Shuang Hao
Cited by
Cited by
Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach
S Chen, M Xue, L Fan, S Hao, L Xu, H Zhu, B Li
computers & security 73, 326-344, 2018
Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine.
S Hao, NA Syed, N Feamster, AG Gray, S Krasser
USENIX Security Symposium, 101-118, 2009
DIFUZE: Interface Aware Fuzzing for Kernel Drivers
J Corina, A Machiry, C Salls, Y Shoshitaishvili, S Hao, C Kruegel, G Vigna
PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration
S Hao, A Kantchelian, B Miller, V Paxson, N Feamster
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
An End-to-End, Large-Scale Measurement of DNS-over-Encryption: How Far Have We Come?
C Lu, B Liu, Z Li, S Hao, H Duan, M Zhang, C Leng, Y Liu, Z Zhang, J Wu
Proceedings of the Internet Measurement Conference, 22-35, 2019
Understanding the Domain Registration Behavior of Spammers
S Hao, M Thomas, V Paxson, N Feamster, C Kreibich, C Grier, ...
Proceedings of the 2013 conference on Internet measurement conference, 63-76, 2013
Monitoring the Initial DNS Behavior of Malicious Domains
S Hao, N Feamster, R Pandrangi
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011
SEISMIC: SEcure In-lined Script Monitors for Interrupting Cryptojacks
W Wang, B Ferrell, X Xu, KW Hamlen, S Hao
European Symposium on Research in Computer Security, 122-142, 2018
Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path
B Liu, C Lu, H Duan, Y Liu, Z Li, S Hao, M Yang
27th USENIX Security Symposium, 2018
Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks
H Zheng, M Xue, H Lu, S Hao, H Zhu, X Liang, K Ross
Proceedings of Internet Society Symposium on Network and Distributed System …, 2018
A Reexamination of Internationalized Domain Names: the Good, the Bad and the Ugly
B Liu, C Lu, Z Li, Y Liu, H Duan, S Hao, Z Zhang
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
Something From Nothing (There): Collecting Global IPv6 Datasets From DNS
T Fiebig, K Borgolte, S Hao, C Kruegel, G Vigna
International Conference on Passive and Active Network Measurement, 30-43, 2017
On the Privacy and Security of the Ultrasound Ecosystem
V Mavroudis, S Hao, Y Fratantonio, F Maggi, C Kruegel, G Vigna
Proceedings on Privacy Enhancing Technologies 2017 (2), 95-112, 2017
Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates
K Borgolte, T Fiebig, S Hao, C Kruegel, G Vigna
Proceedings of Internet Society Symposium on Network and Distributed System …, 2018
Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones
K Borgolte, S Hao, T Fiebig, G Vigna
39th IEEE Symposium on Security and Privacy, 2018
Drops for Stuff: An Analysis of Reshipping Mule Scams
S Hao, K Borgolte, N Nikiforakis, G Stringhini, M Egele, M Eubanks, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
An Internet-Wide View into DNS Lookup Patterns
S Hao, N Feamster, R Pandrangi
White Paper privately published by VeriSign Labs, School of Computer Science …, 2010
Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting {DNS} Forwarding Devices
X Zheng, C Lu, J Peng, Q Yang, D Zhou, B Liu, K Man, S Hao, H Duan, ...
29th {USENIX} Security Symposium ({USENIX} Security 20), 577-593, 2020
Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks
K Shen, C Wang, M Guo, X Zheng, C Lu, B Liu, Y Zhao, S Hao, H Duan, ...
30th {USENIX} Security Symposium ({USENIX} Security 21), 2021
Characterizing Long-tail SEO Spam on Cloud Web Hosting Services
X Liao, C Liu, D McCoy, E Shi, S Hao, R Beyah
Proceedings of the 25th International Conference on World Wide Web, 321-332, 2016
The system can't perform the operation now. Try again later.
Articles 1–20