NISL

2018

  1. “Kun Yang, Yuan Deng, Chao Zhang, Jianwei Zhuge, Haixin Duan” ICUFuzzer: Fuzzing ICU Library for Exploitable Bugs in Multiple Software 21st Information Security Conference (ISC 2018) “London (Guildford), UK” 9-12 Sep 2018
  2. “Yan Wang, Chao Zhang, Xiaobo Xiang, Zixuan Zhao, Wenjie Li, Xiaorui Gong, Bingchang Liu, Kaixiang Chen, Wei Zou” Revery: from Proof-of-Concept to Exploitable (One Step towards Automatic Exploit Generation) ACM Conference on Computer and Communications Security (CCS’18) “Toronto, Canada” Oct-18
  3. “Yukun Liu, Zhuge Jianwei, and Chao Zhang” CBTracer: Continuously Building Datasets for Binary Vulnerability and Exploit Researc AsiaCCS 1st Radical and Experiential Security Workshop “Incheon, Republic of Korea” 4-Jun-18
  4. “Jun Li, Bodong Zhao, Chao Zhang*” Fuzzing: a survey Cybersecurity
  5. “Run Guo, Jianjun Chen, Baojun Liu, Jia Zhang, Chao Zhang, Haixin Duan, Tao Wan, Jian Jiang, Shuang Hao, Yaoqi Jia” Abusing CDNs for Fun and Profit: Security Issues in CDNs’ Origin Validation 37th IEEE International Symposium on Reliable Distributed Systems “Bahia, Brazil” “ October 2 - 5, 2018”
  6. “Shuitao Gan, Chao Zhang*, Xiaojun Qin, Xuwen Tu, Kang Li, Zhongyu Pei, Zuoning Chen” CollAFL: Path Sensitive Fuzzing “39th IEEE Symposium on Security and Privacy, SP 2018 “ “San Francisco, CA” “May 21, 2018 - May 23, 2018”
  7. “Binchang Liu, Wei Huo, Chao Zhang, Wenchao Li, Feng Li, Aihua Piao, Wei Zou” αDiff: Cross-Version Binary Code Similarity Detection with DNN “the 33rd ACM/IEEE International Conference on Automated Software Engineering, ASE 2018” “Montpellier, France” “September 3-7, 2018”
  8. “Kai Gao, Jingxuan Zhang, Y. Richard Yang, Jun Bi” “Prophet: Fast, Accurate Throughput Prediction with Reactive Flows” the 36th IEEE International Conference on Computer Communications “Honolulu, USA” 15-19 April 2018
  9. “Yukun Liu, Jianwei Zhuge, Chao Zhang*” CBTracer: Continuously Building Datasets for Binary Vulnerability and Exploit Research “1st Workshop on Radical and Experiential Security, RESEC 2018” “Incheon, Korea” Jun-18
  10. ” Shenglin Zhang, Ying Liu, Weibin Meng, Zhiling Luo, Jiahao Bu, Sen Yang, Peixian Liang, Dan Pei, Jun (Jim) Xu, Yu Chen, Hui Dong, Xianping Qu, Lei Song” PreFix: Switch Failure Prediction in Datacenter Networks ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems “Urbana-Champaign, Illinois, USA” SIGMETRICS 2018
  11. Baojun Liu,Chaoyi Lu,Zhou Li, Ying Liu,Haixin Duan,Shuang Hao,Zaifeng Zhang (Netlab of 360) “A Reexamination of Internationalized Domain Names: the Good,the Bad and the Ugly” “8th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2018” Luxembourg “June 25-28, 2018 “
  12. “Weibin Meng, Ying LIU,etc” Device-Agnostic Log Anomaly Classification with Partial Labels IWQOS2018
  13. ” LIN HE, YING LIU AND GANG REN” Network-Layer Accountability Protocols: A Survey IEEE ACCESS
  14. “Haowen Xu, Wenxiao Chen, Nengwen Zhao, Zeyan Li, Jiahao Bu, Zhihan Li, Ying Liu, Youjian Zhao, Dan Pei, Yang Feng, Jie Chen, Zhaogang Wang and Honglin Qiao” Unsupervised Anomaly Detection via Variational Auto-Encoder for Seasonal KPIs in Web Applications 27th international world wide web conference (www 2018),IW3C2
  15. “Baojun Liu, Chaoyi Lu, Haixin Duan, Ying Liu, Zhou Li, Shuang Hao and Min Yang.” Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path 27th USENIX Security Symposium “ Baltimore, MD, USA” “August 15–17, 2018”
  16. “Jianjun Chen, Tsinghua University; Jian Jiang, Shape Security; Haixin Duan, Tsinghua University; Tao Wan, Huawei Canada; Shuo Chen, Microsoft Research; Vern Paxson, UC Berkeley, ICSI; Min Yang, Fudan University” We Still Don’t Have Secure Cross-Domain Requests: an Empirical Study of CORS 27th USENIX Security Symposium “ Baltimore, MD, USA” “August 15–17, 2018”
  17. “Jiahao Bu, Ying Liu, Shenglin Zhang, Weibin Meng, Qitong Liu, Xiaotian Zhux, Dan Peiy” Rapid Deployment of Anomaly Detection Models for Large Number of Emerging KPI Streams 37th IEEE International Performance Computing and Communications Conference,IPCCC 2018 “Orlando, Florida, USA” “November,17-19”
  18. “Chen, Fuqing and Duan, Haixin and Zheng, Xiaofeng and Jiang, Jian and Chen, Jianjun.” Path Leaks of HTTPS Side-Channel by Cookie Injection International Workshop on Constructive Side-Channel Analysis and Secure Design(COSADE 2018) Singapore Apr-18

2017

  1. “郭毅, 段海新, 张连成, 邱菡” A threat perception method for inter-domain routing systems based on weighted similarity “中国科学: 信息科学 SCIENCE CHINA Information Sciences” 47 7 878-890
  2. “Xiangkun Jia, Chao Zhang, Purui Su, Yi Yang, Huafeng Huang, Dengguo Feng” Towards Efficient Heap Overflow Discovery USENIX Security 2017 “Vancouver, BC, Canada” 2017/8/15 989-1006
  3. “Yuan Li, Chao Zhang, Xiapu Luo” vCFI: Visible Control Flow Integrity for Cloud Tenants 2nd Workshop on System Software for Trusted Execution (SysTEX 2017) “Shanghai, China” 2017/10/28
  4. “Jun Li, Chao Zhang” Semantic Sensitive Coverage-based Fuzzing “2nd International Conference on Communications, Information Management and Network Security (CIMNS2017)” “Beijing, China” “Oct 22, 2017 - Oct 23, 2017”
  5. “Jia Zhang, Haixin Duan, Wu Liu, Xingkun Yao” How to Notify a Vulnerability to the Right Person? Case Study: In an ISP Scope Globecom 2017 Singapore “Dec.4-8,2017”
  6. “H Yang, X Ma, K Du, Z Li, H Duan, X Su, G Liu, Z Geng, J Wu” How to Learn Klingon Without a Dictionary: Detection and Measurement of Black Keywords Used by the Underground Economy IEEE S&P 2017 “SAN JOSE, CA, USA” “MAY 22-24, 2017”
  7. “D Liu, Z Li, K Du, H Wang, B Liu, H Duan” Don’t Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains CCS 2017 “Dallas, USA” Oct 30th–Nov 3rd

2016

  1. “Guo, Yi; Duan, Haixin; Chen, Jikun; Miao, Fu” MAF-SAM: An effective method to perceive data plane threats of inter domain routing system COMPUTER NETWORKS 110 69-78
  2. “Yangyang Wang, Jun Bi, Keyao Zhang” A Tool for Tracing Network Data Plane via SDN/OpenFlow SCIENCE CHINA Information Sciences 60 2
  3. “Yang Haiyu, Zhuge Jianwei*, Liu Wei and Liu Huiming “ AMExtractor: A Widely Applicable Tool for Volatile Memory Acquisition on Android Devices IFIP 11.9 International Conference on Digital Forensics “New Delhi, India” “January 4-6, 2016”
  4. 刘惠明,诸葛建伟 “安卓应用自动原生化及混淆系统 Automatic Android Apps Translation and Obfuscation System” 微电子学与计算机 33 10 59-62+67
  5. “Yang Haiyu, Zhuge Jianwei*, Liu Wei and Liu Huiming “ A tool for volatile memory acquisition from android devices 12th IFIP WG 11.9 International Conference on Advances in Digital Forensics “New Delhi, India” “January 4, 2016 - January 6, 2016” 365-378
  6. “Jianjun Chen, Jian Jiang, Haixin Duan, Nick Weaver, Tao Wan, Vern Paxson.” Host of Troubles: Multiple Host Ambiguities in HTTP Implementations “23rd ACM Conference on Computer and Communications Security, CCS 2016” “ Vienna, Austria” “ October 24, 2016 - October 28, 2016” 1516-1527
  7. “Kun Du, Hao Yang, Zhou Li, Haixin Duan(*), Kehuan Zhang. “ The Ever-changing Labyrinth: A Large-scale Analysis of Wildcard DNS Powered Blackhat SEO USENIX Security 2016 “Vancouver, Canada, Texas” 2016
  8. “Xiaojing Liao,Kan Yuan, Xiaofeng Wang(), Zhongyu Pei,Hao Yang, Jianjun Chen, Haixin Duan(), Kun Du, Eihal Alowaisheq, Sumayah Alrwais, Luyi Xing, Raheem Beyah” “Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search” “2016 IEEE Symposium on Security and Privacy, SP 2016” “San Jose, CA, United states” “May 23, 2016 - May 25, 2016” 707-723
  9. “Jianjun Chen, Jian Jiang, Xiaofeng Zheng, Haixin Duan, Jinjin Liang, Tao Wan, Kang Li, Vern Paxson” Forwarding-Loop Attacks in Content Delivery Networks NDSS 2016 San Diego california 2016 CCF B类会议,记作EI
  10. “Chao Zhang, Scott A. Carr, Tongxin Li, Yu Ding, Chengyu Song, Mathias Payer, Dawn Song ” VTrust: Regaining Trust on Virtual Calls Network and Distributed System Security Symposium (NDSS’16) “San Diego, CA” Feb 2016 CCF B类会议,记作EI
  11. “Yu Ding, Tao Wei, Hui Xue, Yulong Zhang, Chao Zhang, Xinhui Han” Accurate and Efficient Exploit Capture and Classification SCIENCE CHINA Information Sciences (SCIS) 60 5
  12. 张慧琳,丁羽,张利华,段镭,张超,韦韬,李冠成,韩心慧 “基于敏感字符的SQL注入攻击防御方法 SQL injection Prevention Based on Sensitive Characters” 计算机研究与发展 53 10 2262-2276
  13. “Song Li, Haixin Duan, Zhiliang Wang, Jinjin Liang, Xing Li” An accurate distributed scheme for detection of prefix interception SCIENCE CHINA Information Sciences 59 5