Tsinghua University

General Info

Rank: #21 Worldwide
#1 outside of US and Europe
Papers: 101
Number of Researchers: 145
APA
(average papers per authors):
0.7
Country: CHINA

Activity Map

Contributors

  • Haixin Duan (30 papers)
  • Qi Li (18 papers)
  • Chao Zhang (17 papers)
  • Baojun Liu (12 papers)
  • XiaoFeng Zheng (8 papers)
  • Ying Liu (7 papers)
  • Chaoyi Lu (7 papers)
  • Mingwei Xu (6 papers)
  • Shi-Min Hu (6 papers)
  • Jianping Wu (5 papers)
  • Jianjun Chen (5 papers)
  • Xiaolong Bai (5 papers)
  • Ke Xu (5 papers)
  • Jinjin Liang (4 papers)
  • Kun Du (4 papers)
  • Jiahao Cao (3 papers)
  • Jia-Ju Bai (3 papers)
  • Xuewei Feng (3 papers)
  • Hao Yang (3 papers)
  • Mingzhe Wang (3 papers)
  • Kaiwen Shen (3 papers)
  • Zhuotao Liu (3 papers)
  • Jian Jiang (2 papers)
  • Yunhao Liu (2 papers)
  • Renjie Xie (2 papers)
  • Yiming Zhang (2 papers)
  • Jiaming Mu (2 papers)
  • Wenqi Chen (2 papers)
  • Dongqi Han (2 papers)
  • Xia Yin (2 papers)
  • Jiahai Yang (2 papers)
  • Xingang Shi (2 papers)
  • Zu-Ming Jiang (2 papers)
  • Zhongyu Pei (2 papers)
  • Sisi Duan (2 papers)
  • Jie Liang (2 papers)
  • Chijin Zhou (2 papers)
  • Yu Jiang (2 papers)
  • Yi He (2 papers)
  • Kaixiang Chen (2 papers)
  • Mingming Zhang (2 papers)
  • Yuan Li (2 papers)
  • Xingman Chen (2 papers)
  • Songtao Yang (2 papers)
  • Chuanpu Fu (2 papers)
  • Han Zhang (2 papers)
  • Zhizheng Lv (2 papers)
  • Bodong Zhao (2 papers)
  • Chuhan Wang (2 papers)
  • Minglei Guo (2 papers)
  • Xiaofeng Zheng (2 papers)
  • Yi Tang (1 papers)
  • Bin Liu (1 papers)
  • Zhenhua Li (1 papers)
  • Jian Chen (1 papers)
  • Kebin Liu (1 papers)
  • Huandong Wang (1 papers)
  • Chen Gao (1 papers)
  • Yong Li (1 papers)
  • Depeng Jin (1 papers)
  • Run Guo (1 papers)
  • Weizhong Li (1 papers)
  • Jia Zhang (1 papers)
  • Kaiwen Sheng (1 papers)
  • Yun-Yun Tsai (1 papers)
  • Tsung-Yi Ho (1 papers)
  • Menghao Zhang (1 papers)
  • Guanyu Li (1 papers)
  • Shicheng Wang (1 papers)
  • Chang Liu (1 papers)
  • Fenglu Zhang (1 papers)
  • Hai Huang (1 papers)
  • Chenxin Duan (1 papers)
  • Chang Lan (1 papers)
  • Wei Ming (1 papers)
  • Xiulin Ma (1 papers)
  • Zhiyong Wu (1 papers)
  • Jianzhong Liu (1 papers)
  • Jiaguang Sun (1 papers)
  • Zihao Jin (1 papers)
  • Andrew C. Yao (1 papers)
  • Tong Zhu (1 papers)
  • Qiang Ma (1 papers)
  • Shanfeng Zhang (1 papers)
  • Yu Xia (1 papers)
  • Dong Yuan (1 papers)
  • Yuanli Miao (1 papers)
  • Zheng Yang (1 papers)
  • Pengfei Qiu (1 papers)
  • Yongqiang Lyu (1 papers)
  • Dongsheng Wang (1 papers)
  • Yu Wang (1 papers)
  • Yiming Zhang Baojun Liu (1 papers)
  • Mingxuan Liu (1 papers)
  • Youjun Huang (1 papers)
  • Yun Li (1 papers)
  • Zhiliang Wang (1 papers)
  • Ying Zhong (1 papers)
  • Su Wang (1 papers)
  • Yuanjie Li (1 papers)
  • Hewu Li (1 papers)
  • Xingkun Yao (1 papers)
  • Yaoxue Zhang (1 papers)
  • Jiachen Li (1 papers)
  • Shuitao Gan (1 papers)
  • Junxian Shen (1 papers)
  • Yantao Geng (1 papers)
  • Jiawei Li (1 papers)
  • Jilong Wang (1 papers)
  • Xiaoyu Fan (1 papers)
  • Wei Xu (1 papers)
  • Wende Tan (1 papers)
  • Tianshuo Cong (1 papers)
  • Zerui Cheng (1 papers)
  • Ruoyu Wang (1 papers)
  • Tianyi Wang (1 papers)
  • Yuan Yang (1 papers)
  • Qixue Xiao (1 papers)
  • Yu Chen (1 papers)
  • Yuanliang Chen (1 papers)
  • Fuchen Ma (1 papers)
  • Zhuo Su (1 papers)
  • Jun Ma (1 papers)
  • Baozheng Liu (1 papers)
  • Yishun Zeng (1 papers)
  • Haifeng Ruan (1 papers)
  • Jianwei Zhuge (1 papers)
  • Jian Peng (1 papers)
  • Tuo Li (1 papers)
  • Tingting Yin (1 papers)
  • Yushi Cheng (1 papers)
  • Zhenhua Zou (1 papers)
  • Lancheng Qin (1 papers)
  • Dan Li (1 papers)
  • Kang Wang (1 papers)
  • Qi-An Fu (1 papers)
  • Yinpeng Dong (1 papers)
  • Hang Su (1 papers)
  • Jun Zhu (1 papers)
  • Gang Zhao (1 papers)
  • Zheming Li (1 papers)
  • Shisong Qin (1 papers)
  • Zheyu Ma (1 papers)
  • Ming Yuan (1 papers)
  • Wenyu Zhu (1 papers)

Papers

"WebShield: Enabling Various Web Defense Techniques without Client Side Modifications"

Yi Tang, Bin Liu, ... -- NDSS 2011

"Ghost Domain Names: Revoked Yet Still Resolvable"

Jian Jiang, Jinjin Liang, Haixin Duan, Jianping Wu, ... -- NDSS 2012

"Scalable Fault Localization under Dynamic Traffic Patterns"

Chang Lan, ... -- Oakland 2012

"LAP: Lightweight Anonymity and Privacy"

Wei Ming, ... -- Oakland 2012

"OAKE: A New Family of Implicitly Authenticated Diffie-Hellman Protocols"

Andrew C. Yao, ... -- CCS 2013

"Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services"

Ruoyu Wang, ... -- Usenix 2013

"When HTTPS Meets CDN: A Case of Authentication in Delegated Service"

Jinjin Liang, Jian Jiang, Haixin Duan, Jianping Wu, ... -- Oakland 2014

"Context-free Attacks Using Keyboard Acoustic Emanations"

Tong Zhu, Qiang Ma, Shanfeng Zhang, Yunhao Liu, ... -- CCS 2014

"Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers"

Tianyi Wang, ... -- Usenix 2014

"Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS X and iOS"

Xiaolong Bai, Shi-Min Hu, ... -- CCS 2015

"Cookies Lack Integrity: Real-World Implications"

XiaoFeng Zheng, Jinjin Liang, Haixin Duan, ... -- Usenix 2015

"Forwarding-Loop Attacks in Content Delivery Networks"

Jianjun Chen, XiaoFeng Zheng, Haixin Duan, Jinjin Liang, ... -- NDSS 2016

"Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search"

Zhongyu Pei, Hao Yang, Jianjun Chen, Haixin Duan, Kun Du, ... -- Oakland 2016

"Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf"

Xiaolong Bai, Shi-Min Hu, ... -- Oakland 2016

"Host of Troubles: Multiple Host Ambiguities in HTTP Implementations"

Jianjun Chen, Haixin Duan, ... -- CCS 2016

"The Honey Badger of BFT Protocols"

Yu Xia, ... -- CCS 2016

"The Ever-changing Labyrinth: A Large-scale Analysis of Wildcard DNS Powered Blackhat SEO"

Kun Du, Hao Yang, Haixin Duan, ... -- Usenix 2016

"FBS-Radar: Uncovering Fake Base Stations at Scale in the Wild"

Zhenhua Li, Jian Chen, Kebin Liu, Yunhao Liu, ... -- NDSS 2017

"How to Learn Klingon Without Dictionary: Detection and Measurement of Black Keywords Used by Underground Economy"

Hao Yang, Xiulin Ma, Kun Du, Haixin Duan, Jianping Wu, ... -- Oakland 2017

"Don't Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains"

Kun Du, Baojun Liu, Haixin Duan, ... -- CCS 2017

"Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews"

Xiaolong Bai, ... -- CCS 2017

"Vulnerable Implicit Service: A Revisit"

Yi He, Qi Li, ... -- CCS 2017

"Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment"

Xiaolong Bai, Shi-Min Hu, ... -- Usenix 2017

"Towards Efficient Heap Overflow Discovery"

Chao Zhang, ... -- Usenix 2017

"OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS."

Xiaolong Bai, ... -- NDSS 2018

"De-anonymization of Mobility Trajectories: Dissecting the Gaps between Theory and Practice."

Huandong Wang, Chen Gao, Yong Li, Depeng Jin, ... -- NDSS 2018

"CollAFL: Path Sensitive Fuzzing"

Chao Zhang, Zhongyu Pei, ... -- Oakland 2018

"PatternListener: Cracking Android Pattern Lock Using Acoustic Signals"

Qi Li, ... -- CCS 2018

"How You Get Bullets in Your Back: A Systematical Study about Cryptojacking in Real-world"

Haixin Duan, ... -- CCS 2018

"Revery: from Proof-of-Concept to Exploitable. One Step towards Automatic Exploit Generation"

Chao Zhang, Kaixiang Chen, ... -- CCS 2018

"We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS"

Jianjun Chen, Haixin Duan, ... -- Usenix 2018

"Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path"

Baojun Liu, Chaoyi Lu, Haixin Duan, Ying Liu, ... -- Usenix 2018

"An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications"

Haixin Duan, ... -- Usenix 2018

"Resident Evil: Understanding Residential IP Proxy as a Dark Service"

Baojun Liu, Ying Liu, ... -- Oakland 2019

"Certificate Transparency in the Wild: Exploring the Reliability of Monitors"

Qi Li, ... -- CCS 2019

"Detecting Fake Accounts in Online Social Networks at the Time of Registrations"

Dong Yuan, Yuanli Miao, Zheng Yang, Qi Li, ... -- CCS 2019

"VoltJockey: Breaching TrustZone by Software-Controlled Voltage Manipulation over Multi-core Frequencies"

Pengfei Qiu, Yongqiang Lyu, Dongsheng Wang, ... -- CCS 2019

"The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links"

Jiahao Cao, Qi Li, Renjie Xie, Mingwei Xu, Yuan Yang, ... -- Usenix 2019

"Seeing is Not Believing: Camouflage Attacks on Image Scaling Algorithms"

Qixue Xiao, Yu Chen, ... -- Usenix 2019

"MOPT: Optimized Mutation Scheduling for Fuzzers"

Chao Zhang, ... -- Usenix 2019

"EnFuzz: Ensemble Fuzzing with Seed Synchronization among Diverse Fuzzers"

Yuanliang Chen, Yu Jiang, Fuchen Ma, Jie Liang, Mingzhe Wang, Chijin Zhou, Zhuo Su, ... -- Usenix 2019

"CDN Judo: Breaking the CDN DoS Protection with Itself"

Run Guo, Weizhong Li, Baojun Liu, Jia Zhang, Haixin Duan, Kaiwen Sheng, Ying Liu, ... -- NDSS 2020

"CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples"

Yun-Yun Tsai, Tsung-Yi Ho, ... -- NDSS 2020

"Poseidon: Mitigating Volumetric DDoS Attacks with Programmable Switches"

Menghao Zhang, Guanyu Li, Shicheng Wang, Chang Liu, Qi Li, Mingwei Xu, Jianping Wu, ... -- NDSS 2020

"When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN"

Jiahao Cao, Renjie Xie, Qi Li, Mingwei Xu, ... -- NDSS 2020

"Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks"

Mingming Zhang, XiaoFeng Zheng, Kaiwen Shen, Chaoyi Lu, Yu Wang, Haixin Duan, Baojun Liu, ... -- CCS 2020

"When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition"

Jiahao Cao, Qi Li, ... -- CCS 2020

"Lies in the Air: Characterizing Fake-base-station Spam Ecosystem in China"

Yiming Zhang Baojun Liu, Chaoyi Lu, Haixin Duan, Mingxuan Liu, Ying Liu, ... -- CCS 2020

"Finding Cracks in Shields: On the Security of Control Flow Integrity Mechanisms"

Yuan Li, Mingzhe Wang, Chao Zhang, Xingman Chen, Songtao Yang, Ying Liu, ... -- CCS 2020

"DNS Cache Poisoning Attack Reloaded: Revolutions With Side Channels"

XiaoFeng Zheng, Youjun Huang, Haixin Duan, ... -- CCS 2020

"Off-Path TCP Exploits of the Mixed IPID Assignment"

Xuewei Feng, Qi Li, Ke Xu, ... -- CCS 2020

"You Are What You Broadcast: Identification of Mobile and IoT Devices from (Public) WiFi"

Jun Ma, ... -- Usenix 2020

"FANS: Fuzzing Android Native System Services via Automated Interface Analysis"

Baozheng Liu, Chao Zhang, Yishun Zeng, Haifeng Ruan, Jianwei Zhuge, ... -- Usenix 2020

"Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Devices"

XiaoFeng Zheng, Chaoyi Lu, Jian Peng, Baojun Liu, Haixin Duan, ... -- Usenix 2020

"GREYONE: Data Flow Sensitive Fuzzing"

Chao Zhang, Bodong Zhao, ... -- Usenix 2020

"Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection"

Zu-Ming Jiang, Jia-Ju Bai, Shi-Min Hu, ... -- Usenix 2020

"From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR"

Chaoyi Lu, Baojun Liu, Yiming Zhang, Fenglu Zhang, Haixin Duan, Ying Liu, ... -- NDSS 2021

"POP and PUSH: Demystifying and Defending against (Mach) Port-oriented Programming"

Chao Zhang, ... -- NDSS 2021

"Data Poisoning Attacks to Deep Learning Based Recommender Systems"

Hai Huang, Jiaming Mu, Qi Li, Mingwei Xu, ... -- NDSS 2021

"OblivSketch: Oblivious Network Measurement as a Cloud Service"

Qi Li, ... -- NDSS 2021

"ZKCPlus: Optimized Fair-exchange Protocol Supporting Practical and Flexible Data Exchange"

Yun Li, Chao Zhang, ... -- CCS 2021

"Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis"

Chuanpu Fu, Qi Li, Ke Xu, ... -- CCS 2021

"DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications"

Dongqi Han, Zhiliang Wang, Wenqi Chen, Ying Zhong, Su Wang, Han Zhang, Jiahai Yang, Xingang Shi, Xia Yin, ... -- CCS 2021

"Deterrence of Intelligent DDoS via Multi-Hop Traffic Divergence"

Yuanjie Li, Hewu Li, Zhizheng Lv, Xingkun Yao, Jianping Wu, ... -- CCS 2021

"Igor: Crash Deduplication Through Root-Cause Clustering"

Chao Zhang, ... -- CCS 2021

"The Invisible Shadow: How Security Cameras Leak Private Activities"

Yaoxue Zhang, ... -- CCS 2021

"Rusted Anchors: A National Client-Side View of Hidden Root CAs in the Web PKI Ecosystem"

Yiming Zhang, Baojun Liu, Chaoyi Lu, Haixin Duan, Jiachen Li, ... -- CCS 2021

"A Hard Label Black-box Adversarial Attack Against Graph Neural Networks"

Jiaming Mu, Qi Li, Mingwei Xu, Zhuotao Liu, ... -- CCS 2021

"Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information"

Qi Li, ... -- CCS 2021

"Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems"

Chao Zhang, Haixin Duan, ... -- Usenix 2021

"Static Detection of Unsafe DMA Accesses in Device Drivers"

Jia-Ju Bai, Tuo Li, Shi-Min Hu, ... -- Usenix 2021

"MAZE: Towards Automated Heap Feng Shui"

Chao Zhang, ... -- Usenix 2021

"VScape: Assessing and Escaping Virtual Call Protections"

Kaixiang Chen, Chao Zhang, Tingting Yin, Xingman Chen, ... -- Usenix 2021

"Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks"

Kaiwen Shen, Chuhan Wang, Minglei Guo, XiaoFeng Zheng, Chaoyi Lu, Baojun Liu, Haixin Duan, ... -- Usenix 2021

"ROV-MI: Large-Scale, Accurate and Efficient Measurement of ROV Deployment"

Wenqi Chen, Dongqi Han, Chenxin Duan, Xia Yin, Jiahai Yang, Xingang Shi, ... -- NDSS 2022

"Context-Sensitive and Directional Concurrency Fuzzing for Data-Race Detection"

Zu-Ming Jiang, Jia-Ju Bai, Shi-Min Hu, ... -- NDSS 2022

"PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP"

Xuewei Feng, Qi Li, Ke Xu, Baojun Liu, XiaoFeng Zheng, Haixin Duan, ... -- NDSS 2022

"Analyzing Ground-Truth Data of Mobile Gambling Scam"

Haixin Duan, ... -- Oakland 2022

"Exploit the Last Straw That Breaks Android Systems"

Haixin Duan, ... -- Oakland 2022

"Foundations of Dynamic BFT"

Sisi Duan, ... -- Oakland 2022

"PATA: Fuzzing with Path Aware Taint Analysis"

Jie Liang, Mingzhe Wang, Chijin Zhou, Zhiyong Wu, Yu Jiang, Jianzhong Liu, Jiaguang Sun, ... -- Oakland 2022

"Timing-Based Browsing Privacy Vulnerabilities Via Site Isolation"

Zihao Jin, Haixin Duan, ... -- Oakland 2022

"An Extensive Study of Residential Proxies in China"

XiaoFeng Zheng, Haixin Duan, ... -- CCS 2022

"Evocatio: Conjuring Bug Capabilities from a Single PoC"

Shuitao Gan, Chao Zhang, ... -- CCS 2022

"Gringotts: Fast and Accurate Internal Denial-of-Wallet Detection for Serverless Computing"

Junxian Shen, Han Zhang, Yantao Geng, Jiawei Li, Jilong Wang, Mingwei Xu, ... -- CCS 2022

"NFGen: Automatic Non-linear Function Evaluation Code Generator for General-purpose MPC Platforms"

Xiaoyu Fan, Wei Xu, ... -- CCS 2022

"On the Privacy Risks of Cell-Based NAS Architectures"

Qi Li, ... -- CCS 2022

"PACE: Fully Parallelizable BFT from Reproposable Byzantine Agreement"

Sisi Duan, ... -- CCS 2022

"PACMem: Enforcing Spatial and Temporal Memory Safety via ARM Pointer Authentication"

Yuan Li, Wende Tan, Zhizheng Lv, Songtao Yang, Ying Liu, Chao Zhang, ... -- CCS 2022

"SFuzz: Slice-based Fuzzing for Real-Time Operating Systems"

Haixin Duan, ... -- CCS 2022

"SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders"

Tianshuo Cong, ... -- CCS 2022

"zkBridge: Trustless Cross-chain Bridges Made Practical"

Zerui Cheng, ... -- CCS 2022

"Back-Propagating System Dependency Impact for Attack Investigation"

Zhuotao Liu, ... -- Usenix 2022

""OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE Score"

Yushi Cheng, ... -- Usenix 2022

"RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices"

Yi He, Zhenhua Zou, Zhuotao Liu, Ke Xu, Qi Li, ... -- Usenix 2022

"A Large-scale and Longitudinal Measurement Study of DKIM Deployment"

Chuhan Wang, Kaiwen Shen, Minglei Guo, Mingming Zhang, Jianjun Chen, Baojun Liu, Xiaofeng Zheng, Haixin Duan, ... -- Usenix 2022

"Building an Open, Robust, and Stable Voting-Based Domain Top List"

Xiaofeng Zheng, Baojun Liu, Haixin Duan, ... -- Usenix 2022

"Themis: Accelerating the Detection of Route Origin Hijacking by Distinguishing Legitimate and Illegitimate MOAS"

Lancheng Qin, Dan Li, Kang Wang, ... -- Usenix 2022

"AutoDA: Automated Decision-based Iterative Adversarial Attacks"

Qi-An Fu, Yinpeng Dong, Hang Su, Jun Zhu, Chao Zhang, ... -- Usenix 2022

"Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks"

Xuewei Feng, Qi Li, Gang Zhao, Chuanpu Fu, Ke Xu, ... -- Usenix 2022

"StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing"

Bodong Zhao, Zheming Li, Shisong Qin, Zheyu Ma, Ming Yuan, Wenyu Zhu, Chao Zhang, ... -- Usenix 2022