Guofei Gu

According to our database1, Guofei Gu authored at least 99 papers between 2003 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
LinkScope: Toward Detecting Target Link Flooding Attacks.
IEEE Trans. Information Forensics and Security, 2018

Shadow Attacks Based on Password Reuses: A Quantitative Empirical Analysis.
IEEE Trans. Dependable Sec. Comput., 2018

Security and performance of software-defined networks and functions virtualization.
Computer Networks, 2018

Uncovering HTTP Header Inconsistencies and the Impact on Desktop/Mobile Websites.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage Enabled Mobile Applications.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Mobile Application Web API Reconnaissance: Web-to-Mobile Inconsistencies & Vulnerabilities.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Control Plane Reflection Attacks in SDNs: New Attacks and Countermeasures.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Error-Sensor: Mining Information from HTTP Error Traffic for Malware Intelligence.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Automated Generation of Event-Oriented Exploits in Android Hybrid Apps.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Effective Topology Tampering Attacks and Defenses in Software-Defined Networks.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

2017
Flow Wars: Systemizing the Attack Surface and Defenses in Software-Defined Networks.
IEEE/ACM Trans. Netw., 2017

Identifying User-Input Privacy in Mobile Applications at a Large Scale.
IEEE Trans. Information Forensics and Security, 2017

Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART.
Proceedings of the 26th USENIX Security Symposium, 2017

Attacking the Brain: Races in the SDN Control Plane.
Proceedings of the 26th USENIX Security Symposium, 2017

Precisely and Scalably Vetting JavaScript Bridge in Android Hybrid Apps.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Bring your own controller: Enabling tenant-defined SDN apps in IaaS clouds.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Understanding the Market-Level and Network-Level Behaviors of the Android Malware Ecosystem.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

EvilDirect: A New Wi-Fi Direct Hijacking Attack and Countermeasures.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Building a Security OS With Software Defined Infrastructure.
Proceedings of the 8th Asia-Pacific Workshop on Systems, Mumbai, India, September 2, 2017, 2017

2016
Rethinking Permission Enforcement Mechanism on Mobile Systems.
IEEE Trans. Information Forensics and Security, 2016

PRIDE: A practical intrusion detection system for resource constrained wireless mesh networks.
Computers & Security, 2016

Towards SDN-Defined Programmable BYOD (Bring Your Own Device) Security.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Hunting for invisibility: Characterizing and detecting malicious web infrastructures through server visibility analysis.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Enhancing Network Security through Software Defined Networking (SDN).
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

2015
Malware Propagation in Large-Scale Networks.
IEEE Trans. Knowl. Data Eng., 2015

A First Step Toward Network Security Virtualization: From Concept To Prototype.
IEEE Trans. Information Forensics and Security, 2015

VulHunter: Toward Discovering Vulnerabilities in Android Applications.
IEEE Micro, 2015

UIPicker: User-Input Privacy Identification in Mobile Applications.
Proceedings of the 24th USENIX Security Symposium, 2015

FineDroid: Enforcing Permissions with System-Wide Application Execution Context.
Proceedings of the Security and Privacy in Communication Networks, 2015

Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps.
Proceedings of the Security and Privacy in Communication Networks, 2015

Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

What is wrecking your data plan? A measurement study of mobile web overhead.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Systematic Mining of Associated Server Herds for Malware Campaign Discovery.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

FloodGuard: A DoS Attack Prevention Extension in Software-Defined Networks.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

2014
Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps.
IEEE Trans. Information Forensics and Security, 2014

Characterizing Google Hacking: A First Large-Scale Quantitative Study.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-On Cross Site Scripting Attacks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

GoldenEye: Efficiently and Effectively Unveiling Malware's Targeted Environment.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

CyberProbe: Towards Internet-Scale Active Detection of Malicious Servers.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications.
Proceedings of the Computer Security - ESORICS 2014, 2014

SRID: State Relation Based Intrusion Detection for False Data Injection Attacks in SCADA.
Proceedings of the Computer Security - ESORICS 2014, 2014

AUTOPROBE: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

A taste of tweets: reverse engineering Twitter spammers.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers.
IEEE Trans. Information Forensics and Security, 2013

EFFORT: A new host-network cooperated framework for efficient and effective bot malware detection.
Computer Networks, 2013

Editorial for Computer Networks special issue on ''Botnet Activity: Analysis, Detection and Shutdown''.
Computer Networks, 2013

Attacking software-defined networks: a first feasibility study.
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, 2013

NEIGHBORWATCHER: A Content-Agnostic Comment Spam Inference System.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

FRESCO: Modular Composable Security Services for Software-Defined Networks.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

PRIDE: Practical Intrusion Detection in Resource Constrained Wireless Mesh Networks.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

AUTOVAC: Automatically Extracting System Resource Constraints and Generating Vaccines for Malware Immunization.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

Model checking invariant security properties in OpenFlow.
Proceedings of IEEE International Conference on Communications, 2013

CATS: Characterizing automation of Twitter spammers.
Proceedings of the Fifth International Conference on Communication Systems and Networks, 2013

NOMAD: Towards non-intrusive moving-target defense against web bots.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Vetting undesirable behaviors in android apps with permission use analysis.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

AppIntent: analyzing sensitive data transmission in android for privacy leakage detection.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Shadow attacks: automatically evading system-call-behavior based malware detection.
Journal in Computer Virology, 2012

Active User-Side Evil Twin Access Point Detection Using Statistical Techniques.
IEEE Trans. Information Forensics and Security, 2012

A Large-Scale Empirical Study of Conficker.
IEEE Trans. Information Forensics and Security, 2012

Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter.
Proceedings of the 21st World Wide Web Conference 2012, 2012

A security enforcement kernel for OpenFlow networks.
Proceedings of the first workshop on Hot topics in software defined networks, 2012

PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

EFFORT: Efficient and effective bot malware detection.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?).
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

SmartDroid: an automatic system for revealing UI-based trigger conditions in android applications.
Proceedings of the SPSM'12, 2012

Detecting money-stealing apps in alternative Android markets.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Automatic generation of vaccines for malware immunization.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

PeerPress: utilizing enemies' P2P strength against them.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Machine learning meets social networking security: detecting and analyzing malicious social networks for fun and profit.
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, 2012

2011
Botnet Detection in Enterprise Networks.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic Execution.
ACM Trans. Inf. Syst. Secur., 2011

Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

Cross-Analysis of Botnet Victims: New Insights and Implications.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

Boosting the scalability of botnet detection using adaptive traffic sampling.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

WebPatrol: automated collection and replay of web-based malware scenarios.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

SEMAGE: a new image-based two-factor CAPTCHA.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Privacy-Preserving Matching Protocols for Attributes and Strings.
IACR Cryptology ePrint Archive, 2010

TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Who is peeping at your passwords at Starbucks? - To catch an evil twin access point.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

Conficker and beyond: a large-scale empirical study.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Active Botnet Probing to Identify Obscure Command and Control Channels.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
A Taxonomy of Botnet Structures.
Proceedings of the Botnet Detection: Countering the Largest Security Threat, 2008

Correlation-based Botnet Detection in Enterprise Networks.
PhD thesis, 2008

BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection.
Proceedings of the 17th USENIX Security Symposium, 2008

BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic.
Proceedings of the Network and Distributed System Security Symposium, 2008

Principled reasoning and practical applications of alert fusion in intrusion detection systems.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

Misleading and defeating importance-scanning malware propagation.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

A Taxonomy of Botnet Structures.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems.
Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006

InfoShield: a security architecture for protecting information usage in memory.
Proceedings of the 12th International Symposium on High-Performance Computer Architecture, 2006

Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems.
Proceedings of the Computer Security, 2006

Measuring intrusion detection capability: an information-theoretic approach.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

DSO: Dependable Signing Overlay.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
An Intrusion-Tolerant and Self-Recoverable Network Service System Using A Security Enhanced Chip Multiprocessor.
Proceedings of the Second International Conference on Autonomic Computing (ICAC 2005), 2005

2004
HoneyStat: Local Worm Detection Using Honeypots.
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004

Worm Detection, Early Warning and Response Based on Local Victim Information.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2003
PLI: A New Framework to Protect Digital Content for P2P Networks.
Proceedings of the Applied Cryptography and Network Security, 2003


  Loading...