2008 |
9 | EE | Weidong Cui,
Marcus Peinado,
Karl Chen,
Helen J. Wang,
Luis Irun-Briz:
Tupni: automatic reverse engineering of input formats.
ACM Conference on Computer and Communications Security 2008: 391-402 |
8 | EE | Zhi Wang,
Xuxian Jiang,
Weidong Cui,
Xinyuan Wang:
Countering Persistent Kernel Rootkits through Systematic Hook Discovery.
RAID 2008: 21-38 |
7 | EE | V. Benjamin Livshits,
Weidong Cui:
Spectator: Detection and Containment of JavaScript Worms.
USENIX Annual Technical Conference 2008: 335-348 |
2007 |
6 | EE | Weidong Cui,
Marcus Peinado,
Helen J. Wang,
Michael E. Locasto:
ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing.
IEEE Symposium on Security and Privacy 2007: 252-266 |
2006 |
5 | EE | Weidong Cui,
Vern Paxson,
Nicholas Weaver,
Randy H. Katz:
Protocol-Independent Adaptive Replay of Application Dialog.
NDSS 2006 |
2005 |
4 | EE | Weidong Cui,
Randy H. Katz,
Wai-tian Tan:
Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers.
ACSAC 2005: 361-370 |
3 | EE | Weidong Cui,
Randy H. Katz,
Wai-tian Tan:
BINDER: An Extrusion-Based Break-In Detector for Personal Computers.
USENIX Annual Technical Conference, General Track 2005: 363-366 |
2002 |
2 | EE | Weidong Cui,
Ion Stoica,
Randy H. Katz:
Backup Path Allocation Based on a Correlated Link Failure Probability Model in Overlay Networks.
ICNP 2002: 236 |
1 | EE | Bhaskaran Raman,
Sharad Agarwal,
Yan Chen,
Matthew Caesar,
Weidong Cui,
Per Johansson,
Kevin Lai,
Tal Lavian,
Sridhar Machiraju,
Zhuoqing Morley Mao,
George Porter,
Timothy Roscoe,
Mukund Seshadri,
Jimmy S. Shih,
Keith Sklower,
Lakshminarayanan Subramanian,
Takashi Suzuki,
Shelley Zhuang,
Anthony D. Joseph,
Randy H. Katz,
Ion Stoica:
The SAHARA Model for Service Composition across Multiple Providers.
Pervasive 2002: 1-14 |