Author image not provided
 Liang Xie

Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article5.75
Citation Count46
Publication count8
Publication years2007-2010
Available for download4
Average downloads per article710.00
Downloads (cumulative)2,840
Downloads (12 Months)76
Downloads (6 Weeks)6
Arrow RightAuthor only

See all colleagues of this author

See all subject areas


8 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 8 of 8
Sort by:

1 published by ACM
March 2010 WiSec '10: Proceedings of the third ACM conference on Wireless network security
Publisher: ACM
Citation Count: 19
Downloads (6 Weeks): 3,   Downloads (12 Months): 45,   Downloads (Overall): 1,158

Full text available: PDFPDF
Computing environments on cellphones, especially smartphones, are becoming more open and general-purpose, thus they also become attractive targets of malware. Cellphone malware not only causes privacy leakage, extra charges, and depletion of battery power, but also generates malicious traffic and drains down mobile network and service capacity. In this work ...
Keywords: system call, behavior learning, cellphone malware

September 2009 SRDS '09: Proceedings of the 2009 28th IEEE International Symposium on Reliable Distributed Systems
Publisher: IEEE Computer Society
Citation Count: 7

Cellphones are increasingly becoming attractive targets of various malware, which not only cause privacy leakage, extra charges, and depletion of battery power, but also introduce malicious traffic into networks. In this work, we seek system-level solutions to handle these security threats. Specifically, we propose a mandatory access control–based defense to ...
Keywords: Malware, Turing test, access control, authentication

June 2008 ACNS'08: Proceedings of the 6th international conference on Applied cryptography and network security
Publisher: Springer-Verlag
Citation Count: 1

File-sharing worms have been terrorizing Peer-to-peer (P2P) systems in recent years. Existing defenses relying on users' individual recoveries or limiting users' file-sharing activities are ineffective. Automated patching tools such as Microsoft Windows Update and Symantec Security Update are currently the most popular vehicles for eliminating and containing Internet worms, but ...

4 published by ACM
April 2008 WWW '08: Proceedings of the 17th international conference on World Wide Web
Publisher: ACM
Citation Count: 2
Downloads (6 Weeks): 0,   Downloads (12 Months): 5,   Downloads (Overall): 359

Full text available: PDFPDF
Cell phones are increasingly becoming attractive targets of various worms, which cause the leakage of user privacy, extra service charges and depletion of battery power. In this work, we study propagation of cell-phone worms, which exploit Multimedia Messaging Service (MMS) and/or Bluetooth for spreading. We then propose a systematic countermeasure ...
Keywords: patch, cell phone, turing test

5 published by ACM
March 2008 ACM Transactions on Information and System Security (TISSEC): Volume 11 Issue 3, March 2008
Publisher: ACM
Citation Count: 4
Downloads (6 Weeks): 3,   Downloads (12 Months): 36,   Downloads (Overall): 853

Full text available: PDFPDF
Overlay multicast networks are used by service providers to distribute contents such as Web pages, static and streaming multimedia data, or security updates to a large number of users. However, such networks are extremely vulnerable to message-dropping attacks by malicious or selfish nodes that intentionally drop the packets they are ...
Keywords: Overlay networks, attack detection, attacker identification, message dropping attacks

January 2008
Citation Count: 0

This dissertation presents a series of techniques that help both client devices and network elements defend against a wide variety of worm attacks. These techniques can be deployed to secure emergent networks including peer-to-peer (P2P) file-sharing systems and wireless communication systems. In recent years, worms have emerged as ...

September 2007 P2P '07: Proceedings of the Seventh IEEE International Conference on Peer-to-Peer Computing
Publisher: IEEE Computer Society
Citation Count: 5

Self-propagating worms have been terrorizing the Internet for several years and they are becoming imminent threats to large-scale Peer-to-Peer (P2P) systems featuring rich host connectivity and popular data services. In this paper, we consider topological worms, which exploit P2P host vulnerabilities and topology information to spread in an ultra-fast way. ...

8 published by ACM
August 2007 IWCMC '07: Proceedings of the 2007 international conference on Wireless communications and mobile computing
Publisher: ACM
Citation Count: 8
Downloads (6 Weeks): 2,   Downloads (12 Months): 16,   Downloads (Overall): 464

Full text available: PDFPDF
Node compromise is a serious security threat that hinders the successful deployment of large-scale wireless sensor networks. A node compromise often consists of three stages: physically obtaining and compromising the sensors, redeploying the compromised sensors, and compromised nodes launching attacks after their rejoining the network. By far, all the proposed ...
Keywords: wireless sensor networks, node compromise detection

The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us