Haixin Duan, 段海新
Tsinghua University
H-index: 34
Asia-China
Top articles of Haixin Duan, 段海新
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Investigating Deployment Issues of DNS Root Server Instances from a China-wide View | IEEE Transactions on Dependable and Secure Computing | Fenglu Zhang Baojun Liu Chaoyi Lu Yunpeng Xing Haixin Duan | 2024/3/5 |
TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets | Xiang Li Wei Xu Baojun Liu Mingming Zhang Zhou Li | 2024/3/4 | |
Break the Wall from bottom: Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewalls | Qi Wang Jianjun Chen Zheyu Jiang Run Guo Ximeng Liu | 2024/2/1 | |
More Haste, Less Speed: Cache Related Security Threats in Continuous Integration Services | Yacong Gu Lingyun Ying Huajun Chai Yingyuan Pu Haixin Duan | 2024/2/1 | |
一种基于突变流量的在野黑产应用采集方法 | 软件学报 | 陈沛, 洪赓, 邬梦莹, 陈晋松, 段海新, 杨珉 | 2024/1/5 |
An Empirical Study of Open Edge Computing Platforms: Ecosystem, Usage, and Security Risks | arXiv preprint arXiv:2404.09681 | Yu Bi Mingshuo Yang Yong Fang Xianghang Mi Shanqing Guo | 2024/4/15 |
An underground industry application collection method based on flow analysis | Journal of Software | 陈沛, 洪赓, 邬梦莹, 陈晋松, 段海新, 杨珉 | 2024/1/5 |
A Security Study about Electron Applications and a Programming Methodology to Tame DOM Functionalities. | Network and Distributed System Security (NDSS) Symposium 2023 | Zihao Jin Shuo Chen Yang Chen Haixin Duan Jianjun Chen | 2023 |
Ghost Domain Reloaded: Vulnerable Links in Domain Name Delegation and Revocation. | Xiang Li Baojun Liu Xuesong Bai Mingming Zhang Qifan Zhang | 2023/3 | |
ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing | Proceedings of the 33rd USENIX Security Symposium | Qifan Zhang Xuesong Bai Xiang Li Haixin Duan Qi Li | 2023/10/4 |
Stolen Risks of Models with Security Properties | Yue Qin Zhuoqun Fu Chuyun Deng Xiaojing Liao Jia Zhang | 2023/11/15 | |
The Maginot Line: Attacking the Boundary of {DNS} Caching Protection | Xiang Li Chaoyi Lu Baojun Liu Qifan Zhang Zhou Li | 2023 | |
Detecting and measuring security risks of hosting-based dangling domains | Proceedings of the ACM on Measurement and Analysis of Computing Systems | Mingming Zhang Xiang Li Baojun Liu Jianyu Lu Yiming Zhang | 2023/2/28 |
校园网挖矿行为自动识别处置系统. | Journal of Fuzhou University | 刘武, 李风华, 段海新, 孙东红, 王继龙, 吴海燕, 刘沐, 张龙 | 2023/10/1 |
Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab) use in the Wild | Zhenrui Zhang Geng Hong Xiang Li Zhuoqun Fu Jia Zhang | 2023/11/15 | |
TAICHI: Transform Your Secret Exploits Into Mine From a Victim’s Perspective | IEEE Transactions on Dependable and Secure Computing | Zhongyu Pei Xingman Chen Songtao Yang Haixin Duan Chao Zhang | 2023/2/13 |
Can We Trust the Phone Vendors? Comprehensive Security Measurements on the Android Firmware Ecosystem | IEEE Transactions on Software Engineering | Qinsheng Hou Wenrui Diao Yanhao Wang Chenglin Mao Lingyun Ying | 2023/6/1 |
TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers | Wei Xu Xiang Li Chaoyi Lu Baojun Liu Haixin Duan | 2023/11/15 | |
Temporal {CDN-Convex} Lens: A {CDN-Assisted} Practical Pulsing {DDoS} Attack | Run Guo Jianjun Chen Yihang Wang Keran Mu Baojun Liu | 2023 | |
Continuous intrusion: Characterizing the security of continuous integration services | Yacong Gu Lingyun Ying Huajun Chai Chu Qiao Haixin Duan | 2023/5/21 |