Publications
-
L. Xing, Y. Chen, X. Wang and S. Chen, 2013 “InteGuard: Toward Automatic Protection of Third-Party Web Service Integrations”. To appear in Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS).
-
Z. Li, K. Zhang, Y. Xie, F. Yu and X. Wang, 2012 “Knowing Your Enemy: Understanding and Detecting Malicious Web Advertising”. In Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS).
-
R. Wang, S. Chen and X. Wang, 2012 “Signing Me onto Your Accounts through Facebook and Google: a Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services”. In Proceedings of the 33rd IEEE Symposium on Security and Privacy (IEEE S&P).
-
Y. Chen, B. Peng, X. Wang and H. Tang, 2012 “Large-Scale Privacy-Preserving Mappings of Human Genomic Sequences on Hybrid Clouds”. In Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS).
-
K. Zhang, X. Zhou, Y. Chen, X. Wang and Y. Ruan, 2011 “Sedic: Privacy-Aware Data Intensive Computing on Hybrid Clouds”. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS).
-
X. Zhou, B. Peng, Y. Li, Y. Chen, H. Tang and X. Wang, 2011 “To Release or Not to Release: Evaluating Information Leaks in Aggregate Human-Genome Data”. In Proceeding of European Symposium on Research in Computer Security (ESORICS).
-
R. Wang, S. Chen, X. Wang, and S. Qadeer, 2011 “How to Shop for Free Online – Security Analysis of Cashier-as-a-Service Based Web Stores”. In Proceedings of the 32nd IEEE Symposium on Security and Privacy (IEEE S&P Oakland).
-
R. Schlegel, K. Zhang, X. Zhou, M. Intwala, A. Kapadia and X. Wang, 2011 “Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones”. In Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS).
-
Z. Li and X. Wang, 2010 “FIRM: Capability-based Inline Mediation of Flash Behaviors”. In Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC).
-
K. Zhang, Z. Li, R. Wang, X. Wang and S. Chen, 2010 “Sidebuster: Automated Detection and Quantification of Side-Channel Leaks in Web Application Development”. In Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS).
Video Demo
-
Z. Li, K. Zhang and X. Wang, 2010 "Mash-IF: Practical Information-Flow Control within Client-side Mashups". In Proceedings of the 40th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
-
S. Chen, R. Wang, X. Wang and K. Zhang, 2010 “Side-Channel Leaks in Web Applications: a Reality Today, a Challenge Tomorrow”. In Proceedings of the 31st IEEE Symposium on Security and Privacy (IEEE S&P Oakland).
-
R. Wang, X. Wang, Z. Li, H. Tang, M. Reiter and Z. Dong, 2009 "Privacy-Preserving Genomic Computation Through Program Specialization". In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS).
-
R. Wang, Y. Li, X. Wang, H. Tang and X. Zhou, 2009 "Learning Your Identity and Disease from Research Papers: Information Leaks in Genome Wide Association Study". In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS).
-
K. Zhang and X. Wang, 2009 "Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-user Systems". In Proceeding of the USENIX Security Symposium (Security).
-
C. Kolbitsch, P. Milani, C. Kruegel, E. Kirda, X. Zhou and X. Wang, 2009 “Effective and Efficient Malware Detection at the End Host”. In Proceeding of the USENIX Security Symposium (Security).
-
D. Liu, L. Jean Camp and X. Wang, 2009 “Mitigating Insider Threats with Incentives”. In Proceedings of the 13th International Conference on Financial Cryptography and Data Security (FC).
- R. Wang, X. Wang, K. Zhang and Z. Li. 2008 "Towards Automatic Reverse Engineering of Security Configurations". Proceedings of the 15th ACM Conference on Computer and Communication Security (CCS).
-
R. Wang, X. Wang and Z. Li.2008 "Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software". In Proceedings of the 17th USENIX Security Symposium (Security 2008).
-
Z. Li, X. Wang, Z. Liang and M. K. Reiter. 2008 "AGIS: Automatic Generation of Infection Signatures". In Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2008).
-
C. Richard, G. Philippe, M. Jakobsson, L. Wang and X. Wang. 2008 "Making CAPTCHAs Clickable". In Proceedings of Workshop on Mobile Computing Systems and Applications (HotMobile).
-
X. Wang, Z. Li, N. Li and J. Choi. 2008 "PRECIP: Towards Practical and Retrofittable Confidential Information Protection". In Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS).
-
X. Wang. 2008 "Case Study: A Defense-in-Depth Framework Against Spyware". A book chapter to appear in the book "Crimeware", edited by M. Jakobsson and Z. Ramzan, Addison-Wesley Professional.
-
X. Wang and M. K. Reiter. 2007 "A Multi-layer Framework for Puzzle-based Denial-of-Service Defense". International Journal of Information Security, August 2007. (the paper is an extension of our papers on Congestion Puzzles and Puzzle Auctions)
-
Z. Li, X. Wang and J. Choi. 2007 "Spyshield: Preserving privacy from spyware add-ons". In Proceedings of the Recent Advance in Intrusion Detection (RAID).
-
X. Wang, Z. Li, J. Xu, M. Reiter, C. Kil and J. Choi. 2006 "Packet Vaccine: Black-box Exploit Detection and Signature Generation". In Proceedings of the 13th ACM Conference on Computer and Communication Security (CCS).
-
X. Wang and M. Reiter. 2006 "WRAPS: Denial-of-Service Defense through Web Referrals". In Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS).
-
J. Li, N. Li, X. Wang, and T. Yu. 2006 "Denial of Service Attacks and Defenses in Decentralized Trust Management". In Proceedings of the Second International Conference on Security and Privacy in Communication Networks (SecureComm).
-
P. Golle, X. Wang, M. Jakobsson and A. Tsow. 2006 "Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks". In Proceedings of IEEE Symposium on Security and Privacy (IEEE S&P Oakland).
-
M. Reiter, X. Wang and M. Wright. 2005 "Building a Reliable Mix Network through Fair Exchange". In Proceedings of the 3th International Conference on Applied Cryptography and Network Security (ACNS). LNCS 3531, Springer-Verlag.
-
M. Reiter, X. Wang. 2004 "Fragile Mixing". In Proceedings of 11th ACM Conference on Computer and Communication Security (CCS).
-
X. Wang, M. Reiter. 2004 "Mitigating Bandwidth-Exhaustion Attacks using Congestion Puzzles". In Proceedings of 11th ACM Conference on Computer and Communications Security (CCS).
-
M. Jakobosson, X. Wang and S. Wetzel. 2004 "Stealth Attacks on Vehicular Wireless Networks". Invited paper. In Proceedings of IEEE Vehicular Technology Conference 2004-Fall "Wireless Technologies for Global Security" (VTC2004)
-
X. Wang and M.K. Reiter. 2003. “Defending Against Denial-of-Service Attacks with Puzzle Auctions”, In Proceedings of IEEE Symposium on Security and Privacy (IEEE S&P Oakland).
-
X. Wang and T.Sandholm. 2003 "Learning Near-Pareto-Optimal Conventions in Polynomial Time". In Proceedings of the 17th Neural Information Processing Systems: Natural and Synthetic conference.
-
X. Wang and T. Sandholm. 2002. “Reinforcement Learning to Play An Optimal Nash Equilibrium in Team Markov Games”, In Proceedings of the 16th Neural Information Processing Systems: Natural and Synthetic conference (NIPS).
-
T. Sandholm and X. Wang. 2002. “(Im)possibility of Safe Exchange Mechanism Design”. In Proceedings of National Conference on Artificial Intelligence (AAAI).