2008 |
15 | EE | Rui Wang,
XiaoFeng Wang,
Kehuan Zhang,
Zhuowei Li:
Towards automatic reverse engineering of software security configurations.
ACM Conference on Computer and Communications Security 2008: 245-256 |
14 | EE | Zhuowei Li,
XiaoFeng Wang,
Zhenkai Liang,
Michael K. Reiter:
AGIS: Towards automatic generation of infection signatures.
DSN 2008: 237-246 |
13 | EE | Rui Wang,
XiaoFeng Wang,
Zhuowei Li:
Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software .
USENIX Security Symposium 2008: 291-306 |
12 | EE | XiaoFeng Wang,
Zhuowei Li,
Jong Youl Choi,
Jun Xu,
Michael K. Reiter,
Chongkyung Kil:
Fast and Black-box Exploit Detection and Signature Generation for Commodity Software.
ACM Trans. Inf. Syst. Secur. 12(2): (2008) |
11 | EE | XiaoFeng Wang,
Michael K. Reiter:
A multi-layer framework for puzzle-based denial-of-service defense.
Int. J. Inf. Sec. 7(4): 243-263 (2008) |
10 | EE | Chunming Tang,
Dingyi Pei,
XiaoFeng Wang,
ZhuoJun Liu:
Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs.
Science in China Series F: Information Sciences 51(2): 128-144 (2008) |
2007 |
9 | EE | Zhuowei Li,
XiaoFeng Wang,
Jong Youl Choi:
SpyShield: Preserving Privacy from Spy Add-Ons.
RAID 2007: 296-316 |
2006 |
8 | EE | XiaoFeng Wang,
Zhuowei Li,
Jun Xu,
Michael K. Reiter,
Chongkyung Kil,
Jong Youl Choi:
Packet vaccine: black-box exploit detection and signature generation.
ACM Conference on Computer and Communications Security 2006: 37-46 |
7 | EE | Philippe Golle,
XiaoFeng Wang,
Markus Jakobsson,
Alex Tsow:
Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks.
IEEE Symposium on Security and Privacy 2006: 121-131 |
6 | EE | XiaoFeng Wang,
Michael K. Reiter:
WRAPS: Denial-of-Service Defense through Web Referrals.
SRDS 2006: 51-60 |
2005 |
5 | EE | Michael K. Reiter,
XiaoFeng Wang,
Matthew Wright:
Building Reliable Mix Networks with Fair Exchange.
ACNS 2005: 378-392 |
2004 |
4 | EE | Michael K. Reiter,
XiaoFeng Wang:
Fragile mixing.
ACM Conference on Computer and Communications Security 2004: 227-235 |
3 | EE | XiaoFeng Wang,
Michael K. Reiter:
Mitigating bandwidth-exhaustion attacks using congestion puzzles.
ACM Conference on Computer and Communications Security 2004: 257-267 |
2 | EE | Markus Jakobsson,
XiaoFeng Wang,
Susanne Wetzel:
Stealth attacks in vehicular technologies.
VTC Fall (2) 2004: 1218-1222 |
2003 |
1 | EE | XiaoFeng Wang,
Michael K. Reiter:
Defending Against Denial-of-Service Attacks with Puzzle Auction.
IEEE Symposium on Security and Privacy 2003: 78-92 |