Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Guofei Gu
@article{DBLP:journals/tdsc/ZhangLKLXGW23, author = {Menghao Zhang and Guanyu Li and Xiao Kong and Chang Liu and Mingwei Xu and Guofei Gu and Jianping Wu}, title = {NetHCF: Filtering Spoofed {IP} Traffic With Programmable Switches}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {2}, pages = {1641--1655}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3161015}, doi = {10.1109/TDSC.2022.3161015}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangLKLXGW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AltaweelSGMB23, author = {Ala Altaweel and Radu Stoleru and Guofei Gu and Arnab Kumar Maity and Suman Bhunia}, title = {On Detecting Route Hijacking Attack in Opportunistic Mobile Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {3}, pages = {2516--2532}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3186029}, doi = {10.1109/TDSC.2022.3186029}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AltaweelSGMB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HongXHLHG23, author = {Sungmin Hong and Lei Xu and Jianwei Huang and Hongda Li and Hongxin Hu and Guofei Gu}, title = {SysFlow: Toward a Programmable Zero Trust Framework for System Security}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {2794--2809}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3264152}, doi = {10.1109/TIFS.2023.3264152}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HongXHLHG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/VardhanCCZG23, author = {Raj Vardhan and Alok Chandrawal and Phakpoom Chinprutthiwong and Yangyong Zhang and Guofei Gu}, editor = {Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik}, title = {{\#}DM-Me: Susceptibility to Direct Messaging-Based Scams}, booktitle = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {494--508}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3579856.3582815}, doi = {10.1145/3579856.3582815}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/VardhanCCZG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/ZhangVCG23, author = {Yangyong Zhang and Raj Vardhan and Phakpoom Chinprutthiwong and Guofei Gu}, editor = {Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik}, title = {Do Users Really Know Alexa? Understanding Alexa Skill Security Indicators}, booktitle = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {870--883}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3579856.3595795}, doi = {10.1145/3579856.3595795}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/ZhangVCG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/XuZCG23, author = {Lei Xu and Yangyong Zhang and Phakpoom Chinprutthiwong and Guofei Gu}, title = {Automatic Synthesis of Network Security Services: {A} First Step}, booktitle = {32nd International Conference on Computer Communications and Networks, {ICCCN} 2023, Honolulu, HI, USA, July 24-27, 2023}, pages = {1--10}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCCN58024.2023.10230115}, doi = {10.1109/ICCCN58024.2023.10230115}, timestamp = {Wed, 13 Sep 2023 08:43:36 +0200}, biburl = {https://dblp.org/rec/conf/icccn/XuZCG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZhouHLLLG23, author = {Huancheng Zhou and Sungmin Hong and Yangyang Liu and Xiapu Luo and Weichao Li and Guofei Gu}, title = {Mew: Enabling Large-Scale and Dynamic Link-Flooding Defenses on Programmable Switches}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {3178--3192}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179404}, doi = {10.1109/SP46215.2023.10179404}, timestamp = {Thu, 27 Jul 2023 08:17:10 +0200}, biburl = {https://dblp.org/rec/conf/sp/ZhouHLLLG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/XieCLSGXY22, author = {Renjie Xie and Jiahao Cao and Qi Li and Kun Sun and Guofei Gu and Mingwei Xu and Yuan Yang}, title = {Disrupting the {SDN} Control Channel via Shared Links: Attacks and Countermeasures}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {30}, number = {5}, pages = {2158--2172}, year = {2022}, url = {https://doi.org/10.1109/TNET.2022.3169136}, doi = {10.1109/TNET.2022.3169136}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ton/XieCLSGXY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/LiHDH0G022, author = {Hongda Li and Qiqing Huang and Fei Ding and Hongxin Hu and Long Cheng and Guofei Gu and Ziming Zhao}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {Understanding and Detecting Remote Infection on Linux-based IoT Devices}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {873--887}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3517423}, doi = {10.1145/3488932.3517423}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiaccs/LiHDH0G022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0001LLZLYLZG22, author = {Lei Xue and Yangyang Liu and Tianqi Li and Kaifa Zhao and Jianfeng Li and Le Yu and Xiapu Luo and Yajin Zhou and Guofei Gu}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {{SAID:} State-aware Defense Against Injection Attacks on In-vehicle Network}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {1921--1938}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/xue-lei}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/0001LLZLYLZG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/YuLJL0ZZ0GNW22, author = {Le Yu and Yangyang Liu and Pengfei Jing and Xiapu Luo and Lei Xue and Kaifa Zhao and Yajin Zhou and Ting Wang and Guofei Gu and Sen Nie and Shi Wu}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {1939--1956}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/yu-le}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/YuLJL0ZZ0GNW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Chinprutthiwong22, author = {Phakpoom Chinprutthiwong and Jianwei Huang and Guofei Gu}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {{SWAPP:} {A} New Programmable Playground for Web Application Security}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {2029--2046}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/chinprutthiwong}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Chinprutthiwong22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/WalkerMZSG22, author = {Payton Walker and Nathan McClaran and Zihao Zheng and Nitesh Saxena and Guofei Gu}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {BiasHacker: Voice Command Disruption by Exploiting Speaker Biases in Automatic Speech Recognition}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {119--124}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3528558}, doi = {10.1145/3507657.3528558}, timestamp = {Wed, 11 May 2022 08:49:13 +0200}, biburl = {https://dblp.org/rec/conf/wisec/WalkerMZSG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/ZhangLXBXGW21, author = {Menghao Zhang and Guanyu Li and Lei Xu and Jiasong Bai and Mingwei Xu and Guofei Gu and Jianping Wu}, title = {Control Plane Reflection Attacks and Defenses in Software-Defined Networks}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {29}, number = {2}, pages = {623--636}, year = {2021}, url = {https://doi.org/10.1109/TNET.2020.3040773}, doi = {10.1109/TNET.2020.3040773}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/ZhangLXBXGW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/LiZWLXCHGLW21, author = {Guanyu Li and Menghao Zhang and Shicheng Wang and Chang Liu and Mingwei Xu and Ang Chen and Hongxin Hu and Guofei Gu and Qi Li and Jianping Wu}, title = {Enabling Performant, Flexible and Cost-Efficient DDoS Defense With Programmable Switches}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {29}, number = {4}, pages = {1509--1526}, year = {2021}, url = {https://doi.org/10.1109/TNET.2021.3062621}, doi = {10.1109/TNET.2021.3062621}, timestamp = {Thu, 22 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ton/LiZWLXCHGLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccsw-ws/Gu21, author = {Guofei Gu}, editor = {Yinqian Zhang and Marten van Dijk}, title = {Programmable Security in the Age of Software-Defined Infrastructure}, booktitle = {CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, Virtual Event, Republic of Korea, 15 November 2021}, pages = {1}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474123.3486765}, doi = {10.1145/3474123.3486765}, timestamp = {Thu, 12 Oct 2023 12:32:07 +0200}, biburl = {https://dblp.org/rec/conf/ccsw-ws/Gu21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZhangASHG21, author = {Yangyong Zhang and Sunpreet S. Arora and Maliheh Shirvanian and Jianwei Huang and Guofei Gu}, editor = {Leyla Bilge and Tudor Dumitras}, title = {Practical Speech Re-use Prevention in Voice-driven Services}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {282--295}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471855}, doi = {10.1145/3471621.3471855}, timestamp = {Fri, 08 Oct 2021 09:46:25 +0200}, biburl = {https://dblp.org/rec/conf/raid/ZhangASHG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Chinprutthiwong21, author = {Phakpoom Chinprutthiwong and Raj Vardhan and Guangliang Yang and Yangyong Zhang and Guofei Gu}, editor = {Leyla Bilge and Tudor Dumitras}, title = {The Service Worker Hiding in Your Browser: The Next Web Attack Target?}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {312--323}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471845}, doi = {10.1145/3471621.3471845}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/Chinprutthiwong21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/XueZLZSGZA21, author = {Lei Xue and Hao Zhou and Xiapu Luo and Yajin Zhou and Yang Shi and Guofei Gu and Fengwei Zhang and Man Ho Au}, title = {Happer: Unpacking Android Apps via a Hardware-Assisted Approach}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {1641--1658}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00105}, doi = {10.1109/SP40001.2021.00105}, timestamp = {Thu, 21 Sep 2023 15:57:26 +0200}, biburl = {https://dblp.org/rec/conf/sp/XueZLZSGZA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/XiaoHXY0GL21, author = {Feng Xiao and Jianwei Huang and Yichang Xiong and Guangliang Yang and Hong Hu and Guofei Gu and Wenke Lee}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Abusing Hidden Properties to Attack the Node.js Ecosystem}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2951--2968}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/xiao}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/XiaoHXY0GL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2101-04773, author = {Yangyong Zhang and Maliheh Shirvanian and Sunpreet S. Arora and Jianwei Huang and Guofei Gu}, title = {Practical Speech Re-use Prevention in Voice-driven Services}, journal = {CoRR}, volume = {abs/2101.04773}, year = {2021}, url = {https://arxiv.org/abs/2101.04773}, eprinttype = {arXiv}, eprint = {2101.04773}, timestamp = {Fri, 22 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2101-04773.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-11526, author = {Raj Vardhan and Ninghao Liu and Phakpoom Chinprutthiwong and Weijie Fu and Zhenyu Hu and Xia Ben Hu and Guofei Gu}, title = {ExAD: An Ensemble Approach for Explanation-based Adversarial Detection}, journal = {CoRR}, volume = {abs/2103.11526}, year = {2021}, url = {https://arxiv.org/abs/2103.11526}, eprinttype = {arXiv}, eprint = {2103.11526}, timestamp = {Wed, 24 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-11526.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Chinprutthiwong20, author = {Phakpoom Chinprutthiwong and Raj Vardhan and Guangliang Yang and Guofei Gu}, title = {Security Study of Service Worker Cross-Site Scripting}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {643--654}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427290}, doi = {10.1145/3427228.3427290}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Chinprutthiwong20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccsscc/Gu20, author = {Guofei Gu}, title = {Your Cybersecurity Is Now Programmable: Experiments on Networking and Blockchain Systems}, booktitle = {Proceedings of the 8th International Workshop on Security in Blockchain and Cloud Computing, SBC@AsiaCCS 2020, Virtual Online Conference, October 6, 2020}, pages = {2}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3384942.3418745}, doi = {10.1145/3384942.3418745}, timestamp = {Mon, 16 Nov 2020 15:55:53 +0100}, biburl = {https://dblp.org/rec/conf/asiaccsscc/Gu20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangZJPG20, author = {Benyu Zhang and Matei Zaharia and Shouling Ji and Raluca Ada Popa and Guofei Gu}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {{PPMLP} 2020: Workshop on Privacy-Preserving Machine Learning In Practice}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {2139--2140}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3416245}, doi = {10.1145/3372297.3416245}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangZJPG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cncert/Yu0LHGZG20, author = {Guorui Yu and Guangliang Yang and Tongxin Li and Xinhui Han and Shijie Guan and Jialong Zhang and Guofei Gu}, editor = {Wei Lu and Qiaoyan Wen and Yuqing Zhang and Bo Lang and Weiping Wen and Hanbing Yan and Chao Li and Li Ding and Ruiguang Li and Yu Zhou}, title = {MinerGate: {A} Novel Generic and Accurate Defense Solution Against Web Based Cryptocurrency Mining Attacks}, booktitle = {Cyber Security - 17th China Annual Conference, {CNCERT} 2020, Beijing, China, August 12, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1299}, pages = {50--70}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-33-4922-3\_5}, doi = {10.1007/978-981-33-4922-3\_5}, timestamp = {Thu, 15 Dec 2022 13:17:06 +0100}, biburl = {https://dblp.org/rec/conf/cncert/Yu0LHGZG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/0002CLLGZLZCHTL20, author = {Ting Chen and Rong Cao and Ting Li and Xiapu Luo and Guofei Gu and Yufei Zhang and Zhou Liao and Hang Zhu and Gang Chen and Zheyuan He and Yuxing Tang and Xiaodong Lin and Xiaosong Zhang}, title = {{SODA:} {A} Generic Online Detection Framework for Smart Contracts}, booktitle = {27th Annual Network and Distributed System Security Symposium, {NDSS} 2020, San Diego, California, USA, February 23-26, 2020}, publisher = {The Internet Society}, year = {2020}, url = {https://www.ndss-symposium.org/ndss-paper/soda-a-generic-online-detection-framework-for-smart-contracts/}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/0002CLLGZLZCHTL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/CaoXS0GX20, author = {Jiahao Cao and Renjie Xie and Kun Sun and Qi Li and Guofei Gu and Mingwei Xu}, title = {When Match Fields Do Not Need to Match: Buffered Packets Hijacking in {SDN}}, booktitle = {27th Annual Network and Distributed System Security Symposium, {NDSS} 2020, San Diego, California, USA, February 23-26, 2020}, publisher = {The Internet Society}, year = {2020}, url = {https://www.ndss-symposium.org/ndss-paper/when-match-fields-do-not-need-to-match-buffered-packets-hijacking-in-sdn/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/CaoXS0GX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ZhangLWLCHG0XW20, author = {Menghao Zhang and Guanyu Li and Shicheng Wang and Chang Liu and Ang Chen and Hongxin Hu and Guofei Gu and Qi Li and Mingwei Xu and Jianping Wu}, title = {Poseidon: Mitigating Volumetric DDoS Attacks with Programmable Switches}, booktitle = {27th Annual Network and Distributed System Security Symposium, {NDSS} 2020, San Diego, California, USA, February 23-26, 2020}, publisher = {The Internet Society}, year = {2020}, url = {https://www.ndss-symposium.org/ndss-paper/poseidon-mitigating-volumetric-ddos-attacks-with-programmable-switches/}, timestamp = {Thu, 22 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ZhangLWLCHG0XW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/XiaoZHGWL20, author = {Feng Xiao and Jinquan Zhang and Jianwei Huang and Guofei Gu and Dinghao Wu and Peng Liu}, title = {Unexpected Data Dependency Creation and Chaining: {A} New Attack to {SDN}}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {1512--1526}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00017}, doi = {10.1109/SP40000.2020.00017}, timestamp = {Thu, 21 Sep 2023 15:57:24 +0200}, biburl = {https://dblp.org/rec/conf/sp/XiaoZHGWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2020asia, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269}, doi = {10.1145/3320269}, isbn = {978-1-4503-6750-9}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2020asia.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2020ppmlp, editor = {Benyu Zhang and Raluca Ada Popa and Matei Zaharia and Guofei Gu and Shouling Ji}, title = {PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, Virtual Event, USA, November, 2020}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411501}, doi = {10.1145/3411501}, isbn = {978-1-4503-8088-1}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2020ppmlp.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-03283, author = {Jianwei Huang and Vinod Yegneswaran and Phillip A. Porras and Guofei Gu}, title = {On the Privacy and Integrity Risks of Contact-Tracing Applications}, journal = {CoRR}, volume = {abs/2012.03283}, year = {2020}, url = {https://arxiv.org/abs/2012.03283}, eprinttype = {arXiv}, eprint = {2012.03283}, timestamp = {Wed, 09 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-03283.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcan/0029GLH19, author = {Lei Chen and Guofei Gu and Wenjia Li and Rami J. Haddad}, title = {Editorial: special issue on "The security, privacy, and digital forensics of mobile networks and mobile cloud"}, journal = {Digit. Commun. Networks}, volume = {5}, number = {4}, pages = {203--204}, year = {2019}, url = {https://doi.org/10.1016/j.dcan.2019.11.002}, doi = {10.1016/J.DCAN.2019.11.002}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcan/0029GLH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AhnGHS19, author = {Gail{-}Joon Ahn and Guofei Gu and Hongxin Hu and Seungwon Shin}, title = {Guest Editors' Introduction: Special Section on Security in Emerging Networking Technologies}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {6}, pages = {913--914}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2019.2906921}, doi = {10.1109/TDSC.2019.2906921}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AhnGHS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AltaweelSGM19, author = {Ala Altaweel and Radu Stoleru and Guofei Gu and Arnab Kumar Maity}, title = {CollusiveHijack: {A} New Route Hijacking Attack and Countermeasures in Opportunistic Networks}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {73--81}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802699}, doi = {10.1109/CNS.2019.8802699}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AltaweelSGM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/LiZLKCGD19, author = {Guanyu Li and Menghao Zhang and Chang Liu and Xiao Kong and Ang Chen and Guofei Gu and Haixin Duan}, title = {{NETHCF:} Enabling Line-rate and Adaptive Spoofed {IP} Traffic Filtering}, booktitle = {27th {IEEE} International Conference on Network Protocols, {ICNP} 2019, Chicago, IL, USA, October 8-10, 2019}, pages = {1--12}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICNP.2019.8888057}, doi = {10.1109/ICNP.2019.8888057}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icnp/LiZLKCGD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ZhangXMYCG19, author = {Yangyong Zhang and Lei Xu and Abner Mendoza and Guangliang Yang and Phakpoom Chinprutthiwong and Guofei Gu}, title = {Life after Speech Recognition: Fuzzing Semantic Misinterpretation for Voice Assistant Applications}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/life-after-speech-recognition-fuzzing-semantic-misinterpretation-for-voice-assistant-applications/}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ZhangXMYCG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Cao0XSGX019, author = {Jiahao Cao and Qi Li and Renjie Xie and Kun Sun and Guofei Gu and Mingwei Xu and Yuan Yang}, editor = {Nadia Heninger and Patrick Traynor}, title = {The CrossPath Attack: Disrupting the {SDN} Control Channel via Shared Links}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {19--36}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/cao}, timestamp = {Mon, 01 Feb 2021 08:43:12 +0100}, biburl = {https://dblp.org/rec/conf/uss/Cao0XSGX019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Yang0G19, author = {Guangliang Yang and Jeff Huang and Guofei Gu}, editor = {Nadia Heninger and Patrick Traynor}, title = {Iframes/Popups Are Dangerous in Mobile WebView: Studying and Mitigating Differential Context Vulnerabilities}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {977--994}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/yang-guangliang}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/Yang0G19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2019sdn-nfv, editor = {Gail{-}Joon Ahn and Guofei Gu and Hongxin Hu and Seungwon Shin}, title = {SDN-NFV@CODASPY 2019 - roceedings of the {ACM} International Workshop on Security in Software Defined Networks {\&} Network Function Virtualization, Richardson, TX, USA, March 27, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3309194}, doi = {10.1145/3309194}, isbn = {978-1-4503-6179-8}, timestamp = {Fri, 25 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/2019sdn-nfv.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HausheerHSG18, author = {David Hausheer and Oliver Hohlfeld and Stefan Schmid and Guofei Gu}, title = {Security and performance of software-defined networks and functions virtualization}, journal = {Comput. Networks}, volume = {138}, pages = {15--17}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.03.025}, doi = {10.1016/J.COMNET.2018.03.025}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/HausheerHSG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HanLNGX18, author = {Weili Han and Zhigong Li and Minyue Ni and Guofei Gu and Wenyuan Xu}, title = {Shadow Attacks Based on Password Reuses: {A} Quantitative Empirical Analysis}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {2}, pages = {309--320}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2568187}, doi = {10.1109/TDSC.2016.2568187}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HanLNGX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhengLGCYW18, author = {Jing Zheng and Qi Li and Guofei Gu and Jiahao Cao and David K. Y. Yau and Jianping Wu}, title = {Realtime DDoS Defense Using {COTS} {SDN} Switches via Adaptive Correlation Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {7}, pages = {1838--1853}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2805600}, doi = {10.1109/TIFS.2018.2805600}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhengLGCYW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XueMLCMG18, author = {Lei Xue and Xiaobo Ma and Xiapu Luo and Edmond W. W. Chan and TungNgai Miu and Guofei Gu}, title = {LinkScope: Toward Detecting Target Link Flooding Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {10}, pages = {2423--2438}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2815555}, doi = {10.1109/TIFS.2018.2815555}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XueMLCMG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangYCXZG18, author = {Haopei Wang and Guangliang Yang and Phakpoom Chinprutthiwong and Lei Xu and Yangyong Zhang and Guofei Gu}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Towards Fine-grained Network Security Forensics and Diagnosis in the {SDN} Era}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {3--16}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243749}, doi = {10.1145/3243734.3243749}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangYCXZG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiHGAZ18, author = {Hongda Li and Hongxin Hu and Guofei Gu and Gail{-}Joon Ahn and Fuqiang Zhang}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {vNIDS: Towards Elastic Security with Safe and Efficient Virtualization of Network Intrusion Detection Systems}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {17--34}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243862}, doi = {10.1145/3243734.3243862}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiHGAZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/SkowyraXGDHOL18, author = {Richard Skowyra and Lei Xu and Guofei Gu and Veer Dedhia and Thomas Hobson and Hamed Okhravi and James Landry}, title = {Effective Topology Tampering Attacks and Defenses in Software-Defined Networks}, booktitle = {48th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2018, Luxembourg City, Luxembourg, June 25-28, 2018}, pages = {374--385}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/DSN.2018.00047}, doi = {10.1109/DSN.2018.00047}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/SkowyraXGDHOL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/ShinXKG18, author = {Seungwon Shin and Zhaoyan Xu and Yeonkeun Kim and Guofei Gu}, title = {CloudRand: Building Heterogeneous and Moving-Target Network Interfaces}, booktitle = {27th International Conference on Computer Communication and Networks, {ICCCN} 2018, Hangzhou, China, July 30 - August 2, 2018}, pages = {1--11}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICCCN.2018.8487356}, doi = {10.1109/ICCCN.2018.8487356}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/icccn/ShinXKG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Yang0G18, author = {Guangliang Yang and Jeff Huang and Guofei Gu}, title = {Automated Generation of Event-Oriented Exploits in Android Hybrid Apps}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_04B-3\_Yang\_paper.pdf}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/Yang0G18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZhangLXBGB18, author = {Menghao Zhang and Guanyu Li and Lei Xu and Jun Bi and Guofei Gu and Jiasong Bai}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {Control Plane Reflection Attacks in SDNs: New Attacks and Countermeasures}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {161--183}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_8}, doi = {10.1007/978-3-030-00470-5\_8}, timestamp = {Mon, 20 Nov 2023 09:00:29 +0100}, biburl = {https://dblp.org/rec/conf/raid/ZhangLXBGB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZhangJGS018, author = {Jialong Zhang and Jiyong Jang and Guofei Gu and Marc Ph. Stoecklin and Xin Hu}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {Error-Sensor: Mining Information from {HTTP} Error Traffic for Malware Intelligence}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {467--489}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_22}, doi = {10.1007/978-3-030-00470-5\_22}, timestamp = {Fri, 07 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ZhangJGS018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Yang0GM18, author = {Guangliang Yang and Jeff Huang and Guofei Gu and Abner Mendoza}, title = {Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage Enabled Mobile Applications}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {742--755}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00043}, doi = {10.1109/SP.2018.00043}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/Yang0GM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MendozaG18, author = {Abner Mendoza and Guofei Gu}, title = {Mobile Application Web {API} Reconnaissance: Web-to-Mobile Inconsistencies {\&} Vulnerabilities}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {756--769}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00039}, doi = {10.1109/SP.2018.00039}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/MendozaG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/MendozaCG18, author = {Abner Mendoza and Phakpoom Chinprutthiwong and Guofei Gu}, editor = {Pierre{-}Antoine Champin and Fabien Gandon and Mounia Lalmas and Panagiotis G. Ipeirotis}, title = {Uncovering {HTTP} Header Inconsistencies and the Impact on Desktop/Mobile Websites}, booktitle = {Proceedings of the 2018 World Wide Web Conference on World Wide Web, {WWW} 2018, Lyon, France, April 23-27, 2018}, pages = {247--256}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3178876.3186091}, doi = {10.1145/3178876.3186091}, timestamp = {Fri, 16 Apr 2021 10:04:12 +0200}, biburl = {https://dblp.org/rec/conf/www/MendozaCG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2018sdn-nfv, editor = {Gail{-}Joon Ahn and Guofei Gu and Hongxin Hu and Seungwon Shin}, title = {Proceedings of the 2018 {ACM} International Workshop on Security in Software Defined Networks {\&} Network Function Virtualization, SDN-NFVSec@CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018}, publisher = {{ACM}}, year = {2018}, url = {http://dl.acm.org/citation.cfm?id=3180465}, timestamp = {Sun, 18 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/2018sdn-nfv.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NanYYZZGWS17, author = {Yuhong Nan and Zhemin Yang and Min Yang and Shunfan Zhou and Yuan Zhang and Guofei Gu and Xiaofeng Wang and Limin Sun}, title = {Identifying User-Input Privacy in Mobile Applications at a Large Scale}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {3}, pages = {647--661}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2631949}, doi = {10.1109/TIFS.2016.2631949}, timestamp = {Sat, 09 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/NanYYZZGWS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/YoonLKPSYPG17, author = {Changhoon Yoon and Seungsoo Lee and Heedo Kang and Taejune Park and Seungwon Shin and Vinod Yegneswaran and Phillip A. Porras and Guofei Gu}, title = {Flow Wars: Systemizing the Attack Surface and Defenses in Software-Defined Networks}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {25}, number = {6}, pages = {3514--3530}, year = {2017}, url = {https://doi.org/10.1109/TNET.2017.2748159}, doi = {10.1109/TNET.2017.2748159}, timestamp = {Wed, 18 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/YoonLKPSYPG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsys/GuHKLP17, author = {Guofei Gu and Hongxin Hu and Eric Keller and Zhiqiang Lin and Donald E. Porter}, title = {Building a Security {OS} With Software Defined Infrastructure}, booktitle = {Proceedings of the 8th Asia-Pacific Workshop on Systems, Mumbai, India, September 2, 2017}, pages = {4:1--4:8}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3124680.3124720}, doi = {10.1145/3124680.3124720}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apsys/GuHKLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/AltaweelSG17, author = {Ala Altaweel and Radu Stoleru and Guofei Gu}, title = {EvilDirect: {A} New Wi-Fi Direct Hijacking Attack and Countermeasures}, booktitle = {26th International Conference on Computer Communication and Networks, {ICCCN} 2017, Vancouver, BC, Canada, July 31 - Aug. 3, 2017}, pages = {1--11}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICCCN.2017.8038416}, doi = {10.1109/ICCCN.2017.8038416}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccn/AltaweelSG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/YangZG17, author = {Chao Yang and Jialong Zhang and Guofei Gu}, editor = {Kisung Lee and Ling Liu}, title = {Understanding the Market-Level and Network-Level Behaviors of the Android Malware Ecosystem}, booktitle = {37th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017}, pages = {2452--2457}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICDCS.2017.297}, doi = {10.1109/ICDCS.2017.297}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/YangZG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/WangSXHG17, author = {Haopei Wang and Abhinav Srivastava and Lei Xu and Sungmin Hong and Guofei Gu}, title = {Bring your own controller: Enabling tenant-defined {SDN} apps in IaaS clouds}, booktitle = {2017 {IEEE} Conference on Computer Communications, {INFOCOM} 2017, Atlanta, GA, USA, May 1-4, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/INFOCOM.2017.8057137}, doi = {10.1109/INFOCOM.2017.8057137}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/WangSXHG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/YangMZG17, author = {Guangliang Yang and Abner Mendoza and Jialong Zhang and Guofei Gu}, editor = {Marc Dacier and Michael D. Bailey and Michalis Polychronakis and Manos Antonakakis}, title = {Precisely and Scalably Vetting JavaScript Bridge in Android Hybrid Apps}, booktitle = {Research in Attacks, Intrusions, and Defenses - 20th International Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10453}, pages = {143--166}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66332-6\_7}, doi = {10.1007/978-3-319-66332-6\_7}, timestamp = {Mon, 20 Nov 2023 09:00:29 +0100}, biburl = {https://dblp.org/rec/conf/raid/YangMZG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/XueZCLG17, author = {Lei Xue and Yajin Zhou and Ting Chen and Xiapu Luo and Guofei Gu}, editor = {Engin Kirda and Thomas Ristenpart}, title = {Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for {ART}}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {289--306}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/xue}, timestamp = {Mon, 01 Feb 2021 08:42:59 +0100}, biburl = {https://dblp.org/rec/conf/uss/XueZCLG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/XuHHZG17, author = {Lei Xu and Jeff Huang and Sungmin Hong and Jialong Zhang and Guofei Gu}, editor = {Engin Kirda and Thomas Ristenpart}, title = {Attacking the Brain: Races in the {SDN} Control Plane}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {451--468}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/xu-lei}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/XuHHZG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2017sdn-nfv, editor = {Gail{-}Joon Ahn and Guofei Gu and Hongxin Hu and Seungwon Shin}, title = {Proceedings of the {ACM} International Workshop on Security in Software Defined Networks {\&} Network Function Virtualization, SDN-NFVSec@CODASPY 2017, Scottsdale, Arizona, USA, March 24, 2017}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3040992}, doi = {10.1145/3040992}, isbn = {978-1-4503-4908-6}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/2017sdn-nfv.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HassanzadehXSGP16, author = {Amin Hassanzadeh and Zhaoyan Xu and Radu Stoleru and Guofei Gu and Michalis Polychronakis}, title = {{PRIDE:} {A} practical intrusion detection system for resource constrained wireless mesh networks}, journal = {Comput. Secur.}, volume = {62}, pages = {114--132}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.06.007}, doi = {10.1016/J.COSE.2016.06.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HassanzadehXSGP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangYG016, author = {Yuan Zhang and Min Yang and Guofei Gu and Hao Chen}, title = {Rethinking Permission Enforcement Mechanism on Mobile Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {10}, pages = {2227--2240}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2581304}, doi = {10.1109/TIFS.2016.2581304}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangYG016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/ShinXHG16, author = {Seungwon Shin and Lei Xu and Sungmin Hong and Guofei Gu}, title = {Enhancing Network Security through Software Defined Networking {(SDN)}}, booktitle = {25th International Conference on Computer Communication and Networks, {ICCCN} 2016, Waikoloa, HI, USA, August 1-4, 2016}, pages = {1--9}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICCCN.2016.7568520}, doi = {10.1109/ICCCN.2016.7568520}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccn/ShinXHG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ZhangHJWGS16, author = {Jialong Zhang and Xin Hu and Jiyong Jang and Ting Wang and Guofei Gu and Marc Ph. Stoecklin}, title = {Hunting for invisibility: Characterizing and detecting malicious web infrastructures through server visibility analysis}, booktitle = {35th Annual {IEEE} International Conference on Computer Communications, {INFOCOM} 2016, San Francisco, CA, USA, April 10-14, 2016}, pages = {1--9}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/INFOCOM.2016.7524582}, doi = {10.1109/INFOCOM.2016.7524582}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ZhangHJWGS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/HongBXNG16, author = {Sungmin Hong and Robert Baykov and Lei Xu and Srinath Nadimpalli and Guofei Gu}, title = {Towards SDN-Defined Programmable {BYOD} (Bring Your Own Device) Security}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/towards-sdn-defined-programmable-bring-your-own-device-security.pdf}, timestamp = {Thu, 17 Jun 2021 16:04:48 +0200}, biburl = {https://dblp.org/rec/conf/ndss/HongBXNG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2016sdn-nfv, editor = {Gail{-}Joon Ahn and Guofei Gu and Hongxin Hu and Seungwon Shin}, title = {Proceedings of the 2016 {ACM} International Workshop on Security in Software Defined Networks {\&} Network Function Virtualization, SDN-NFV@CODASPY 2016, New Orleans, LA, USA, March 11, 2016}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2876019}, isbn = {978-1-4503-4078-6}, timestamp = {Tue, 15 Mar 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/2016sdn-nfv.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/micro/QianLLG15, author = {Chenxiong Qian and Xiapu Luo and Le Yu and Guofei Gu}, title = {VulHunter: Toward Discovering Vulnerabilities in Android Applications}, journal = {{IEEE} Micro}, volume = {35}, number = {1}, pages = {44--53}, year = {2015}, url = {https://doi.org/10.1109/MM.2015.25}, doi = {10.1109/MM.2015.25}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/micro/QianLLG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShinWG15, author = {Seungwon Shin and Haopei Wang and Guofei Gu}, title = {A First Step Toward Network Security Virtualization: From Concept To Prototype}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {10}, pages = {2236--2249}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2453936}, doi = {10.1109/TIFS.2015.2453936}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ShinWG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/YuGBGS15, author = {Shui Yu and Guofei Gu and Ahmed Barnawi and Song Guo and Ivan Stojmenovic}, title = {Malware Propagation in Large-Scale Networks}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {27}, number = {1}, pages = {170--179}, year = {2015}, url = {https://doi.org/10.1109/TKDE.2014.2320725}, doi = {10.1109/TKDE.2014.2320725}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tkde/YuGBGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/WangXG15, author = {Haopei Wang and Lei Xu and Guofei Gu}, title = {FloodGuard: {A} DoS Attack Prevention Extension in Software-Defined Networks}, booktitle = {45th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2015, Rio de Janeiro, Brazil, June 22-25, 2015}, pages = {239--250}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/DSN.2015.27}, doi = {10.1109/DSN.2015.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/WangXG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/ZhangSGLM15, author = {Jialong Zhang and Sabyasachi Saha and Guofei Gu and Sung{-}Ju Lee and Marco Mellia}, title = {Systematic Mining of Associated Server Herds for Malware Campaign Discovery}, booktitle = {35th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2015, Columbus, OH, USA, June 29 - July 2, 2015}, pages = {630--641}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICDCS.2015.70}, doi = {10.1109/ICDCS.2015.70}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/ZhangSGLM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/MendozaSG15, author = {Abner Mendoza and Kapil Singh and Guofei Gu}, title = {What is wrecking your data plan? {A} measurement study of mobile web overhead}, booktitle = {2015 {IEEE} Conference on Computer Communications, {INFOCOM} 2015, Kowloon, Hong Kong, April 26 - May 1, 2015}, pages = {2740--2748}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INFOCOM.2015.7218666}, doi = {10.1109/INFOCOM.2015.7218666}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/MendozaSG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/HongXWG15, author = {Sungmin Hong and Lei Xu and Haopei Wang and Guofei Gu}, title = {Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/poisoning-network-visibility-software-defined-networks-new-attacks-and-countermeasures}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/HongXWG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ZhangYGC15, author = {Yuan Zhang and Min Yang and Guofei Gu and Hao Chen}, editor = {Bhavani Thuraisingham and XiaoFeng Wang and Vinod Yegneswaran}, title = {FineDroid: Enforcing Permissions with System-Wide Application Execution Context}, booktitle = {Security and Privacy in Communication Networks - 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {164}, pages = {3--22}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28865-9\_1}, doi = {10.1007/978-3-319-28865-9\_1}, timestamp = {Wed, 29 Jun 2022 15:37:43 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/ZhangYGC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/YangYGYTG15, author = {Chao Yang and Guangliang Yang and Ashish Gehani and Vinod Yegneswaran and Dawood Tariq and Guofei Gu}, editor = {Bhavani Thuraisingham and XiaoFeng Wang and Vinod Yegneswaran}, title = {Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps}, booktitle = {Security and Privacy in Communication Networks - 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {164}, pages = {58--77}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28865-9\_4}, doi = {10.1007/978-3-319-28865-9\_4}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/YangYGYTG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/NanYYZGW15, author = {Yuhong Nan and Min Yang and Zhemin Yang and Shunfan Zhou and Guofei Gu and Xiaofeng Wang}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {UIPicker: User-Input Privacy Identification in Mobile Applications}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {993--1008}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/nan}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/NanYYZGW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangYYGNZ14, author = {Yuan Zhang and Min Yang and Zhemin Yang and Guofei Gu and Peng Ning and Binyu Zang}, title = {Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {9}, number = {11}, pages = {1828--1842}, year = {2014}, url = {https://doi.org/10.1109/TIFS.2014.2347206}, doi = {10.1109/TIFS.2014.2347206}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangYYGNZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YangZG14, author = {Chao Yang and Jialong Zhang and Guofei Gu}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {A taste of tweets: reverse engineering Twitter spammers}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {86--95}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664258}, doi = {10.1145/2664243.2664258}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/YangZG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuNBYCG14, author = {Zhaoyan Xu and Antonio Nappa and Robert Baykov and Guangliang Yang and Juan Caballero and Guofei Gu}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{AUTOPROBE:} Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {179--190}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660352}, doi = {10.1145/2660267.2660352}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuNBYCG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/YangXGYP14, author = {Chao Yang and Zhaoyan Xu and Guofei Gu and Vinod Yegneswaran and Phillip A. Porras}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8712}, pages = {163--182}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11203-9\_10}, doi = {10.1007/978-3-319-11203-9\_10}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/YangXGYP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WangXZXWG14, author = {Yong Wang and Zhaoyan Xu and Jialong Zhang and Lei Xu and Haopei Wang and Guofei Gu}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {{SRID:} State Relation Based Intrusion Detection for False Data Injection Attacks in {SCADA}}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {401--418}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_23}, doi = {10.1007/978-3-319-11212-1\_23}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WangXZXWG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/NappaXRCG14, author = {Antonio Nappa and Zhaoyan Xu and M. Zubair Rafique and Juan Caballero and Guofei Gu}, title = {CyberProbe: Towards Internet-Scale Active Detection of Malicious Servers}, booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS} 2014, San Diego, California, USA, February 23-26, 2014}, publisher = {The Internet Society}, year = {2014}, url = {https://www.ndss-symposium.org/ndss2014/cyberprobe-towards-internet-scale-active-detection-malicious-servers}, timestamp = {Mon, 01 Feb 2021 08:42:18 +0100}, biburl = {https://dblp.org/rec/conf/ndss/NappaXRCG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/XuZGL14, author = {Zhaoyan Xu and Jialong Zhang and Guofei Gu and Zhiqiang Lin}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {GoldenEye: Efficiently and Effectively Unveiling Malware's Targeted Environment}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {22--45}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_2}, doi = {10.1007/978-3-319-11379-1\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/XuZGL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/CaoYRCG14, author = {Yinzhi Cao and Chao Yang and Vaibhav Rastogi and Yan Chen and Guofei Gu}, editor = {Jing Tian and Jiwu Jing and Mudhakar Srivatsa}, title = {Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-On Cross Site Scripting Attacks}, booktitle = {International Conference on Security and Privacy in Communication Networks - 10th International {ICST} Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {152}, pages = {582--601}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-23829-6\_45}, doi = {10.1007/978-3-319-23829-6\_45}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/CaoYRCG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ZhangNG14, author = {Jialong Zhang and Jayant Notani and Guofei Gu}, editor = {Jing Tian and Jiwu Jing and Mudhakar Srivatsa}, title = {Characterizing Google Hacking: {A} First Large-Scale Quantitative Study}, booktitle = {International Conference on Security and Privacy in Communication Networks - 10th International {ICST} Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {152}, pages = {602--622}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-23829-6\_46}, doi = {10.1007/978-3-319-23829-6\_46}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/ZhangNG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SallesGS13, author = {Ronaldo M. Salles and Guofei Gu and Morton Swimmer}, title = {Editorial for Computer Networks special issue on ''Botnet Activity: Analysis, Detection and Shutdown''}, journal = {Comput. Networks}, volume = {57}, number = {2}, pages = {375--377}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.08.008}, doi = {10.1016/J.COMNET.2012.08.008}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/SallesGS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ShinXG13, author = {Seungwon Shin and Zhaoyan Xu and Guofei Gu}, title = {{EFFORT:} {A} new host-network cooperated framework for efficient and effective bot malware detection}, journal = {Comput. Networks}, volume = {57}, number = {13}, pages = {2628--2642}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.05.010}, doi = {10.1016/J.COMNET.2013.05.010}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ShinXG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangHG13, author = {Chao Yang and Robert Chandler Harkreader and Guofei Gu}, title = {Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {8}, number = {8}, pages = {1280--1293}, year = {2013}, url = {https://doi.org/10.1109/TIFS.2013.2267732}, doi = {10.1109/TIFS.2013.2267732}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangHG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShinYPG13, author = {Seungwon Shin and Vinod Yegneswaran and Phillip A. Porras and Guofei Gu}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {{AVANT-GUARD:} scalable and vigilant switch flow management in software-defined networks}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {413--424}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516684}, doi = {10.1145/2508859.2516684}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShinYPG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangYXYGNWZ13, author = {Yuan Zhang and Min Yang and Bingquan Xu and Zhemin Yang and Guofei Gu and Peng Ning and Xiaoyang Sean Wang and Binyu Zang}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Vetting undesirable behaviors in android apps with permission use analysis}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {611--622}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516689}, doi = {10.1145/2508859.2516689}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangYXYGNWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YangYZGNW13, author = {Zhemin Yang and Min Yang and Yuan Zhang and Guofei Gu and Peng Ning and Xiaoyang Sean Wang}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {AppIntent: analyzing sensitive data transmission in android for privacy leakage detection}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1043--1054}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516676}, doi = {10.1145/2508859.2516676}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YangYZGNW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/VikramYG13, author = {Shardul Vikram and Chao Yang and Guofei Gu}, title = {{NOMAD:} Towards non-intrusive moving-target defense against web bots}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {55--63}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682692}, doi = {10.1109/CNS.2013.6682692}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/VikramYG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsnets/AmleshwaramRYGY13, author = {Amit A. Amleshwaram and A. L. Narasimha Reddy and Sandeep Yadav and Guofei Gu and Chao Yang}, title = {{CATS:} Characterizing automation of Twitter spammers}, booktitle = {Fifth International Conference on Communication Systems and Networks, {COMSNETS} 2013, Bangalore, India, January 7-10, 2013}, pages = {1--10}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/COMSNETS.2013.6465541}, doi = {10.1109/COMSNETS.2013.6465541}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/comsnets/AmleshwaramRYGY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/SonSYPG13, author = {Sooel Son and Seungwon Shin and Vinod Yegneswaran and Phillip A. Porras and Guofei Gu}, title = {Model checking invariant security properties in OpenFlow}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2013, Budapest, Hungary, June 9-13, 2013}, pages = {1974--1979}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICC.2013.6654813}, doi = {10.1109/ICC.2013.6654813}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/SonSYPG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/XuZGL13, author = {Zhaoyan Xu and Jialong Zhang and Guofei Gu and Zhiqiang Lin}, title = {{AUTOVAC:} Automatically Extracting System Resource Constraints and Generating Vaccines for Malware Immunization}, booktitle = {{IEEE} 33rd International Conference on Distributed Computing Systems, {ICDCS} 2013, 8-11 July, 2013, Philadelphia, Pennsylvania, {USA}}, pages = {112--123}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICDCS.2013.69}, doi = {10.1109/ICDCS.2013.69}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/XuZGL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/HassanzadehXSGP13, author = {Amin Hassanzadeh and Zhaoyan Xu and Radu Stoleru and Guofei Gu and Michalis Polychronakis}, editor = {Sihan Qing and Jianying Zhou and Dongmei Liu}, title = {{PRIDE:} Practical Intrusion Detection in Resource Constrained Wireless Mesh Networks}, booktitle = {Information and Communications Security - 15th International Conference, {ICICS} 2013, Beijing, China, November 20-22, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8233}, pages = {213--228}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02726-5\_16}, doi = {10.1007/978-3-319-02726-5\_16}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/HassanzadehXSGP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ShinPYFGT13, author = {Seungwon Shin and Phillip A. Porras and Vinod Yegneswaran and Martin W. Fong and Guofei Gu and Mabry Tyson}, title = {{FRESCO:} Modular Composable Security Services for Software-Defined Networks}, booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS} 2013, San Diego, California, USA, February 24-27, 2013}, publisher = {The Internet Society}, year = {2013}, url = {https://www.ndss-symposium.org/ndss2013/fresco-modular-composable-security-services-software-defined-networks}, timestamp = {Mon, 01 Feb 2021 08:42:13 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ShinPYFGT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ZhangG13, author = {Jialong Zhang and Guofei Gu}, title = {{NEIGHBORWATCHER:} {A} Content-Agnostic Comment Spam Inference System}, booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS} 2013, San Diego, California, USA, February 24-27, 2013}, publisher = {The Internet Society}, year = {2013}, url = {https://www.ndss-symposium.org/ndss2013/neighborwatcher-content-agnostic-comment-spam-inference-system}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ZhangG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/ShinG13, author = {Seungwon Shin and Guofei Gu}, editor = {Nate Foster and Rob Sherwood}, title = {Attacking software-defined networks: a first feasibility study}, booktitle = {Proceedings of the Second {ACM} {SIGCOMM} Workshop on Hot Topics in Software Defined Networking, HotSDN 2013, The Chinese University of Hong Kong, Hong Kong, China, Friday, August 16, 2013}, pages = {165--166}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2491185.2491220}, doi = {10.1145/2491185.2491220}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/ShinG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HandLGT12, author = {Scott Hand and Zhiqiang Lin and Guofei Gu and Bhavani Thuraisingham}, title = {Bin-Carver: Automatic recovery of binary executable files}, journal = {Digit. Investig.}, volume = {9}, number = {Supplement}, pages = {S108--S117}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.05.014}, doi = {10.1016/J.DIIN.2012.05.014}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HandLGT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShinGRL12, author = {Seungwon Shin and Guofei Gu and A. L. Narasimha Reddy and Christopher P. Lee}, title = {A Large-Scale Empirical Study of Conficker}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {7}, number = {2}, pages = {676--690}, year = {2012}, url = {https://doi.org/10.1109/TIFS.2011.2173486}, doi = {10.1109/TIFS.2011.2173486}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ShinGRL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangSG12, author = {Chao Yang and Yimin Song and Guofei Gu}, title = {Active User-Side Evil Twin Access Point Detection Using Statistical Techniques}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {7}, number = {5}, pages = {1638--1651}, year = {2012}, url = {https://doi.org/10.1109/TIFS.2012.2207383}, doi = {10.1109/TIFS.2012.2207383}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangSG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/MaDLGL12, author = {Weiqin Ma and Pu Duan and Sanmin Liu and Guofei Gu and Jyh{-}Charn Liu}, title = {Shadow attacks: automatically evading system-call-behavior based malware detection}, journal = {J. Comput. Virol.}, volume = {8}, number = {1-2}, pages = {1--13}, year = {2012}, url = {https://doi.org/10.1007/s11416-011-0157-5}, doi = {10.1007/S11416-011-0157-5}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/MaDLGL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Gu12, author = {Guofei Gu}, editor = {Ting Yu and V. N. Venkatakrishan and Apu Kapadia}, title = {Machine learning meets social networking security: detecting and analyzing malicious social networks for fun and profit}, booktitle = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012}, pages = {1--2}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381896.2381898}, doi = {10.1145/2381896.2381898}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Gu12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhengZDGGHZ12, author = {Cong Zheng and Shixiong Zhu and Shuaifu Dai and Guofei Gu and Xiaorui Gong and Xinhui Han and Wei Zou}, editor = {Ting Yu and William Enck and Xuxian Jiang}, title = {SmartDroid: an automatic system for revealing UI-based trigger conditions in android applications}, booktitle = {SPSM'12, Proceedings of the Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with {CCS} 2012, October 19, 2012, Raleigh, NC, {USA}}, pages = {93--104}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381934.2381950}, doi = {10.1145/2381934.2381950}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhengZDGGHZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuCGK12, author = {Zhaoyan Xu and Lingfeng Chen and Guofei Gu and Christopher Kruegel}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {PeerPress: utilizing enemies' {P2P} strength against them}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {581--592}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382257}, doi = {10.1145/2382196.2382257}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/XuCGK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YangYPG12, author = {Chao Yang and Vinod Yegneswaran and Phillip A. Porras and Guofei Gu}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Detecting money-stealing apps in alternative Android markets}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1034--1036}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382316}, doi = {10.1145/2382196.2382316}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YangYPG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuZGL12, author = {Zhaoyan Xu and Jialong Zhang and Guofei Gu and Zhiqiang Lin}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Automatic generation of vaccines for malware immunization}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1037--1039}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382317}, doi = {10.1145/2382196.2382317}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuZGL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/ShinG12, author = {Seungwon Shin and Guofei Gu}, title = {CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?)}, booktitle = {20th {IEEE} International Conference on Network Protocols, {ICNP} 2012, Austin, TX, USA, October 30 - Nov. 2, 2012}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICNP.2012.6459946}, doi = {10.1109/ICNP.2012.6459946}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/ShinG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ShinXG12, author = {Seungwon Shin and Zhaoyan Xu and Guofei Gu}, editor = {Albert G. Greenberg and Kazem Sohraby}, title = {{EFFORT:} Efficient and effective bot malware detection}, booktitle = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March 25-30, 2012}, pages = {2846--2850}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/INFCOM.2012.6195713}, doi = {10.1109/INFCOM.2012.6195713}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ShinXG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZhangYXG12, author = {Jialong Zhang and Chao Yang and Zhaoyan Xu and Guofei Gu}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {PoisonAmplifier: {A} Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {230--253}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_12}, doi = {10.1007/978-3-642-33338-5\_12}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/ZhangYXG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/PorrasSYFTG12, author = {Phillip A. Porras and Seungwon Shin and Vinod Yegneswaran and Martin W. Fong and Mabry Tyson and Guofei Gu}, editor = {Nick Feamster and Jennifer Rexford}, title = {A security enforcement kernel for OpenFlow networks}, booktitle = {Proceedings of the first workshop on Hot topics in software defined networks, HotSDN@SIGCOMM 2012, Helsinki, Finland, August 13, 2012}, pages = {121--126}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2342441.2342466}, doi = {10.1145/2342441.2342466}, timestamp = {Mon, 12 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/PorrasSYFTG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/YangHZSG12, author = {Chao Yang and Robert Chandler Harkreader and Jialong Zhang and Seungwon Shin and Guofei Gu}, editor = {Alain Mille and Fabien Gandon and Jacques Misselis and Michael Rabinovich and Steffen Staab}, title = {Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter}, booktitle = {Proceedings of the 21st World Wide Web Conference 2012, {WWW} 2012, Lyon, France, April 16-20, 2012}, pages = {71--80}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2187836.2187847}, doi = {10.1145/2187836.2187847}, timestamp = {Fri, 16 Apr 2021 10:04:12 +0200}, biburl = {https://dblp.org/rec/conf/www/YangHZSG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WangWGZ11, author = {Tielei Wang and Tao Wei and Guofei Gu and Wei Zou}, title = {Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic Execution}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {2}, pages = {15:1--15:28}, year = {2011}, url = {https://doi.org/10.1145/2019599.2019600}, doi = {10.1145/2019599.2019600}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/WangWGZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/VikramFG11, author = {Shardul Vikram and Yinan Fan and Guofei Gu}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {{SEMAGE:} a new image-based two-factor {CAPTCHA}}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {237--246}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076766}, doi = {10.1145/2076732.2076766}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/VikramFG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangLPGLF11, author = {Junjie Zhang and Xiapu Luo and Roberto Perdisci and Guofei Gu and Wenke Lee and Nick Feamster}, editor = {Bruce S. N. Cheung and Lucas Chi Kwong Hui and Ravi S. Sandhu and Duncan S. Wong}, title = {Boosting the scalability of botnet detection using adaptive traffic sampling}, booktitle = {Proceedings of the 6th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24, 2011}, pages = {124--134}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1966913.1966930}, doi = {10.1145/1966913.1966930}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangLPGLF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenGZNH11, author = {Kevin Zhijie Chen and Guofei Gu and Jianwei Zhuge and Jose Nazario and Xinhui Han}, editor = {Bruce S. N. Cheung and Lucas Chi Kwong Hui and Ravi S. Sandhu and Duncan S. Wong}, title = {WebPatrol: automated collection and replay of web-based malware scenarios}, booktitle = {Proceedings of the 6th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24, 2011}, pages = {186--195}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1966913.1966938}, doi = {10.1145/1966913.1966938}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChenGZNH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ShinLG11, author = {Seungwon Shin and Raymond Lin and Guofei Gu}, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {Cross-Analysis of Botnet Victims: New Insights and Implications}, booktitle = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, pages = {242--261}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0\_13}, doi = {10.1007/978-3-642-23644-0\_13}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/ShinLG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/YangHG11, author = {Chao Yang and Robert Chandler Harkreader and Guofei Gu}, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers}, booktitle = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, pages = {318--337}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0\_17}, doi = {10.1007/978-3-642-23644-0\_17}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/YangHG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Gu11, author = {Guofei Gu}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Botnet Detection in Enterprise Networks}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {166--168}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_842}, doi = {10.1007/978-1-4419-5906-5\_842}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Gu11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ShinG10, author = {Seungwon Shin and Guofei Gu}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Conficker and beyond: a large-scale empirical study}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {151--160}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920285}, doi = {10.1145/1920261.1920285}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ShinG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/SongYG10, author = {Yimin Song and Chao Yang and Guofei Gu}, title = {Who is peeping at your passwords at Starbucks? - To catch an evil twin access point}, booktitle = {Proceedings of the 2010 {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2010, Chicago, IL, USA, June 28 - July 1 2010}, pages = {323--332}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/DSN.2010.5544302}, doi = {10.1109/DSN.2010.5544302}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/SongYG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WangWGZ10, author = {Tielei Wang and Tao Wei and Guofei Gu and Wei Zou}, title = {TaintScope: {A} Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection}, booktitle = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May 2010, Berleley/Oakland, California, {USA}}, pages = {497--512}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SP.2010.37}, doi = {10.1109/SP.2010.37}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/WangWGZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuanLMGL10, author = {Pu Duan and Sanmin Liu and Weiqin Ma and Guofei Gu and Jyh{-}Charn Liu}, title = {Privacy-Preserving Matching Protocols for Attributes and Strings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {61}, year = {2010}, url = {http://eprint.iacr.org/2010/061}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuanLMGL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GuYPSL09, author = {Guofei Gu and Vinod Yegneswaran and Phillip A. Porras and Jennifer Stoll and Wenke Lee}, title = {Active Botnet Probing to Identify Obscure Command and Control Channels}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {241--253}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.30}, doi = {10.1109/ACSAC.2009.30}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GuYPSL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Gu08, author = {Guofei Gu}, title = {Correlation-based Botnet Detection in Enterprise Networks}, school = {Georgia Institute of Technology, Atlanta, GA, {USA}}, year = {2008}, url = {https://hdl.handle.net/1853/24634}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/basesearch/Gu08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GuCL08, author = {Guofei Gu and Alvaro A. C{\'{a}}rdenas and Wenke Lee}, editor = {Masayuki Abe and Virgil D. Gligor}, title = {Principled reasoning and practical applications of alert fusion in intrusion detection systems}, booktitle = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20, 2008}, pages = {136--147}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1368310.1368332}, doi = {10.1145/1368310.1368332}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GuCL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/GuZL08, author = {Guofei Gu and Junjie Zhang and Wenke Lee}, title = {BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2008, San Diego, California, USA, 10th February - 13th February 2008}, publisher = {The Internet Society}, year = {2008}, url = {https://www.ndss-symposium.org/ndss2008/botsniffer-detecting-botnet-command-and-control-channels-in-network-traffic/}, timestamp = {Mon, 01 Feb 2021 08:42:15 +0100}, biburl = {https://dblp.org/rec/conf/ndss/GuZL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GuPZL08, author = {Guofei Gu and Roberto Perdisci and Junjie Zhang and Wenke Lee}, editor = {Paul C. van Oorschot}, title = {BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection}, booktitle = {Proceedings of the 17th {USENIX} Security Symposium, July 28-August 1, 2008, San Jose, CA, {USA}}, pages = {139--154}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/sec08/tech/full\_papers/gu/gu.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/GuPZL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/DagonGL08, author = {David Dagon and Guofei Gu and Christopher P. Lee}, editor = {Wenke Lee and Cliff Wang and David Dagon}, title = {A Taxonomy of Botnet Structures}, booktitle = {Botnet Detection: Countering the Largest Security Threat}, series = {Advances in Information Security}, volume = {36}, pages = {143--164}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-68768-1\_8}, doi = {10.1007/978-0-387-68768-1\_8}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/DagonGL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DagonGLL07, author = {David Dagon and Guofei Gu and Christopher P. Lee and Wenke Lee}, title = {A Taxonomy of Botnet Structures}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {325--339}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.44}, doi = {10.1109/ACSAC.2007.44}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DagonGLL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/GuCPL07, author = {Guofei Gu and Zesheng Chen and Phillip A. Porras and Wenke Lee}, title = {Misleading and defeating importance-scanning malware propagation}, booktitle = {Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007}, pages = {250--259}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/SECCOM.2007.4550340}, doi = {10.1109/SECCOM.2007.4550340}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/GuCPL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GuPYF07, author = {Guofei Gu and Phillip A. Porras and Vinod Yegneswaran and Martin W. Fong and Wenke Lee}, editor = {Niels Provos}, title = {BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation}, booktitle = {Proceedings of the 16th {USENIX} Security Symposium, Boston, MA, USA, August 6-10, 2007}, publisher = {{USENIX} Association}, year = {2007}, url = {https://www.usenix.org/conference/16th-usenix-security-symposium/bothunter-detecting-malware-infection-through-ids-driven}, timestamp = {Tue, 31 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/GuPYF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GuFLB06, author = {Guofei Gu and Prahlad Fogla and Wenke Lee and Douglas M. Blough}, editor = {Jianying Zhou and Moti Yung and Feng Bao}, title = {{DSO:} Dependable Signing Overlay}, booktitle = {Applied Cryptography and Network Security, 4th International Conference, {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3989}, pages = {33--49}, year = {2006}, url = {https://doi.org/10.1007/11767480\_3}, doi = {10.1007/11767480\_3}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/GuFLB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GuFDLS06, author = {Guofei Gu and Prahlad Fogla and David Dagon and Wenke Lee and Boris Skoric}, editor = {Ferng{-}Ching Lin and Der{-}Tsai Lee and Bao{-}Shuh Paul Lin and Shiuhpyng Shieh and Sushil Jajodia}, title = {Measuring intrusion detection capability: an information-theoretic approach}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24, 2006}, pages = {90--101}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1128817.1128834}, doi = {10.1145/1128817.1128834}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GuFDLS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GuFDLS06, author = {Guofei Gu and Prahlad Fogla and David Dagon and Wenke Lee and Boris Skoric}, editor = {Dieter Gollmann and Jan Meier and Andrei Sabelfeld}, title = {Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems}, booktitle = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4189}, pages = {527--546}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11863908\_32}, doi = {10.1007/11863908\_32}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GuFDLS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpca/ShiFGLZY06, author = {Weidong Shi and Joshua B. Fryman and Guofei Gu and Hsien{-}Hsin S. Lee and Youtao Zhang and Jun Yang}, title = {InfoShield: a security architecture for protecting information usage in memory}, booktitle = {12th International Symposium on High-Performance Computer Architecture, {HPCA-12} 2006, Austin, Texas, USA, February 11-15, 2006}, pages = {222--231}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/HPCA.2006.1598131}, doi = {10.1109/HPCA.2006.1598131}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hpca/ShiFGLZY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdm/PerdisciGL06, author = {Roberto Perdisci and Guofei Gu and Wenke Lee}, title = {Using an Ensemble of One-Class {SVM} Classifiers to Harden Payload-based Anomaly Detection Systems}, booktitle = {Proceedings of the 6th {IEEE} International Conference on Data Mining {(ICDM} 2006), 18-22 December 2006, Hong Kong, China}, pages = {488--498}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICDM.2006.165}, doi = {10.1109/ICDM.2006.165}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdm/PerdisciGL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icac/ShiLGFMG05, author = {Weidong Shi and Hsien{-}Hsin S. Lee and Guofei Gu and Laura Falk and Trevor N. Mudge and Mrinmoy Ghosh}, title = {An Intrusion-Tolerant and Self-Recoverable Network Service System Using {A} Security Enhanced Chip Multiprocessor}, booktitle = {Second International Conference on Autonomic Computing {(ICAC} 2005), 13-16 June 2005, Seattle, WA, {USA}}, pages = {263--273}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICAC.2005.8}, doi = {10.1109/ICAC.2005.8}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icac/ShiLGFMG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GuSQDLR04, author = {Guofei Gu and Monirul Islam Sharif and Xinzhou Qin and David Dagon and Wenke Lee and George F. Riley}, title = {Worm Detection, Early Warning and Response Based on Local Victim Information}, booktitle = {20th Annual Computer Security Applications Conference {(ACSAC} 2004), 6-10 December 2004, Tucson, AZ, {USA}}, pages = {136--145}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/CSAC.2004.51}, doi = {10.1109/CSAC.2004.51}, timestamp = {Wed, 11 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/GuSQDLR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/DagonQGLGLO04, author = {David Dagon and Xinzhou Qin and Guofei Gu and Wenke Lee and Julian B. Grizzard and John G. Levine and Henry L. Owen}, editor = {Erland Jonsson and Alfonso Valdes and Magnus Almgren}, title = {HoneyStat: Local Worm Detection Using Honeypots}, booktitle = {Recent Advances in Intrusion Detection: 7th International Symposium, {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3224}, pages = {39--58}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30143-1\_3}, doi = {10.1007/978-3-540-30143-1\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/DagonQGLGLO04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GuZLZ03, author = {Guofei Gu and Bin B. Zhu and Shipeng Li and Shiyong Zhang}, editor = {Jianying Zhou and Moti Yung and Yongfei Han}, title = {{PLI:} {A} New Framework to Protect Digital Content for {P2P} Networks}, booktitle = {Applied Cryptography and Network Security, First International Conference, {ACNS} 2003. Kunming, China, October 16-19, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2846}, pages = {206--216}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45203-4\_16}, doi = {10.1007/978-3-540-45203-4\_16}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/GuZLZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.