2008 |
32 | EE | Weidong Cui,
Marcus Peinado,
Karl Chen,
Helen J. Wang,
Luis Irun-Briz:
Tupni: automatic reverse engineering of input formats.
ACM Conference on Computer and Communications Security 2008: 391-402 |
31 | EE | Li Zhuang,
John Dunagan,
Daniel R. Simon,
Helen J. Wang,
Ivan Osipkov,
J. Doug Tygar:
Characterizing Botnets from Email Spam Records.
LEET 2008 |
2007 |
30 | EE | Weidong Cui,
Marcus Peinado,
Helen J. Wang,
Michael E. Locasto:
ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing.
IEEE Symposium on Security and Privacy 2007: 252-266 |
29 | EE | José Meseguer,
Ralf Sasse,
Helen J. Wang,
Yi-Min Wang:
A Systematic Approach to Uncover Security Flaws in GUI Logic.
IEEE Symposium on Security and Privacy 2007: 71-85 |
28 | EE | Tao Jiang,
Helen J. Wang,
Yih-Chun Hu:
Preserving location privacy in wireless lans.
MobiSys 2007: 246-257 |
27 | EE | Nikita Borisov,
David Brumley,
Helen J. Wang,
John Dunagan,
Pallavi Joshi,
Chuanxiong Guo:
Generic Application-Level Protocol Analyzer and its Language.
NDSS 2007 |
26 | EE | Helen J. Wang,
Xiaofeng Fan,
Jon Howell,
Collin Jackson:
Protection and communication abstractions for web browsers in MashupOS.
SOSP 2007: 1-16 |
25 | EE | Xuxian Jiang,
Helen J. Wang,
Dongyan Xu,
Yi-Min Wang:
RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization.
SRDS 2007: 209-218 |
24 | EE | Collin Jackson,
Helen J. Wang:
Subspace: secure cross-domain communication for web mashups.
WWW 2007: 611-620 |
23 | EE | Charles Reis,
John Dunagan,
Helen J. Wang,
Opher Dubrovsky,
Saher Esmeir:
BrowserShield: Vulnerability-driven filtering of dynamic HTML.
TWEB 1(3): (2007) |
2006 |
22 | EE | Samuel T. King,
Peter M. Chen,
Yi-Min Wang,
Chad Verbowski,
Helen J. Wang,
Jacob R. Lorch:
SubVirt: Implementing malware with virtual machines.
IEEE Symposium on Security and Privacy 2006: 314-327 |
21 | EE | Justin Ma,
John Dunagan,
Helen J. Wang,
Stefan Savage,
Geoffrey M. Voelker:
Finding diversity in remote code injection exploits.
Internet Measurement Conference 2006: 53-64 |
20 | EE | Charles Reis,
John Dunagan,
Helen J. Wang,
Opher Dubrovsky,
Saher Esmeir:
BrowserShield: Vulnerability-Driven Filtering of Dynamic HTML.
OSDI 2006: 61-74 |
2005 |
19 | EE | Qiang Huang,
David Jao,
Helen J. Wang:
Applications of secure electronic voting to automated privacy-preserving troubleshooting.
ACM Conference on Computer and Communications Security 2005: 68-80 |
18 | EE | Qiang Huang,
Helen J. Wang,
Nikita Borisov:
Privacy-Preserving Friends Troubleshooting Network.
NDSS 2005 |
17 | EE | Xuxian Jiang,
Dongyan Xu,
Helen J. Wang,
Eugene H. Spafford:
Virtual Playgrounds for Worm Behavior Investigation.
RAID 2005: 1-21 |
2004 |
16 | EE | Helen J. Wang,
Yih-Chun Hu,
Chun Yuan,
Zheng Zhang,
Yi-Min Wang:
Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting.
IPTPS 2004: 184-194 |
15 | EE | Venkata N. Padmanabhan,
Helen J. Wang,
Philip A. Chou:
Supporting Heterogeneity and Congestion Control in Peer-to-Peer Multicast Streaming.
IPTPS 2004: 54-63 |
14 | EE | Helen J. Wang,
John C. Platt,
Yu Chen,
Ruyun Zhang,
Yi-Min Wang:
Automatic Misconfiguration Troubleshooting with PeerPressure.
OSDI 2004: 245-258 |
13 | EE | Helen J. Wang,
Chuanxiong Guo,
Daniel R. Simon,
Alf Zugenmaier:
Shield: vulnerability-driven network filters for preventing known vulnerability exploits.
SIGCOMM 2004: 193-204 |
12 | EE | Helen J. Wang,
John C. Platt,
Yu Chen,
Ruyun Zhang,
Yi-Min Wang:
PeerPressure for automatic troubleshooting.
SIGMETRICS 2004: 398-399 |
11 | EE | Yi-Min Wang,
Chad Verbowski,
John Dunagan,
Yu Chen,
Helen J. Wang,
Chun Yuan,
Zheng Zhang:
Strider: a black-box, state-based approach to change and configuration management and support.
Sci. Comput. Program. 53(2): 143-164 (2004) |
2003 |
10 | EE | Venkata N. Padmanabhan,
Helen J. Wang,
Philip A. Chou:
Resilient Peer-to-Peer Streaming.
ICNP 2003: 16-27 |
9 | EE | Miguel Castro,
Michael B. Jones,
Anne-Marie Kermarrec,
Antony I. T. Rowstron,
Marvin Theimer,
Helen J. Wang,
Alec Wolman:
An Evaluation of Scalable Application-Level Multicast Built Using Peer-To-Peer Overlays.
INFOCOM 2003 |
8 | EE | Venkata N. Padmanabhan,
Lili Qiu,
Helen J. Wang:
Server-based Inference of Internet Link Lossiness.
INFOCOM 2003 |
7 | EE | Yi-Min Wang,
Chad Verbowski,
John Dunagan,
Yu Chen,
Helen J. Wang,
Chun Yuan,
Zheng Zhang:
STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support.
LISA 2003: 159-172 |
2002 |
6 | EE | Venkata N. Padmanabhan,
Lili Qiu,
Helen J. Wang:
Passive network tomography using Bayesian inference.
Internet Measurement Workshop 2002: 93-94 |
5 | EE | Venkata N. Padmanabhan,
Helen J. Wang,
Philip A. Chou,
Kunwadee Sripanidkulchai:
Distributing streaming media content using cooperative networking.
NOSSDAV 2002: 177-186 |
2001 |
4 | EE | Helen J. Wang,
Randy H. Katz:
Mobility support in unified communication networks.
WOWMOM 2001: 95-102 |
2000 |
3 | EE | Helen J. Wang,
Anthony D. Joseph,
Randy H. Katz:
A Signaling System Using Lightweight Call Sessions.
INFOCOM 2000: 697-706 |
1999 |
2 | EE | Helen J. Wang,
Randy H. Katz,
Jochen Giese:
Policy-Enabled Handoffs Across Heterogeneous Wireless Networks.
WMCSA 1999: 51- |
1997 |
1 | EE | Joseph M. Hellerstein,
Peter J. Haas,
Helen J. Wang:
Online Aggregation.
SIGMOD Conference 1997: 171-182 |