Xinhui Han

Orcid: 0000-0003-4481-1641

According to our database1, Xinhui Han authored at least 31 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing.
Proceedings of the 32nd USENIX Security Symposium, 2023

An Improved Reversible Database Watermarking Method based on Histogram Shifting.
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023

RaceBench: A Triggerable and Observable Concurrency Bug Benchmark.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

Robust Watermark Imaging via Graph-signal Optimization.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

2022
Poster: TaintGrep: A Static Analysis Tool for Detecting Vulnerabilities of Android Apps Supporting User-defined Rules.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Poster: MSILDiffer - A Security Patch Analysis Framework Based on Microsoft Intermediate Language for Large Software.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Code is the (F)Law: Demystifying and Mitigating Blockchain Inconsistency Attacks Caused by Software Bugs.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

FPFlow: Detect and Prevent Browser Fingerprinting with Dynamic Taint Analysis.
Proceedings of the Cyber Security - 18th China Annual Conference, 2021

2020
ReDex: Unpacking Android Packed Apps by Executing Every Method.
Proceedings of the 19th IEEE International Conference on Trust, 2020

MinerGate: A Novel Generic and Accurate Defense Solution Against Web Based Cryptocurrency Mining Attacks.
Proceedings of the Cyber Security - 17th China Annual Conference, 2020

RIPT - An Efficient Multi-Core Record-Replay System.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

LPET - Mining MS-Windows Software Privilege Escalation Vulnerabilities by Monitoring Interactive Behavior.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2018
STDC: A SDN-Oriented Two-Stage DDoS Detection and Defence System Based on Clustering.
Proceedings of the 17th IEEE International Conference On Trust, 2018

2017
Accurate and efficient exploit capture and classification.
Sci. China Inf. Sci., 2017

TDSC: Two-Stage DDoS Detection and Defense System Based on Clustering.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017

Ghost Installer in the Shadow: Security Analysis of App Installation on Android.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2015
Unauthorized Cross-App Resource Access on MAC OS X and iOS.
CoRR, 2015

SF-DRDoS: The store-and-flood distributed reflective denial of service attack.
Comput. Commun., 2015

Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging Integrations.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
The store-and-flood distributed reflective denial of service attack.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

POSTER: UAFChecker: Scalable Static Detection of Use-After-Free Vulnerabilities.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

POSTER: AdHoneyDroid - Capture Malicious Android Advertisements.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2012
SmartDroid: an automatic system for revealing UI-based trigger conditions in android applications.
Proceedings of the SPSM'12, 2012

2011
WebPatrol: automated collection and replay of web-based malware scenarios.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Preventing drive-by download via inter-module communication monitoring.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Studying Malicious Websites and the Underground Economy on the Chinese Web.
Proceedings of the Managing Information Risk and the Economics of Security, 2009

2008
Studying Malicious Websites and the Underground Economy on the Chinese Web.
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008

2007
Collecting Autonomous Spreading Malware Using High-Interaction Honeypots.
Proceedings of the Information and Communications Security, 9th International Conference, 2007


  Loading...