Clickjacking: attacks and defenses LS Huang, A Moshchuk, HJ Wang, S Schechter, C Jackson Proceedings of the 21st USENIX Security Symposium, 2012 | 222 | 2012 |
Analyzing Forged SSL Certificates in the Wild LS Huang, A Rice, E Ellingsen, C Jackson Proceedings of the 2014 IEEE Symposium on Security and Privacy, 83-97, 2014 | 207 | 2014 |
Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure THJ Kim, LS Huang, A Perrig, C Jackson, V Gligor Proceedings of the 22nd international conference on World Wide Web, 679-690, 2013 | 191 | 2013 |
Towards Short-Lived Certificates E Topalovic, B Saeta, LS Huang, C Jackson, D Boneh Web 2.0 Security and Privacy, 2012 | 86 | 2012 |
Protecting browsers from cross-origin CSS attacks LS Huang, Z Weinberg, C Evans, C Jackson Proceedings of the 17th ACM conference on Computer and Communications …, 2010 | 66 | 2010 |
The case for prefetching and prevalidating TLS server certificates E Stark, LS Huang, D Israni, C Jackson, D Boneh Proceedings of the 19th Network and Distributed System Security Symposium, 2012 | 56 | 2012 |
An Experimental Study of TLS Forward Secrecy Deployments LS Huang, S Adhikarla, D Boneh, C Jackson Web 2.0 Security and Privacy, 2014 | 54 | 2014 |
Talking to yourself for fun and profit LS Huang, EY Chen, A Barth, E Rescorla, C Jackson Web 2.0 Security and Privacy, 2011 | 44* | 2011 |
Clickjacking attacks unresolved LS Huang, C Jackson Technical Report, 2011 | 23 | 2011 |
All Your Screens are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API Y Tian, YC Liu, A Bhosale, LS Huang, P Tague, C Jackson Proceedings of the 2014 IEEE Symposium on Security and Privacy, 34-48, 2014 | 18 | 2014 |
A rate-distortion optimization model for SVC inter-layer encoding and bitstream extraction WH Peng, JK Zao, HT Huang, TW Wang, LS Huang Journal of Visual Communication and Image Representation 19 (8), 543-557, 2008 | 18 | 2008 |
Trickle: resilient real-time video multicasting for dynamic peers with limited or asymmetric network connectivity YH Guo, JK Zao, WH Peng, LS Huang, FP Kuo, CM Lin Eighth IEEE International Symposium on Multimedia (ISM'06), 391-398, 2006 | 15 | 2006 |
Rate-distortion optimized SVC bitstream extraction for heterogeneous devices: A preliminary investigation WH Peng, LS Huang, JK Zao, JS Lu, TW Wang, HT Huang, LC Kuo Ninth IEEE International Symposium on Multimedia Workshops (ISMW 2007), 407-412, 2007 | 12 | 2007 |
Transparent Key Integrity (TKI): A Proposal for a Public-Key Validation Infrastructure THJ Kim, LS Huang, A Perrig, C Jackson, VD Gligor Technical Report, 2012 | 8 | 2012 |
Transparent proxies: Threat or menace LS Huang, EY Chen, A Barth, E Rescorla, C Jackson Technical Report, 2010 | 6* | 2010 |
Darwin: a ground truth agnostic CAPTCHA generator using evolutionary algorithm EY Chen, LS Huang, OJ Mengshoel, JD Lohn Proceedings of the Companion Publication of the 2014 Annual Conference on …, 2014 | 4 | 2014 |
User Interface Security Directives for Content Security Policy. W3C Working Draft, W3C, March 2014. Work in progress G Maone, DLS Huang, T Gondrom, B Hill | 4* | |
Techniques for ranking character searches KY Tseng, LS Huang, YH Chiang, CY Chen US Patent 9,195,716, 2015 | 3 | 2015 |
Techniques for ranking character searches KY Tseng, LS Huang, YH Chiang, CY Chen US Patent 9,830,362, 2017 | | 2017 |
Protecting Browsers from Network Intermediaries LS Huang Carnegie Mellon University, 2014 | | 2014 |