Zhichun Li

According to our database1, Zhichun Li authored at least 44 papers between 2005 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Countering Malicious Processes with Process-DNS Association.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection.
Proceedings of the 27th USENIX Security Symposium, 2018

AIQL: Enabling Efficient Attack Investigation from System Monitoring Data.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

TwistBlocks: Pluggable and Twistable Modular TUI for Armature Interaction in 3D Design.
Proceedings of the Twelfth International Conference on Tangible, 2018

Towards a Timely Causality Analysis for Enterprise Security.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

TINET: Learning Invariant Networks via Knowledge Transfer.
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018

Collaborative Alert Ranking for Anomaly Detection.
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018

Behavior-based Community Detection: Application to Host Assessment In Enterprise Information Networks.
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018

NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Efficient Discovery of Abnormal Event Sequences in Enterprise Security Systems.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

2016
Detecting Stack Layout Corruptions with Robust Stack Unwinding.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

High Fidelity Data Reduction for Big Data Security Dependency Analyses.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Behavior Query Discovery in System-Generated Temporal Graphs.
PVLDB, 2015

SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps.
Proceedings of the 24th USENIX Security Symposium, 2015

Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Discover and Tame Long-running Idling Processes in Enterprise Systems.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Seismic Qualification of Telecommunication System in Nuclear Power Plant.
Proceedings of the Genetic and Evolutionary Computing, 2014

2013
Redefining web browser principals with a Configurable Origin Policy.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

2012
CHEX: statically vetting Android apps for component hijacking vulnerabilities.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Virtual browser: a virtualized browser to sandbox third-party JavaScripts with enhanced security.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Towards Situational Awareness of Large-Scale Botnet Probing Events.
IEEE Trans. Information Forensics and Security, 2011

Measurement and diagnosis of address misconfigured P2P traffic.
IEEE Network, 2011

WebShield: Enabling Various Web Defense Techniques without Client Side Modifications.
Proceedings of the Network and Distributed System Security Symposium, 2011

Poster: CUD: crowdsourcing for URL spam detection.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Employing Honeynets For Network Situational Awareness.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Thwarting zero-day polymorphic worms with network-level length-based signature generation.
IEEE/ACM Trans. Netw., 2010

HiFIND: A high-speed flow-level intrusion detection approach with DoS resiliency.
Computer Networks, 2010

NetShield: massive semantics-based vulnerability signature matching for high-speed networks.
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, 2010

WebProphet: Automating Performance Prediction for Web Services.
Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, 2010

Measurement and Diagnosis of Address Misconfigured P2P Traffic.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Detecting and characterizing social spam campaigns.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010

Detecting and characterizing social spam campaigns.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Virtual browser: a web-level sandbox to secure third-party JavaScript without sacrificing functionality.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Automating analysis of large-scale botnet probing events.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
Honeynet-based Botnet Scan Traffic Analysis.
Proceedings of the Botnet Detection: Countering the Largest Security Threat, 2008

2007
Reversible sketches: enabling monitoring and analysis over high-speed data streams.
IEEE/ACM Trans. Netw., 2007

Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms.
Proceedings of the IEEE International Conference on Network Protocols, 2007

2006
IDGraphs: Intrusion Detection and Analysis Using Stream Compositing.
IEEE Computer Graphics and Applications, 2006

Hamsa: Fast Signature Generation for Zero-day PolymorphicWorms with Provable Attack Resilience.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Reverse Hashing for High-Speed Network Monitoring: Algorithms, Evaluation, and Applications.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks.
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006

2005
IDGraphs: Intrusion Detection and Analysis Using Histographs.
Proceedings of the IEEE Workshop on Visualization for Computer Security (VizSEC 2005), 2005


  Loading...