Baojun Liu(刘保君)
Baojun Liu(刘保君)
Assistant Professor, Tsinghua University
Verified email at - Homepage
Cited by
Cited by
An end-to-end, large-scale measurement of dns-over-encryption: How far have we come?
C Lu, B Liu, Z Li, S Hao, H Duan, M Zhang, C Leng, Y Liu, Z Zhang, J Wu
Proceedings of the Internet Measurement Conference, 22-35, 2019
Resident evil: Understanding residential ip proxy as a dark service
X Mi, X Feng, X Liao, B Liu, XF Wang, F Qian, Z Li, S Alrwais, L Sun, Y Liu
2019 IEEE symposium on security and privacy (SP), 1185-1201, 2019
Who Is Answering My Queries: Understanding and Characterizing Hidden Interception of the DNS Resolution Path
B Liu, C Lu, H Duan, Y Liu, Z Li, S Hao, M Yang
Don't let one rotten apple spoil the whole barrel: Towards automated detection of shadowed domains
D Liu, Z Li, K Du, H Wang, B Liu, H Duan
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
A Reexamination of Internationalized Domain Names: The Good, the Bad and the Ugly.
B Liu, C Lu, Z Li, Y Liu, HX Duan, S Hao, Z Zhang
DSN, 654-665, 2018
Cracking wall of confinement: Understanding and analyzing malicious domain takedowns
E Alowaisheq
The Network and Distributed System Security Symposium (NDSS), 2019
Poison over troubled forwarders: A cache poisoning attack targeting {DNS} forwarding devices
X Zheng, C Lu, J Peng, Q Yang, D Zhou, B Liu, K Man, S Hao, H Duan, ...
29th USENIX Security Symposium (USENIX Security 20), 577-593, 2020
Weak links in authentication chains: A large-scale analysis of email sender spoofing attacks
K Shen, C Wang, M Guo, X Zheng, C Lu, B Liu, Y Zhao, S Hao, H Duan, ...
30th USENIX Security Symposium (USENIX Security 21), 3201-3217, 2021
From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR.
C Lu, B Liu, Y Zhang, Z Li, F Zhang, H Duan, Y Liu, JQ Chen, J Liang, ...
NDSS, 2021
Lies in the air: Characterizing fake-base-station spam ecosystem in china
Y Zhang, B Liu, C Lu, Z Li, H Duan, S Hao, M Liu, Y Liu, D Wang, Q Li
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
Fast IPv6 network periphery discovery and security implications
X Li, B Liu, X Zheng, H Duan, Q Li, Y Huang
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
Abusing CDNs for fun and profit: Security issues in CDNs' origin validation
R Guo, J Chen, B Liu, J Zhang, C Zhang, H Duan, T Wan, J Jiang, S Hao, ...
2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS), 1-10, 2018
A large-scale and longitudinal measurement study of {DKIM} deployment
C Wang, K Shen, M Guo, Y Zhao, M Zhang, J Chen, B Liu, X Zheng, ...
31st USENIX Security Symposium (USENIX Security 22), 1185-1201, 2022
Building an Open, Robust, and Stable {Voting-Based} Domain Top List
Q Xie, S Tang, X Zheng, Q Lin, B Liu, H Duan, F Li
31st USENIX Security Symposium (USENIX Security 22), 625-642, 2022
Talking with familiar strangers: An empirical study on https context confusion attacks
M Zhang, X Zheng, K Shen, Z Kong, C Lu, Y Wang, H Duan, S Hao, B Liu, ...
Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020
CDN Judo: Breaking the CDN DoS Protection with Itself.
R Guo, W Li, B Liu, S Hao, J Zhang, H Duan, K Sheng, J Chen, Y Liu
NDSS, 2020
Measuring the practical effect of dns root server instances: A china-wide case study
F Zhang, C Lu, B Liu, H Duan, Y Liu
International Conference on Passive and Active Network Measurement, 247-263, 2022
Detecting and characterizing SMS spearphishing attacks
M Liu, Y Zhang, B Liu, Z Li, H Duan, D Sun
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
Rusted anchors: A national client-side view of hidden root CAs in the web PKI ecosystem
Y Zhang, B Liu, C Lu, Z Li, H Duan, J Li, Z Zhang
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP.
X Feng, Q Li, K Sun, K Xu, B Liu, X Zheng, Q Yang, H Duan, Z Qian
NDSS, 2022
The system can't perform the operation now. Try again later.
Articles 1–20