Author image not provided
 Xinyuan Wang

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article16.60
Citation Count498
Publication count30
Publication years2001-2015
Available for download9
Average downloads per article1,159.11
Downloads (cumulative)10,432
Downloads (12 Months)403
Downloads (6 Weeks)28
SEARCH
ROLE
Arrow RightAuthor only
· Advisor only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


30 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 30
Result page: 1 2

Sort by:

1
November 2015
Bibliometrics:
Citation Count: 0

This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later ...

2
March 2012 Computer Networks: The International Journal of Computer and Telecommunications Networking: Volume 56 Issue 5, March, 2012
Publisher: Elsevier North-Holland, Inc.
Bibliometrics:
Citation Count: 2

Tracing interactive attack traffic that traverses stepping stones (i.e., intermediate hosts) is challenging, as the packet headers, lengths, and contents can all be changed by the stepping stones. The traffic timing (delays between packets) has therefore been studied as a means of tracing traffic. One such technique uses traffic timing ...
Keywords: Flow watermarking, Intrusion tracing, Stepping stones, Flow correlation

3
June 2011 IWQoS '11: Proceedings of the Nineteenth International Workshop on Quality of Service
Publisher: IEEE Press
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 0,   Downloads (12 Months): 9,   Downloads (Overall): 95

Full text available: PDFPDF
The threat of voice spam, commonly known as Spam over Internet Telephony (SPIT) is a real and contemporary problem. We present two approaches based on the anomaly detection of the distributions of selected call features (i.e., day and time of calling, call durations etc.) to detect and prevent SPITting over ...

4
May 2011 IEEE Transactions on Dependable and Secure Computing: Volume 8 Issue 3, May 2011
Publisher: IEEE Computer Society Press
Bibliometrics:
Citation Count: 4

Network-based intruders seldom attack their victims directly from their own computer. Often, they stage their attacks through intermediate “stepping stones” in order to conceal their identity and origin. To identify the source of the attack behind the stepping stone(s), it is necessary to correlate the incoming and outgoing flows or ...
Keywords: correlation, Network-level security and protection, intrusion tracing, correlation, stepping stone., stepping stone., Network-level security and protection, intrusion tracing

5
October 2010 ISC'10: Proceedings of the 13th international conference on Information security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 2

Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking the control flow of the infected system or program. Therefore, it is critically important to protect our mission critical systems from malicious control flows. ...
Keywords: malware immunization, sense of self, control flow integrity

6
August 2010 Computer Networks: The International Journal of Computer and Telecommunications Networking: Volume 54 Issue 11, August, 2010
Publisher: Elsevier North-Holland, Inc.
Bibliometrics:
Citation Count: 1

For commercial VoIP services, billing is crucial to both service providers and their subscribers. One of the most basic requirements of any billing function is that it must be accurate and trustworthy. A reliable VoIP billing mechanism should only charge VoIP subscribers for the calls they have really made and ...
Keywords: Man-in-the-middle attacks, SIP, Billing vulnerabilities, VoIP security

7
July 2010 IEEE Transactions on Computers: Volume 59 Issue 7, July 2010
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 1

With abundant aggregate network bandwidth, continuous data streams are commonly used in scientific and commercial applications. Correspondingly, there is an increasing demand of authenticating these data streams. Existing strategies explore data stream authentication by using message authentication codes (MACs) on a certain number of data packets (a data block) to ...
Keywords: DaTA, data transparent., timing correlation, authentication, DaTA, authentication, timing correlation, covert channel, data transparent., covert channel

8
July 2010 Computers and Security: Volume 29 Issue 5, July, 2010
Publisher: Elsevier Advanced Technology Publications
Bibliometrics:
Citation Count: 0

Advanced mobile devices such as laptops and smartphones make convenient hiding places for surveillance spyware. They commonly have a microphone and camera built-in, are increasingly network accessible, frequently within close proximity of their users, and almost always lack mechanisms designed to prevent unauthorized microphone or camera access. In order to ...
Keywords: Anti-spyware, Microphone hijack, Mobile devices, Win XP, Bot, Botnet, Mac OS X, Roving bug, Spyware, Surveillance

9 published by ACM
March 2010 ACM Transactions on Information and System Security (TISSEC): Volume 13 Issue 2, February 2010
Publisher: ACM
Bibliometrics:
Citation Count: 19
Downloads (6 Weeks): 8,   Downloads (12 Months): 66,   Downloads (Overall): 1,705

Full text available: PDFPDF
An alarming trend in recent malware incidents is that they are armed with stealthy techniques to detect, evade, and subvert malware detection facilities of the victim. On the defensive side, a fundamental limitation of traditional host-based antimalware systems is that they run inside the very hosts they are protecting (“in-the-box”), ...
Keywords: Malware detection, rootkits, virtual machines

10
September 2009 ESORICS'09: Proceedings of the 14th European conference on Research in computer security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 23

Automatic protocol reverse engineering has recently received significant attention due to its importance to many security applications. However, previous methods are all limited in analyzing only plaintext communications wherein the exchanged messages are not encrypted. In this paper, we propose ReFormat, a system that aims at deriving the message format ...
Keywords: data lifetime analysis, network protocols, encryption, reverse engineering, security

11
April 2009 ISPEC '09: Proceedings of the 5th International Conference on Information Security Practice and Experience
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 2

Phone features, e.g., <em>911 call</em> , <em>voicemail</em> , and <em>Do Not Disturb</em> , are critical and necessary for all deployed VoIP systems. In this paper, we empirically investigate the security of these phone features. We have implemented a number of attacks and experimented with VoIP services by leading VoIP service ...
Keywords: VoIP security, voice spam, 911 hijacking, SIP, voicemail fraud

12 published by ACM
March 2009 ASIACCS '09: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 15
Downloads (6 Weeks): 0,   Downloads (12 Months): 30,   Downloads (Overall): 1,249

Full text available: PDFPDF
The man-in-the-middle (MITM) attack has been shown to be one of the most serious threats to the security and trust of existing VoIP protocols and systems. For example, the MITM who is in the VoIP signaling and/or media path can easily wiretap, divert and even hijack selected VoIP calls by ...
Keywords: DNS spoofing, VoIP security, SIP, MITM attacks

13 published by ACM
September 2008 SecureComm '08: Proceedings of the 4th international conference on Security and privacy in communication netowrks
Publisher: ACM
Bibliometrics:
Citation Count: 9
Downloads (6 Weeks): 1,   Downloads (12 Months): 13,   Downloads (Overall): 528

Full text available: PDFPDF
Voice communication is fundamental to the normal operation of our society. The general public have put a lot of trust in voice communication and they have been relying on it for many critical and sensitive information exchange (e.g., emergency 911 calls, calls to customer service of financial institutions). Now more ...

14
September 2008 RAID '08: Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 6

Despite the increasing botnet threat, research in the area of botmaster traceback is limited. The four main obstacles are 1) the low-traffic nature of the bot-to-botmaster link; 2) chains of "stepping stones;" 3) the use of encryption along these chains; and 4) mixing with traffic from other bots. Most existing ...

15
September 2008 RAID '08: Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 23

Kernel rootkits, as one of the most elusive types of malware, pose significant challenges for investigation and defense. Among the most notable are <em>persistent kernel rootkits</em>, a special type of kernel rootkits that implant persistent kernel hooks to tamper with the kernel execution to hide their presence. To defend against ...

16 published by ACM
October 2007 CCS '07: Proceedings of the 14th ACM conference on Computer and communications security
Publisher: ACM
Bibliometrics:
Citation Count: 126
Downloads (6 Weeks): 15,   Downloads (12 Months): 199,   Downloads (Overall): 2,498

Full text available: PDFPDF
An alarming trend in malware attacks is that they are armed with stealthy techniques to detect, evade, and subvert malware detection facilities of the victim. On the defensive side, a fundamental limitation of traditional host-based anti-malware systems is that they run inside the very hosts they are protecting ("in the ...
Keywords: malware detection, rootkits, virtual machines

17
September 2007 RAID'07: Proceedings of the 10th international conference on Recent advances in intrusion detection
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 28

Honeypot has been an invaluable tool for the detection and analysis of network-based attacks by either human intruders or automated malware in the wild. The insights obtained by deploying honeypots, especially high-interaction ones, largely rely on the monitoring capability on the honeypots. In practice, based on the location of sensors, ...

18
August 2007 WOOT '07: Proceedings of the first USENIX workshop on Offensive Technologies
Publisher: USENIX Association
Bibliometrics:
Citation Count: 17

Billing is fundamental to any commercial VoIP services and it has direct impact on each individual VoIP subscriber. One of the most basic requirements of any VoIP billing function is that it must be reliable and trustworthy. From the VoIP subscriber's perspective, VoIP billing should only charge them for the ...

19
May 2007 SP '07: Proceedings of the 2007 IEEE Symposium on Security and Privacy
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 39

Many proposed low-latency anonymous communication systems have used various flow transformations such as traffic padding, adding cover traffic (or bogus packets), packet dropping, flow mixing, flow splitting, and flow merging to achieve anonymity. It has long been believed that these flow transformations would effectively disguise network flows, thus achieve good ...

20 published by ACM
December 2006 ANCS '06: Proceedings of the 2006 ACM/IEEE symposium on Architecture for networking and communications systems
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 2,   Downloads (12 Months): 12,   Downloads (Overall): 511

Full text available: PDFPDF
The fast spreading worm is becoming one of the most serious threats to today's networked information systems. A fast spreading worm could infect hundreds of thousands of hosts within a few minutes. In order to stop a fast spreading worm, we need the capability to detect and contain worms automatically ...
Keywords: polymorphic worms, virtual machine, worm containment, wormterminator, zero-day worms



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us