When HTTPS meets CDN: A case of authentication in delegated service J Liang, J Jiang, H Duan, K Li, T Wan, J Wu 2014 IEEE Symposium on Security and Privacy, 67-82, 2014 | 169 | 2014 |
An empirical reexamination of global DNS behavior H Gao, V Yegneswaran, Y Chen, P Porras, S Ghosh, J Jiang, H Duan ACM SIGCOMM Computer Communication Review 43 (4), 267-278, 2013 | 124 | 2013 |
Research on Botnet mechanisms and defenses J Jiang, JW Zhuge, HX Duan, JP Wu Ruanjian Xuebao/Journal of Software 23 (1), 82-96, 2012 | 76* | 2012 |
Cookies Lack Integrity: Real-World Implications X Zheng, J Jiang, J Liang, H Duan, S Chen, T Wan, N Weaver 24th USENIX Security Symposium (USENIX Security 15), 2015 | 69 | 2015 |
Hold-On: Protecting Against On-Path DNS Poisoning H Duan, N Weaver, Z Zhao, M Hu, J Liang, J Jiang, K Li, V Paxson SATIN, 2012 | 64 | 2012 |
Reexamining DNS From a Global Recursive Resolver Perspective H Gao, V Yegneswaran, J Jiang, Y Chen, P Porras, S Ghosh, H Duan IEEE/ACM Transactions on Networking, 2014 | 58 | 2014 |
Composition kills: A case study of email sender authentication J Chen, V Paxson, J Jiang 29th USENIX Security Symposium (USENIX Security 20), 2183-2199, 2020 | 55 | 2020 |
Forwarding-Loop Attacks in Content Delivery Networks J Chen, J Jiang, X Zheng, H Duan, J Liang, K Li, T Wan, V Paxson NDSS, 2016 | 48 | 2016 |
Measuring Query Latency of Top Level DNS Servers J Liang, J Jiang, H Duan, K Li, J Wu Passive and Active Measurement, 145-154, 2013 | 48 | 2013 |
Host of troubles: Multiple host ambiguities in http implementations J Chen, J Jiang, H Duan, N Weaver, T Wan, V Paxson Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 43 | 2016 |
Ghost Domain Names: Revoked Yet Still Resolvable J Jiang, J Liang, K Li, J Li, H Duan, J Wu NDSS, 2012 | 41 | 2012 |
We still {Don’t} have secure {Cross-Domain} requests: An empirical study of {CORS} J Chen, J Jiang, H Duan, T Wan, S Chen, V Paxson, M Yang 27th USENIX Security Symposium (USENIX Security 18), 1079-1093, 2018 | 38 | 2018 |
Abusing CDNs for fun and profit: Security issues in CDNs' origin validation R Guo, J Chen, B Liu, J Zhang, C Zhang, H Duan, T Wan, J Jiang, S Hao, ... 2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS), 1-10, 2018 | 33 | 2018 |
A federated identity management system with centralized trust and unified single sign-on J Jiang, H Duan, T Lin, F Qin, H Zhang 2011 6th International ICST Conference on Communications and Networking in …, 2011 | 27 | 2011 |
Analysis and measurement of zone dependency in the domain name system J Jiang, J Zhang, H Duan, K Li, W Liu 2018 IEEE International Conference on Communications (ICC), 1-7, 2018 | 12 | 2018 |
Path leaks of HTTPS Side-Channel by cookie injection F Chen, H Duan, X Zheng, J Jiang, J Chen Constructive Side-Channel Analysis and Secure Design: 9th International …, 2018 | 8 | 2018 |
Enhancing IP anycast with location redirection for stateful communication J Jiang Computer, Intelligent Computing and Education Technology, 86-91, 2014 | 1 | 2014 |
New Intrusion Detection Evasion Techniques with Signature Based Segmentation and Customized Overlap Patterns D Li, H Duan, J Jiang Proceedings of the 2013 International Conference on Business Computing and …, 2013 | 1 | 2013 |
Finding the best answer: measuring the optimization of public and authoritative DNS. J Zhang, HX Duan, J Jiang, J Liang, J Wu Sci. China Inf. Sci. 62 (3), 39107:1-39107:3, 2019 | | 2019 |