• Publications
  • Influence
Sketch-based change detection: methods, evaluation, and applications
TLDR
Using a large amount of real Internet traffic data from an operational tier-1 ISP, we demonstrate that our sketch-based change detection method is highly accurate, and can be implemented at low computation and memory costs. Expand
  • 559
  • 42
  • PDF
DroidChameleon: evaluating Android anti-malware against transformation attacks
TLDR
We evaluate the state-of-the-art commercial mobile antimalware products for Android and test how resistant they are against various common obfuscation techniques (even with known malware). Expand
  • 301
  • 30
  • PDF
Detecting and characterizing social spam campaigns
TLDR
We present an initial study to detect and quantitatively analyze the coordinated spam campaigns on online social networks in the wild. Expand
  • 197
  • 29
Detecting and characterizing social spam campaigns
TLDR
We present an initial study to quantify and characterize spam campaigns launched using accounts on online social networks, and show that more than 70% of all malicious wall posts advertise phishing sites. Expand
  • 338
  • 27
  • PDF
Hamsa: fast signature generation for zero-day polymorphic worms with provable attack resilience
TLDR
We propose Hamsa, a network-based automated signature generation system for polymorphic worms which is fast, noise-tolerant and attack-resilient. Expand
  • 306
  • 26
  • PDF
AppsPlayground: automatic security analysis of smartphone applications
TLDR
We propose AppsPlayground for Android, a framework that automates the analysis smartphone applications. Expand
  • 346
  • 24
  • PDF
Botnet Research Survey
TLDR
Botnets are emerging threat with hundreds of millions of computers infected. Expand
  • 192
  • 19
  • PDF
AutoCog: Measuring the Description-to-permission Fidelity in Android Applications
TLDR
We present AutoCog, a system that automatically identifies if the permissions declared by an application are consistent with its description, which we term description-to-permission fidelity. Expand
  • 153
  • 18
  • PDF
Scalable Name Lookup in NDN Using Effective Name Component Encoding
TLDR
We propose an effective Name Component Encoding (NCE) solution with the following two techniques: (1) A code allocation mechanism is developed to achieve memory-efficient encoding for name components, (2) We apply an improved State Transition Arrays to accelerate the longest name prefix matching and design a fast and incremental update mechanism which satisfies the special requirements of NDN forwarding process. Expand
  • 125
  • 16
  • PDF
Towards a secure controller platform for openflow applications
TLDR
We propose PermOF, a fine-grained permission system, as the first line of defense, in order to apply minimum privilege on apps. Expand
  • 140
  • 14
  • PDF
...
1
2
3
4
5
...