1.Bounce in the Wild: A Deep Dive into Email Delivery Failures from a Large Service Provider
Ruixuan Li, Shaodong Xiao, Baojun Liu, Yanzhong Lin, Haixin Duan, Qingfeng Pan, Jianjun Chen,Jia Zhang, Ximeng Liu, Xiuqi Lu, Jun Shao
Inthe IMC 2024, Nov. 4-6, 2024
2.TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets
Xiang Li, Wei Xu, Baojun Liu, Mingming Zhang, Zhou Li,Jia Zhang, Deliang Chang, Xiaofeng Zheng, Chuhan Wang, Jianjun Chen, Haixin Duan, Qi Li
Inthe S&P 2024, May. 20-23, 2024
3.Cross the Zone: Toward a Covert Domain Hijacking via Shared DNS Infrastructure
Yunyi Zhang, Mingming Zhang, Baojun Liu, Zhan Liu,Jia Zhang, Haixin Duan, Min Zhang, Fan Shi, Chengxi Xu
Inthe USENIX Security 2024, August 14–16, 2024
4.Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic
Yuqi Qing, Qilei Yin, Xinhao Deng, Yihao Chen, Zhuotao Liu, Kun Sun, Ke Xu,Jia Zhang, Qi Li
Inthe NDSS 2024, 26 February - 1 March, 2024
5.Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild
Zhenrui Zhang, Geng Hong, Xiang Li, Zhuoqun Fu,Jia Zhang*, Mingxuan Liu, Chuhan Wang, Jianjun Chen, Baojun Liu, Haixin Duan, Chao Zhang, Min Yang
Inthe CCS 2023, Nov. 26-30, 2023
6.Stolen Risks of Models with Security Properties
Yue Qin, Zhuoqun Fu, Chuyun Deng, Xiaojing Liao,Jia Zhang, Haixin Duan
Inthe CCS 2023, Nov. 26-30, 2023
7.TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers
Wei Xu, Xiang Li, Chaoyi Lu, Baojun Liu, Haixin Duan,Jia Zhang, Jianjun Chen, Tao Wan
Inthe CCS 2023, Nov. 26-30, 2023
8.Encrypted Malware Traffic Detection via Graph-based Network Analysis
Zhuoqun Fu, Mingxuan Liu, Yue Qin,Jia Zhang*, Yuan Zou, Qilei Yin, Qi Li, Haixin Duan
Inthe RAID 2022, Oct. 26-28, 2022
9.HDiff: A Semi-automatic Framework for Discovering Semantic Gap Attack in HTTP Implementations (Best Paper Runner-Up)
Kaiwen Shen, Jianyu Lu, Yaru Yang, Jianjun Chen, Mingming Zhang, Haixin Duan,Jia Zhang*, Xiaofeng Zheng
Inthe DSN 2022, June, 2022
10.ValCAT: Variable-Length Contextualized Adversarial Transformations Using Encoder-Decoder Language Model
Chuyun Deng, Mingxuan Liu, Yue Qin,Jia Zhang*, Haixin Duan, Donghong Sun
In the Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies.(NAACL 2022), July 2022.
11.Mingling of Clear and Muddy Water: Understanding and Detecting Semantic Confusion in Blackhat SEO
Hao Yang, Kun Du, Yubao Zhang, Shuai Hao, Haining Wang,Jia Zhang*, Haixin Duan
Inthe ESORICS 2021, Oct. 4-8, 2021
12.On Evaluating Delegated Digital Signing of Broadcasting Messages in 5G
Hui Gao, Yiming Zhang, Tao Wan,Jia Zhang*, Haixin Duan
Inthe IEEE GLOBECOM 2021, December 2021, p 1-7
13.CDN Backfired: Amplification Attacks Based on HTTP Range Requests (Best Paper Award)
Weizhong Li, Kaiwen Shen, Run Guo, Baojun Liu,Jia Zhang*, Haixin Duan*, Shuang Hao, Xiarun Chen, Yao Wang
Inthe 50th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2020), VALÈNCIA, SPAIN, 29th June - 2th July, 2020
14.CDN Judo: Breaking the CDN DoS Protection with Itself
Run Guo, Weizhong Li, Baojun Liu, Shuang Hao,Jia Zhang*, Haixin Duan*, Kaiwen Shen, Jianjun Chen, Ying Liu
Inthe 2020 Network and Distributed System Security Symposium (NDSS 2020), San Diego, CA, USA, Feb 2020