Follow
Xiaojing Liao
Xiaojing Liao
Verified email at indiana.edu
Title
Cited by
Cited by
Year
Acing the ioc game: Toward automatic discovery and analysis of open-source cyber threat intelligence
X Liao, K Yuan, XF Wang, Z Li, L Xing, R Beyah
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
2642016
Semfuzz: Semantics-based automatic generation of proof-of-concept exploits
W You, P Zong, K Chen, XF Wang, X Liao, P Bian, B Liang
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
982017
Systems and methods for detection of infected websites
X Wang, K Yuan, X Liao, RA Beyah
US Patent 10,880,330, 2020
752020
Resident evil: Understanding residential IP proxy as a dark service
X Mi, X Feng, X Liao, B Liu, XF Wang, F Qian, Z Li, S Alrwais, L Sun, Y Liu
2019 IEEE symposium on security and privacy (SP), 1185-1201, 2019
642019
Stealthy porn: Understanding real-world adversarial images for illicit online promotion
K Yuan, D Tang, X Liao, XF Wang, X Feng, Y Chen, M Sun, H Lu, K Zhang
2019 IEEE Symposium on Security and Privacy (SP), 952-966, 2019
462019
Staying secure and unprepared: Understanding and mitigating the security risks of apple zeroconf
X Bai, L Xing, N Zhang, XF Wang, X Liao, T Li, SM Hu
2016 IEEE Symposium on Security and Privacy (SP), 655-674, 2016
452016
Under the shadow of sunshine: Understanding and detecting bulletproof hosting on legitimate service provider networks
S Alrwais, X Liao, X Mi, P Wang, XF Wang, F Qian, R Beyah, D McCoy
2017 IEEE Symposium on Security and Privacy (SP), 805-823, 2017
432017
Cracking app isolation on apple: Unauthorized cross-app resource access on MAC os~ x and ios
L Xing, X Bai, T Li, XF Wang, K Chen, X Liao, SM Hu, X Han
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
432015
Cracking app isolation on apple: Unauthorized cross-app resource access on MAC os~ x and ios
L Xing, X Bai, T Li, XF Wang, K Chen, X Liao, SM Hu, X Han
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
432015
Seeking nonsense, looking for trouble: Efficient promotional-infection detection through semantic inconsistency search
X Liao, K Yuan, XF Wang, Z Pei, H Yang, J Chen, H Duan, K Du, ...
2016 IEEE Symposium on Security and Privacy (SP), 707-723, 2016
412016
Privacy-preserving and secure top-k query in two-tier wireless sensor network
X Liao, J Li
2012 IEEE Global Communications Conference (GLOBECOM), 335-341, 2012
392012
Reading Thieves' cant: automatically identifying and understanding dark jargons from cybercrime marketplaces
K Yuan, H Lu, X Liao, XF Wang
27th USENIX Security Symposium (USENIX Security 18), 1027-1041, 2018
372018
Understanding and securing device vulnerabilities through automated bug report analysis
X Feng, X Liao, X Wang, H Wang, Q Li, K Yang, H Zhu, L Sun
SEC'19: Proceedings of the 28th USENIX Conference on Security Symposium, 2019
312019
Cracking wall of confinement: Understanding and analyzing malicious domain takedowns
E Alowaisheq
The Network and Distributed System Security Symposium (NDSS), 2019
302019
Di-PriDA: Differentially private distributed load balancing control for the smart grid
X Liao, P Srinivasan, D Formby, RA Beyah
IEEE Transactions on Dependable and Secure Computing 16 (6), 1026-1039, 2017
292017
Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation Analysis.
Y Chen, L Xing, Y Qin, X Liao, XF Wang, K Chen, W Zou
USENIX security symposium, 747-764, 2019
282019
Characterizing long-tail SEO spam on cloud web hosting services
X Liao, C Liu, D McCoy, E Shi, S Hao, R Beyah
Proceedings of the 25th International Conference on World Wide Web, 321-332, 2016
272016
Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications.
L Su, X Shen, X Du, X Liao, XF Wang, L Xing, B Liu
USENIX Security Symposium, 1307-1324, 2021
252021
Zombie awakening: Stealthy hijacking of active domains through DNS hosting referral
E Alowaisheq, S Tang, Z Wang, F Alharbi, X Liao, XF Wang
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
192020
Catching predators at watering holes: finding and understanding strategically compromised websites
S Alrwais, K Yuan, E Alowaisheq, X Liao, A Oprea, XF Wang, Z Li
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
182016
The system can't perform the operation now. Try again later.
Articles 1–20