Helen J. Wang

Affiliations:
  • Microsoft Research


According to our database1, Helen J. Wang authored at least 54 papers between 1997 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2017
Design and in-situ evaluation of a mixed-initiative approach to information organization.
J. Assoc. Inf. Sci. Technol., 2017

2015
SurroundWeb: Mitigating Privacy Concerns in a 3D Web Browser.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

The Activity Platform.
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015

2014
World-Driven Access Control for Continuous Sensing.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Lightweight server support for browser-based CSRF protection.
Proceedings of the 22nd International World Wide Web Conference, 2013

Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Operating System Support for Augmented Reality Applications.
Proceedings of the 14th Workshop on Hot Topics in Operating Systems, 2013

Content-based isolation: rethinking isolation policy design on client systems.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Practical end-to-end web content integrity.
Proceedings of the 21st World Wide Web Conference 2012, 2012

Clickjacking: Attacks and Defenses.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Scalable Telemetry Classification for Automated Malware Detection.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
Permission Re-Delegation: Attacks and Defenses.
Proceedings of the 20th USENIX Security Symposium, 2011

Enabling Security in Cloud Storage SLAs with CloudProof.
Proceedings of the 2011 USENIX Annual Technical Conference, 2011

2010
Attacks target Web server logic and prey on XCS weaknesses: technical persepctive.
Commun. ACM, 2010

On the Incoherencies in Web Browser Access Control Policies.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

SecondNet: a data center network virtualization architecture with bandwidth guarantees.
Proceedings of the 2010 ACM Conference on Emerging Networking Experiments and Technology, 2010

2009
The Multi-Principal OS Construction of the Gazelle Web Browser.
Proceedings of the 18th USENIX Security Symposium, 2009

Mining the Web and the Internet for Accurate IP Address Geolocations.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

2008
Characterizing Botnets from Email Spam Records.
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008

Tupni: automatic reverse engineering of input formats.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
BrowserShield: Vulnerability-driven filtering of dynamic HTML.
ACM Trans. Web, 2007

Subspace: secure cross-domain communication for web mashups.
Proceedings of the 16th International Conference on World Wide Web, 2007

Discoverer: Automatic Protocol Reverse Engineering from Network Traces.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization.
Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), 2007

A Systematic Approach to Uncover Security Flaws in GUI Logic.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Protection and communication abstractions for web browsers in MashupOS.
Proceedings of the 21st ACM Symposium on Operating Systems Principles 2007, 2007

Generic Application-Level Protocol Analyzer and its Language.
Proceedings of the Network and Distributed System Security Symposium, 2007

Preserving location privacy in wireless lans.
Proceedings of the 5th International Conference on Mobile Systems, 2007

Live Monitoring: Using Adaptive Instrumentation and Analysis to Debug and Maintain Web Applications.
Proceedings of HotOS'07: 11th Workshop on Hot Topics in Operating Systems, 2007

MashupOS: Operating System Abstractions for Client Mashups.
Proceedings of HotOS'07: 11th Workshop on Hot Topics in Operating Systems, 2007

2006
SubVirt: Implementing malware with virtual machines.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Finding diversity in remote code injection exploits.
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006

2005
Virtual Playgrounds for Worm Behavior Investigation.
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005

Privacy-Preserving Friends Troubleshooting Network.
Proceedings of the Network and Distributed System Security Symposium, 2005

Applications of secure electronic voting to automated privacy-preserving troubleshooting.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2004
Strider: a black-box, state-based approach to change and configuration management and support.
Sci. Comput. Program., 2004

PeerPressure for automatic troubleshooting.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2004

Shield: vulnerability-driven network filters for preventing known vulnerability exploits.
Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30, 2004

Automatic Misconfiguration Troubleshooting with PeerPressure.
Proceedings of the 6th Symposium on Operating System Design and Implementation (OSDI 2004), 2004

Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting.
Proceedings of the Peer-to-Peer Systems III, Third International Workshop, 2004

Supporting Heterogeneity and Congestion Control in Peer-to-Peer Multicast Streaming.
Proceedings of the Peer-to-Peer Systems III, Third International Workshop, 2004

2003
Server-based Inference of Internet Link Lossiness.
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003

An Evaluation of Scalable Application-Level Multicast Built Using Peer-To-Peer Overlays.
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003

Resilient Peer-to-Peer Streaming.
Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP 2003), 2003

2002
Distributing streaming media content using cooperative networking.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2002

Passive network tomography using Bayesian inference.
Proceedings of the 2nd ACM SIGCOMM Internet Measurement Workshop, 2002

2001
Mobility support in unified communication networks.
Proceedings of the 4th International Workshop on Wireless Mobile Multimedia, 2001

A personal communication service creation model for Internet-based unified communication systems.
Proceedings of the IEEE International Conference on Communications, 2001

2000
ICEBERG: an Internet core network architecture for integrated communications.
IEEE Wirel. Commun., 2000

A Signaling System Using Lightweight Call Sessions.
Proceedings of the Proceedings IEEE INFOCOM 2000, 2000

1999
Policy-Enabled Handoffs Across Heterogeneous Wireless Networks.
Proceedings of the 2nd Workshop on Mobile Computing Systems and Applications (WMCSA '99), 1999

1997
Online Aggregation.
Proceedings of the SIGMOD 1997, 1997


  Loading...