When HTTPS meets CDN: A case of authentication in delegated service J Liang, J Jiang, H Duan, K Li, T Wan, J Wu 2014 IEEE Symposium on Security and Privacy, 67-82, 2014 | 120 | 2014 |
An empirical reexamination of global DNS behavior H Gao, V Yegneswaran, Y Chen, P Porras, S Ghosh, J Jiang, H Duan ACM SIGCOMM Computer Communication Review 43 (4), 267-278, 2013 | 93 | 2013 |
Research on Botnet mechanisms and defenses J Jiang, JW Zhuge, HX Duan, JP Wu Ruanjian Xuebao/Journal of Software 23 (1), 82-96, 2012 | 85* | 2012 |
Cookies Lack Integrity: Real-World Implications X Zheng, J Jiang, J Liang, H Duan, S Chen, T Wan, N Weaver 24th USENIX Security Symposium (USENIX Security 15), 2015 | 54 | 2015 |
Hold-On: Protecting Against On-Path DNS Poisoning H Duan, N Weaver, Z Zhao, M Hu, J Liang, J Jiang, K Li, V Paxson SATIN, 2012 | 37 | 2012 |
Measuring Query Latency of Top Level DNS Servers J Liang, J Jiang, H Duan, K Li, J Wu Passive and Active Measurement, 145-154, 2013 | 30 | 2013 |
Reexamining DNS From a Global Recursive Resolver Perspective H Gao, V Yegneswaran, J Jiang, Y Chen, P Porras, S Ghosh, H Duan IEEE/ACM Transactions on Networking, 2014 | 28 | 2014 |
Ghost Domain Names: Revoked Yet Still Resolvable J Jiang, J Liang, K Li, J Li, H Duan, J Wu NDSS, 2012 | 28 | 2012 |
Forwarding-Loop Attacks in Content Delivery Networks J Chen, J Jiang, X Zheng, H Duan, J Liang, K Li, T Wan, V Paxson NDSS, 2016 | 25 | 2016 |
A federated identity management system with centralized trust and unified single sign-on J Jiang, H Duan, T Lin, F Qin, H Zhang 2011 6th International ICST Conference on Communications and Networking in …, 2011 | 19 | 2011 |
Host of troubles: Multiple host ambiguities in http implementations J Chen, J Jiang, H Duan, N Weaver, T Wan, V Paxson Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 17 | 2016 |
We Still Don’t Have Secure Cross-Domain Requests: an Empirical Study of {CORS} J Chen, J Jiang, H Duan, T Wan, S Chen, V Paxson, M Yang 27th {USENIX} Security Symposium ({USENIX} Security 18), 1079-1093, 2018 | 8 | 2018 |
Abusing cdns for fun and profit: Security issues in cdns' origin validation R Guo, J Chen, B Liu, J Zhang, C Zhang, H Duan, T Wan, J Jiang, S Hao, ... 2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS), 1-10, 2018 | 7 | 2018 |
Composition kills: A case study of email sender authentication J Chen, V Paxson, J Jiang 29th {USENIX} Security Symposium ({USENIX} Security 20), 2183-2199, 2020 | 3 | 2020 |
Analysis and measurement of zone dependency in the domain name system J Jiang, J Zhang, H Duan, K Li, W Liu 2018 IEEE International Conference on Communications (ICC), 1-7, 2018 | 3 | 2018 |
Path Leaks of HTTPS Side-Channel by Cookie Injection F Chen, H Duan, X Zheng, J Jiang, J Chen International Workshop on Constructive Side-Channel Analysis and Secure …, 2018 | 3 | 2018 |
Enhancing IP anycast with location redirection for stateful communication J Jiang Computer, Intelligent Computing and Education Technology 1 (2), 63-67, 2014 | 1 | 2014 |
New Intrusion Detection Evasion Techniques with Signature Based Segmentation and Customized Overlap Patterns D Li, H Duan, J Jiang Proceedings of the 2013 International Conference on Business Computing and …, 2013 | 1 | 2013 |
Finding the best answer: measuring the optimization of public and authoritative DNS J Zhang, H Duan, J Jiang, J Liang, J Wu Science China Information Sciences 62 (3), 1-3, 2019 | | 2019 |