Xinshu Dong

According to our database1, Xinshu Dong authored at least 21 papers between 2011 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Secure and Efficient Software-based Attestation for Industrial Control Devices with ARM Processors.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
SwapGuard: A software-only solution for attesting hot-swappable devices in power grids.
Proceedings of the 2016 IEEE International Conference on Smart Grid Communications, 2016

Optimal False Data Injection Attack against Automatic Generation Control in Power Grids.
Proceedings of the 7th ACM/IEEE International Conference on Cyber-Physical Systems, 2016

The Right Tool for the Job: A Case for Common Input Scenarios for Security Assessment.
Proceedings of the Graphical Models for Security - Third International Workshop, 2016

A Simulation Study on Smart Grid Resilience under Software-Defined Networking Controller Failures.
Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, 2016

2015
I Know Where You've Been: Geo-Inference Attacks via the Browser Cache.
IEEE Internet Comput., 2015

Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning.
Comput. Secur., 2015

Security Analysis of Urban Railway Systems: The Need for a Cyber-Physical Perspective.
Proceedings of the Computer Safety, Reliability, and Security, 2015

Model-Based Cybersecurity Assessment with NESCOR Smart Grid Failure Scenarios.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015

Software-Defined Networking for Smart Grid Resilience: Opportunities and Challenges.
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 2015

2014
You Can't Be Me: Enabling Trusted Paths and User Sub-origins in Web Browsers.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

A Usage-Pattern Perspective for Privacy Ranking of Android Apps.
Proceedings of the Information Systems Security - 10th International Conference, 2014

2013
Rating Web Pages Using Page-Transition Evidence.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

A Comprehensive Client-Side Behavior Model for Diagnosing Attacks in Ajax Applications.
Proceedings of the 2013 18th International Conference on Engineering of Complex Computer Systems, 2013

A Quantitative Evaluation of Privilege Separation in Web Browser Designs.
Proceedings of the Computer Security - ESORICS 2013, 2013

Protecting sensitive web content from client-side vulnerabilities with CRYPTONS.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

CRYPTSERVER: strong data protection in commodity LAMP servers.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
An Empirical Study of Dangerous Behaviors in Firefox Extensions.
Proceedings of the Information Security - 15th International Conference, 2012

Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content for Privacy Violations.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Towards Fine-Grained Access Control in JavaScript Contexts.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

AdSentry: comprehensive and flexible confinement of JavaScript-based advertisements.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011


  Loading...