
  doi          = {10.1145/1966913.1966930},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangLPGLF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChenGZNH11,
  author       = {Kevin Zhijie Chen and
                  Guofei Gu and
                  Jianwei Zhuge and
                  Jose Nazario and
                  Xinhui Han},
  editor       = {Bruce S. N. Cheung and
                  Lucas Chi Kwong Hui and
                  Ravi S. Sandhu and
                  Duncan S. Wong},
  title        = {WebPatrol: automated collection and replay of web-based malware scenarios},
  booktitle    = {Proceedings of the 6th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24,
                  2011},
  pages        = {186--195},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1966913.1966938},
  doi          = {10.1145/1966913.1966938},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChenGZNH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ShinLG11,
  author       = {Seungwon Shin and
                  Raymond Lin and
                  Guofei Gu},
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {Cross-Analysis of Botnet Victims: New Insights and Implications},
  booktitle    = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  pages        = {242--261},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0\_13},
  doi          = {10.1007/978-3-642-23644-0\_13},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ShinLG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/YangHG11,
  author       = {Chao Yang and
                  Robert Chandler Harkreader and
                  Guofei Gu},
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {Die Free or Live Hard? Empirical Evaluation and New Design for Fighting
                  Evolving Twitter Spammers},
  booktitle    = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  pages        = {318--337},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0\_17},
  doi          = {10.1007/978-3-642-23644-0\_17},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/YangHG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Gu11,
  author       = {Guofei Gu},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Botnet Detection in Enterprise Networks},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {166--168},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_842},
  doi          = {10.1007/978-1-4419-5906-5\_842},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Gu11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ShinG10,
  author       = {Seungwon Shin and
                  Guofei Gu},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Conficker and beyond: a large-scale empirical study},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {151--160},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920285},
  doi          = {10.1145/1920261.1920285},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ShinG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/SongYG10,
  author       = {Yimin Song and
                  Chao Yang and
                  Guofei Gu},
  title        = {Who is peeping at your passwords at Starbucks? - To catch an evil
                  twin access point},
  booktitle    = {Proceedings of the 2010 {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks, {DSN} 2010, Chicago, IL, USA, June 28 - July
                  1 2010},
  pages        = {323--332},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/DSN.2010.5544302},
  doi          = {10.1109/DSN.2010.5544302},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/SongYG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WangWGZ10,
  author       = {Tielei Wang and
                  Tao Wei and
                  Guofei Gu and
                  Wei Zou},
  title        = {TaintScope: {A} Checksum-Aware Directed Fuzzing Tool for Automatic
                  Software Vulnerability Detection},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {497--512},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.37},
  doi          = {10.1109/SP.2010.37},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/WangWGZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuanLMGL10,
  author       = {Pu Duan and
                  Sanmin Liu and
                  Weiqin Ma and
                  Guofei Gu and
                  Jyh{-}Charn Liu},
  title        = {Privacy-Preserving Matching Protocols for Attributes and Strings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {61},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/061},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuanLMGL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GuYPSL09,
  author       = {Guofei Gu and
                  Vinod Yegneswaran and
                  Phillip A. Porras and
                  Jennifer Stoll and
                  Wenke Lee},
  title        = {Active Botnet Probing to Identify Obscure Command and Control Channels},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {241--253},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.30},
  doi          = {10.1109/ACSAC.2009.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GuYPSL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Gu08,
  author       = {Guofei Gu},
  title        = {Correlation-based Botnet Detection in Enterprise Networks},
  school       = {Georgia Institute of Technology, Atlanta, GA, {USA}},
  year         = {2008},
  url          = {https://hdl.handle.net/1853/24634},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/basesearch/Gu08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GuCL08,
  author       = {Guofei Gu and
                  Alvaro A. C{\'{a}}rdenas and
                  Wenke Lee},
  editor       = {Masayuki Abe and
                  Virgil D. Gligor},
  title        = {Principled reasoning and practical applications of alert fusion in
                  intrusion detection systems},
  booktitle    = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20,
                  2008},
  pages        = {136--147},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1368310.1368332},
  doi          = {10.1145/1368310.1368332},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GuCL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/GuZL08,
  author       = {Guofei Gu and
                  Junjie Zhang and
                  Wenke Lee},
  title        = {BotSniffer: Detecting Botnet Command and Control Channels in Network
                  Traffic},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2008, San Diego, California, USA, 10th February - 13th February
                  2008},
  publisher    = {The Internet Society},
  year         = {2008},
  url          = {https://www.ndss-symposium.org/ndss2008/botsniffer-detecting-botnet-command-and-control-channels-in-network-traffic/},
  timestamp    = {Mon, 01 Feb 2021 08:42:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/GuZL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GuPZL08,
  author       = {Guofei Gu and
                  Roberto Perdisci and
                  Junjie Zhang and
                  Wenke Lee},
  editor       = {Paul C. van Oorschot},
  title        = {BotMiner: Clustering Analysis of Network Traffic for Protocol- and
                  Structure-Independent Botnet Detection},
  booktitle    = {Proceedings of the 17th {USENIX} Security Symposium, July 28-August
                  1, 2008, San Jose, CA, {USA}},
  pages        = {139--154},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/sec08/tech/full\_papers/gu/gu.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/GuPZL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/DagonGL08,
  author       = {David Dagon and
                  Guofei Gu and
                  Christopher P. Lee},
  editor       = {Wenke Lee and
                  Cliff Wang and
                  David Dagon},
  title        = {A Taxonomy of Botnet Structures},
  booktitle    = {Botnet Detection: Countering the Largest Security Threat},
  series       = {Advances in Information Security},
  volume       = {36},
  pages        = {143--164},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-68768-1\_8},
  doi          = {10.1007/978-0-387-68768-1\_8},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/DagonGL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DagonGLL07,
  author       = {David Dagon and
                  Guofei Gu and
                  Christopher P. Lee and
                  Wenke Lee},
  title        = {A Taxonomy of Botnet Structures},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {325--339},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.44},
  doi          = {10.1109/ACSAC.2007.44},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DagonGLL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/GuCPL07,
  author       = {Guofei Gu and
                  Zesheng Chen and
                  Phillip A. Porras and
                  Wenke Lee},
  title        = {Misleading and defeating importance-scanning malware propagation},
  booktitle    = {Third International Conference on Security and Privacy in Communication
                  Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September,
                  2007},
  pages        = {250--259},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/SECCOM.2007.4550340},
  doi          = {10.1109/SECCOM.2007.4550340},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/GuCPL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GuPYF07,
  author       = {Guofei Gu and
                  Phillip A. Porras and
                  Vinod Yegneswaran and
                  Martin W. Fong and
                  Wenke Lee},
  editor       = {Niels Provos},
  title        = {BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation},
  booktitle    = {Proceedings of the 16th {USENIX} Security Symposium, Boston, MA, USA,
                  August 6-10, 2007},
  publisher    = {{USENIX} Association},
  year         = {2007},
  url          = {https://www.usenix.org/conference/16th-usenix-security-symposium/bothunter-detecting-malware-infection-through-ids-driven},
  timestamp    = {Tue, 31 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/GuPYF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GuFLB06,
  author       = {Guofei Gu and
                  Prahlad Fogla and
                  Wenke Lee and
                  Douglas M. Blough},
  editor       = {Jianying Zhou and
                  Moti Yung and
                  Feng Bao},
  title        = {{DSO:} Dependable Signing Overlay},
  booktitle    = {Applied Cryptography and Network Security, 4th International Conference,
                  {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3989},
  pages        = {33--49},
  year         = {2006},
  url          = {https://doi.org/10.1007/11767480\_3},
  doi          = {10.1007/11767480\_3},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/GuFLB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GuFDLS06,
  author       = {Guofei Gu and
                  Prahlad Fogla and
                  David Dagon and
                  Wenke Lee and
                  Boris Skoric},
  editor       = {Ferng{-}Ching Lin and
                  Der{-}Tsai Lee and
                  Bao{-}Shuh Paul Lin and
                  Shiuhpyng Shieh and
                  Sushil Jajodia},
  title        = {Measuring intrusion detection capability: an information-theoretic
                  approach},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
                  2006},
  pages        = {90--101},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1128817.1128834},
  doi          = {10.1145/1128817.1128834},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GuFDLS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GuFDLS06,
  author       = {Guofei Gu and
                  Prahlad Fogla and
                  David Dagon and
                  Wenke Lee and
                  Boris Skoric},
  editor       = {Dieter Gollmann and
                  Jan Meier and
                  Andrei Sabelfeld},
  title        = {Towards an Information-Theoretic Framework for Analyzing Intrusion
                  Detection Systems},
  booktitle    = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research
                  in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4189},
  pages        = {527--546},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11863908\_32},
  doi          = {10.1007/11863908\_32},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GuFDLS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpca/ShiFGLZY06,
  author       = {Weidong Shi and
                  Joshua B. Fryman and
                  Guofei Gu and
                  Hsien{-}Hsin S. Lee and
                  Youtao Zhang and
                  Jun Yang},
  title        = {InfoShield: a security architecture for protecting information usage
                  in memory},
  booktitle    = {12th International Symposium on High-Performance Computer Architecture,
                  {HPCA-12} 2006, Austin, Texas, USA, February 11-15, 2006},
  pages        = {222--231},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/HPCA.2006.1598131},
  doi          = {10.1109/HPCA.2006.1598131},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hpca/ShiFGLZY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdm/PerdisciGL06,
  author       = {Roberto Perdisci and
                  Guofei Gu and
                  Wenke Lee},
  title        = {Using an Ensemble of One-Class {SVM} Classifiers to Harden Payload-based
                  Anomaly Detection Systems},
  booktitle    = {Proceedings of the 6th {IEEE} International Conference on Data Mining
                  {(ICDM} 2006), 18-22 December 2006, Hong Kong, China},
  pages        = {488--498},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICDM.2006.165},
  doi          = {10.1109/ICDM.2006.165},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdm/PerdisciGL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icac/ShiLGFMG05,
  author       = {Weidong Shi and
                  Hsien{-}Hsin S. Lee and
                  Guofei Gu and
                  Laura Falk and
                  Trevor N. Mudge and
                  Mrinmoy Ghosh},
  title        = {An Intrusion-Tolerant and Self-Recoverable Network Service System
                  Using {A} Security Enhanced Chip Multiprocessor},
  booktitle    = {Second International Conference on Autonomic Computing {(ICAC} 2005),
                  13-16 June 2005, Seattle, WA, {USA}},
  pages        = {263--273},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICAC.2005.8},
  doi          = {10.1109/ICAC.2005.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icac/ShiLGFMG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GuSQDLR04,
  author       = {Guofei Gu and
                  Monirul Islam Sharif and
                  Xinzhou Qin and
                  David Dagon and
                  Wenke Lee and
                  George F. Riley},
  title        = {Worm Detection, Early Warning and Response Based on Local Victim Information},
  booktitle    = {20th Annual Computer Security Applications Conference {(ACSAC} 2004),
                  6-10 December 2004, Tucson, AZ, {USA}},
  pages        = {136--145},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/CSAC.2004.51},
  doi          = {10.1109/CSAC.2004.51},
  timestamp    = {Wed, 11 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/GuSQDLR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/DagonQGLGLO04,
  author       = {David Dagon and
                  Xinzhou Qin and
                  Guofei Gu and
                  Wenke Lee and
                  Julian B. Grizzard and
                  John G. Levine and
                  Henry L. Owen},
  editor       = {Erland Jonsson and
                  Alfonso Valdes and
                  Magnus Almgren},
  title        = {HoneyStat: Local Worm Detection Using Honeypots},
  booktitle    = {Recent Advances in Intrusion Detection: 7th International Symposium,
                  {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3224},
  pages        = {39--58},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30143-1\_3},
  doi          = {10.1007/978-3-540-30143-1\_3},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/DagonQGLGLO04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GuZLZ03,
  author       = {Guofei Gu and
                  Bin B. Zhu and
                  Shipeng Li and
                  Shiyong Zhang},
  editor       = {Jianying Zhou and
                  Moti Yung and
                  Yongfei Han},
  title        = {{PLI:} {A} New Framework to Protect Digital Content for {P2P} Networks},
  booktitle    = {Applied Cryptography and Network Security, First International Conference,
                  {ACNS} 2003. Kunming, China, October 16-19, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2846},
  pages        = {206--216},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45203-4\_16},
  doi          = {10.1007/978-3-540-45203-4\_16},
  timestamp    = {Fri, 20 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/GuZLZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics