What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Wenke Lee
Google Scholar
129
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
CoinDef: A Comprehensive Code Injection Defense for the Electron Framework.
Zheng Yang
Simon P. Chung
Jizhou Chen
Runze Zhang
Brendan Saltaformaggio
Wenke Lee
2025
conf/dsn
SoundBoost: Effective RCA and Attack Detection for UAV via Acoustic Side-Channel.
Haoran Wang
Zheng Yang
Sangdon Park
Yibin Yang
Seulbae Kim
Willian T. Lunardi
Martin Andreoni
Taesoo Kim
Wenke Lee
2025
conf/asiaccs
Your Control Host Intrusion Left Some Physical Breadcrumbs: Physical Evidence-Guided Post-Mortem Triage of SCADA Attacks.
Moses Ike
Keaton Sadoski
Romuald Valme
Burak Sahin
Saman A. Zonouz
Wenke Lee
2025
conf/uss
Hybrid Language Processor Fuzzing via LLM-Based Constraint Solving.
Yupeng Yang
Shenglong Yao
Jizhou Chen
Wenke Lee
2024
conf/uss
Towards Generic Database Management System Fuzzing.
Yupeng Yang
Yongheng Chen
Rui Zhong
Jizhou Chen
Wenke Lee
2024
conf/uss
WEBRR: A Forensic System for Replaying and Investigating Web-Based Attacks in The Modern Web.
Joey Allen
Zheng Yang
Feng Xiao
Matthew Landen
Roberto Perdisci
Wenke Lee
2024
conf/sp
Jasmine: Scale up JavaScript Static Security Analysis with Computation-based Semantic Explanation.
Feng Xiao
Zhongfu Su
Guangliang Yang
Wenke Lee
2023
journals/compsec
The Threat of Offensive AI to Organizations.
Yisroel Mirsky
Ambra Demontis
Jaidip Kotak
Ram Shankar
Gelei Deng
Liu Yang
Xiangyu Zhang
Maura Pintor
Wenke Lee
Yuval Elovici
Battista Biggio
2023
conf/uss
µFUZZ: Redesign of Parallel Fuzzing using Microservice Architecture.
Yongheng Chen
Rui Zhong
Yupeng Yang
Hong Hu
Dinghao Wu
Wenke Lee
2023
conf/uss
VulChecker: Graph-based Vulnerability Localization in Source Code.
Yisroel Mirsky
George Macon
Michael D. Brown
Carter Yagemann
Matthew Pruett
Evan Downing
J. Sukarno Mertoguno
Wenke Lee
2023
conf/uss
TRIDENT: Towards Detecting and Mitigating Web-based Social Engineering Attacks.
Zheng Yang
Joey Allen
Matthew Landen
Roberto Perdisci
Wenke Lee
2023
conf/uss
PUMM: Preventing Use-After-Free Using Execution Unit Partitioning.
Carter Yagemann
Simon P. Chung
Brendan Saltaformaggio
Wenke Lee
2023
conf/sp
Scaphy: Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical.
Moses Ike
Kandy Phan
Keaton Sadoski
Romuald Valme
Wenke Lee
2022
conf/ccs
Understanding and Mitigating Remote Code Execution Vulnerabilities in Cross-platform Ecosystem.
Feng Xiao
Zheng Yang
Joey Allen
Guangliang Yang
Grant Williams
Wenke Lee
2022
conf/acsac
DRAGON: Deep Reinforcement Learning for Autonomous Grid Operation and Attack Detection.
Matthew Landen
Key-whan Chung
Moses Ike
Sarah Mackay
Jean-Paul Watson
Wenke Lee
2022
conf/acsac
DeView: Confining Progressive Web Applications by Debloating Web APIs.
ChangSeok Oh
Sangho Lee
Chenxiong Qian
Hyungjoon Koo
Wenke Lee
2021
conf/ccs
Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks.
Carter Yagemann
Mohammad A. Noureddine
Wajih Ul Hassan
Simon P. Chung
Adam Bates
Wenke Lee
2021
conf/ccs
Automated Bug Hunting With Data-Driven Symbolic Root Cause Analysis.
Carter Yagemann
Simon P. Chung
Brendan Saltaformaggio
Wenke Lee
2021
conf/uss
ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems.
Carter Yagemann
Matthew Pruett
Simon P. Chung
Kennon Bittick
Brendan Saltaformaggio
Wenke Lee
2021
conf/uss
DeepReflect: Discovering Malicious Functionality through Binary Reconstruction.
Evan Downing
Yisroel Mirsky
Kyuhong Park
Wenke Lee
2021
conf/uss
Abusing Hidden Properties to Attack the Node.js Ecosystem.
Feng Xiao
Jianwei Huang
Yichang Xiong
Guangliang Yang
Hong Hu
Guofei Gu
Wenke Lee
2021
conf/uss
Fuzzy Labeled Private Set Intersection with Applications to Private Real-Time Biometric Search.
Erkam Uzun
Simon P. Chung
Vladimir Kolesnikov
Alexandra Boldyreva
Wenke Lee
2021
conf/sp
One Engine to Fuzz 'em All: Generic Language Processor Testing with Semantic Validation.
Yongheng Chen
Rui Zhong
Hong Hu
Hangfan Zhang
Yupeng Yang
Dinghao Wu
Wenke Lee
2021
conf/asiaccs
Cryptographic Key Derivation from Biometric Inferences for Remote Authentication.
Erkam Uzun
Carter Yagemann
Simon P. Chung
Vladimir Kolesnikov
Wenke Lee
2021
conf/asiaccs
Identifying Behavior Dispatchers for Malware Analysis.
Kyuhong Park
Burak Sahin
Yongheng Chen
Jisheng Zhao
Evan Downing
Hong Hu
Wenke Lee
2021
conf/ndss
Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages.
Ruian Duan
Omar Alrawi
Ranjita Pai Kasturi
Ryan Elder
Brendan Saltaformaggio
Wenke Lee
2020
conf/ccs
Machine Learning and Security: The Good, The Bad, and The Ugly.
Wenke Lee
2020
conf/ccs
Slimium: Debloating the Chromium Browser with Feature Subsetting.
Chenxiong Qian
Hyungjoon Koo
ChangSeok Oh
Taesoo Kim
Wenke Lee
2020
conf/ccs
Mnemosyne: An Effective and Efficient Postmortem Watering Hole Attack Investigation System.
Joey Allen
Zheng Yang
Matthew Landen
Raghav Bhat
Harsh Grover
Andrew Chang
Yang Ji
Roberto Perdisci
Wenke Lee
2020
conf/ccs
SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback.
Rui Zhong
Yongheng Chen
Hong Hu
Hangfan Zhang
Wenke Lee
Dinghao Wu
2020
conf/acsac
On the Feasibility of Automating Stock Market Manipulation.
Carter Yagemann
Simon P. Chung
Erkam Uzun
Sai Ragam
Brendan Saltaformaggio
Wenke Lee
2019
conf/uss
RAZOR: A Framework for Post-deployment Software Debloating.
Chenxiong Qian
Hong Hu
Mansour Alharthi
Simon Pak Ho Chung
Taesoo Kim
Wenke Lee
2019
conf/ndss
Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries.
Ruian Duan
Ashish Bijlani
Yang Ji
Omar Alrawi
Yiyuan Xiong
Moses Ike
Brendan Saltaformaggio
Wenke Lee
2018
conf/ccs
ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android.
Andrea Possemato
Andrea Lanzi
Simon Pak Ho Chung
Wenke Lee
Yanick Fratantonio
2018
conf/ccs
Enforcing Unique Code Target Property for Control-Flow Integrity.
Hong Hu
Chenxiong Qian
Carter Yagemann
Simon Pak Ho Chung
William R. Harris
Taesoo Kim
Wenke Lee
2018
conf/uss
Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.
Wei Meng
Chenxiong Qian
Shuang Hao
Kevin Borgolte
Giovanni Vigna
Christopher Kruegel
Wenke Lee
2018
conf/uss
Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking.
Yang Ji
Sangho Lee
Mattia Fazzini
Joey Allen
Evan Downing
Taesoo Kim
Alessandro Orso
Wenke Lee
2018
conf/ndss
Broken Fingers: On the Usage of the Fingerprint API in Android.
Antonio Bianchi
Yanick Fratantonio
Aravind Machiry
Christopher Kruegel
Giovanni Vigna
Simon Pak Ho Chung
Wenke Lee
2018
conf/ndss
rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System.
Erkam Uzun
Simon Pak Ho Chung
Irfan Essa
Wenke Lee
2018
conf/acsac
Improving Accuracy of Android Malware Detection with Lightweight Contextual Awareness.
Joey Allen
Matthew Landen
Sanya Chaba
Yang Ji
Simon Pak Ho Chung
Wenke Lee
2017
conf/ccs
RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking.
Yang Ji
Sangho Lee
Evan Downing
Weiren Wang
Mattia Fazzini
Taesoo Kim
Alessandro Orso
Wenke Lee
2017
conf/ccs
Identifying Open-Source License Violation and 1-day Security Risk at Large Scale.
Ruian Duan
Ashish Bijlani
Meng Xu
Taesoo Kim
Wenke Lee
2017
conf/uss
Efficient Protection of Path-Sensitive Control Security.
Ren Ding
Chenxiong Qian
Chengyu Song
William Harris
Taesoo Kim
Wenke Lee
2017
conf/sp
Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop.
Yanick Fratantonio
Chenxiong Qian
Simon P. Chung
Wenke Lee
2017
conf/ndss
Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying.
Kangjie Lu
Marie-Therese Walter
David Pfaff
Stefan Nümberger
Wenke Lee
Michael Backes
2016
conf/ccs
UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages.
Kangjie Lu
Chengyu Song
Taesoo Kim
Wenke Lee
2016
conf/sp
HDFI: Hardware-Assisted Data-Flow Isolation.
Chengyu Song
Hyungon Moon
Monjur Alam
Insu Yun
Byoungyoung Lee
Taesoo Kim
Wenke Lee
Yunheung Paek
2016
conf/ndss
Enforcing Kernel Security Invariants with Data Flow Integrity.
Chengyu Song
Byoungyoung Lee
Kangjie Lu
William Harris
Taesoo Kim
Wenke Lee
2016
conf/ndss
The Price of Free: Privacy Leakage in Personalized Mobile In-Apps Ads.
Wei Meng
Ren Ding
Simon P. Chung
Steven Han
Wenke Lee
2016
conf/ndss
How to Make ASLR Win the Clone Wars: Runtime Re-Randomization.
Kangjie Lu
Wenke Lee
Stefan Nürnberger
Michael Backes
2015
conf/ccs
ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks.
Kangjie Lu
Chengyu Song
Byoungyoung Lee
Simon P. Chung
Taesoo Kim
Wenke Lee
2015
conf/ccs
UCognito: Private Browsing without Tears.
Meng Xu
Yeongjin Jang
Xinyu Xing
Taesoo Kim
Wenke Lee
2015
conf/uss
Type Casting Verification: Stopping an Emerging Attack Vector.
Byoungyoung Lee
Chengyu Song
Taesoo Kim
Wenke Lee
2015
conf/ndss
Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting.
Kangjie Lu
Zhichun Li
Vasileios P. Kemerlis
Zhenyu Wu
Long Lu
Cong Zheng
Zhiyun Qian
Wenke Lee
Guofei Jiang
2015
conf/ndss
Exploiting and Protecting Dynamic Code Generation.
Chengyu Song
Chao Zhang
Tielei Wang
Wenke Lee
David Melski
2015
conf/ndss
Preventing Use-after-free with Dangling Pointers Nullification.
Byoungyoung Lee
Chengyu Song
Yeongjin Jang
Tielei Wang
Taesoo Kim
Long Lu
Wenke Lee
2014
journals/tifs
Building a Scalable System for Stealthy P2P-Botnet Detection.
Junjie Zhang
Roberto Perdisci
Wenke Lee
Xiapu Luo
Unum Sarfraz
2014
conf/ccs
Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising.
Wei Meng
Xinyu Xing
Anmol Sheth
Udi Weinsberg
Wenke Lee
2014
conf/ccs
A11y Attacks: Exploiting Accessibility in Operating Systems.
Yeongjin Jang
Chengyu Song
Simon P. Chung
Tielei Wang
Wenke Lee
2014
conf/uss
On the Feasibility of Large-Scale Infections of iOS Devices.
Tielei Wang
Yeongjin Jang
Yizheng Chen
Simon P. Chung
Billy Lau
Wenke Lee
2014
conf/uss
Mimesis Aegis: A Mimicry Privacy Shield-A System's Approach to Data Privacy on Public Cloud.
Billy Lau
Simon P. Chung
Chengyu Song
Yeongjin Jang
Wenke Lee
Alexandra Boldyreva
2014
conf/sp
From Zygote to Morula: Fortifying Weakened ASLR on Android.
Byoungyoung Lee
Long Lu
Tielei Wang
Taesoo Kim
Wenke Lee
2014
conf/ndss
Gyrus: A Framework for User-Intent Monitoring of Text-based Networked Applications.
Yeongjin Jang
Simon P. Chung
Bryan D. Payne
Wenke Lee
2014
conf/dsn
DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS Traffic.
Yizheng Chen
Manos Antonakakis
Roberto Perdisci
Yacin Nadji
David Dagon
Wenke Lee
2013
conf/ccs
Tappan Zee (north) bridge: mining memory accesses for introspection.
Brendan Dolan-Gavitt
Tim Leek
Josh Hodosh
Wenke Lee
2013
conf/ccs
Beheading hydras: performing effective botnet takedowns.
Yacin Nadji
Manos Antonakakis
Roberto Perdisci
David Dagon
Wenke Lee
2013
conf/uss
Jekyll on iOS: When Benign Apps Become Evil.
Tielei Wang
Kangjie Lu
Long Lu
Simon P. Chung
Wenke Lee
2013
conf/uss
Take This Personally: Pollution Attacks on Personalized Services.
Xinyu Xing
Wei Meng
Dan Doozan
Alex C. Snoeren
Nick Feamster
Wenke Lee
2013
conf/ndss
The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers.
Charles Lever
Manos Antonakakis
Bradley Reaves
Patrick Traynor
Wenke Lee
2013
conf/ndss
Intention and Origination: An Inside Look at Large-Scale Bot Queries.
Junjie Zhang
Yinglian Xie
Fang Yu
David Soukal
Wenke Lee
2012
conf/ccs
CHEX: statically vetting Android apps for component hijacking vulnerabilities.
Long Lu
Zhichun Li
Zhenyu Wu
Wenke Lee
Guofei Jiang
2012
conf/uss
From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware.
Manos Antonakakis
Roberto Perdisci
Yacin Nadji
Nikolaos Vasiloglou
Saeed Abu-Nimeh
Wenke Lee
David Dagon
2012
conf/uss
Impeding Automated Malware Analysis with Environment-sensitive Malware.
Chengyu Song
Paul Royal
Wenke Lee
2011
conf/ccs
Boosting the scalability of botnet detection using adaptive traffic sampling.
Junjie Zhang
Xiapu Luo
Roberto Perdisci
Guofei Gu
Wenke Lee
Nick Feamster
2011
conf/ccs
SURF: detecting and measuring search poisoning.
Long Lu
Roberto Perdisci
Wenke Lee
2011
conf/uss
Detecting Malware Domains at the Upper DNS Hierarchy.
Manos Antonakakis
Roberto Perdisci
Wenke Lee
Nikolaos Vasiloglou
David Dagon
2011
conf/sp
Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection.
Brendan Dolan-Gavitt
Tim Leek
Michael Zhivich
Jonathon T. Giffin
Wenke Lee
2011
conf/ndss
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.
Xiapu Luo
Peng Zhou
Edmond W. W. Chan
Wenke Lee
Rocky K. C. Chang
Roberto Perdisci
2011
conf/dsn
Detecting stealthy P2P botnets using statistical traffic fingerprints.
Junjie Zhang
Roberto Perdisci
Wenke Lee
Unum Sarfraz
Xiapu Luo
2011
conf/dsn
A combinatorial approach to network covert communications with applications in Web Leaks.
Xiapu Luo
Peng Zhou
Edmond W. W. Chan
Rocky K. C. Chang
Wenke Lee
2011
conf/acsac
Exposing invisible timing-based traffic watermarks with BACKLIT.
Xiapu Luo
Peng Zhou
Junjie Zhang
Roberto Perdisci
Wenke Lee
Rocky K. C. Chang
2011
conf/acsac
Understanding the prevalence and use of alternative plans in malware with network games.
Yacin Nadji
Manos Antonakakis
Roberto Perdisci
Wenke Lee
2010
conf/ccs
BLADE: an attack-agnostic approach for preventing drive-by malware infections.
Long Lu
Vinod Yegneswaran
Phillip A. Porras
Wenke Lee
2010
conf/uss
Building a Dynamic Reputation System for DNS.
Manos Antonakakis
Roberto Perdisci
David Dagon
Wenke Lee
Nick Feamster
2010
conf/sp
On the Incoherencies in Web Browser Access Control Policies.
Kapil Singh
Alexander Moshchuk
Helen J. Wang
Wenke Lee
2010
conf/esorics
On the Secrecy of Spread-Spectrum Flow Watermarks.
Xiapu Luo
Junjie Zhang
Roberto Perdisci
Wenke Lee
2009
conf/ccs
Mapping kernel objects to enable systematic integrity checking.
Martim Carbone
Weidong Cui
Long Lu
Wenke Lee
Marcus Peinado
Xuxian Jiang
2009
conf/ccs
Secure in-VM monitoring using hardware virtualization.
Monirul Islam Sharif
Wenke Lee
Weidong Cui
Andrea Lanzi
2009
conf/uss
xBook: Redesigning Privacy Control in Social Networking Platforms.
Kapil Singh
Sumeer Bhola
Wenke Lee
2009
conf/sp
Automatic Reverse Engineering of Malware Emulators.
Monirul Islam Sharif
Andrea Lanzi
Jonathon T. Giffin
Wenke Lee
2009
conf/ndss
K-Tracer: A System for Extracting Kernel Malware Behavior.
Andrea Lanzi
Monirul Islam Sharif
Wenke Lee
2009
conf/ndss
Recursive DNS Architectures and Vulnerability Implications.
David Dagon
Manos Antonakakis
Kevin Day
Xiapu Luo
Christopher P. Lee
Wenke Lee
2009
conf/dsn
WSEC DNS: Protecting recursive DNS resolvers from poisoning attacks.
Roberto Perdisci
Manos Antonakakis
Xiapu Luo
Wenke Lee
2009
conf/acsac
Active Botnet Probing to Identify Obscure Command and Control Channels.
Guofei Gu
Vinod Yegneswaran
Phillip A. Porras
Jennifer Stoll
Wenke Lee
2009
conf/acsac
Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces.
Roberto Perdisci
Igino Corona
David Dagon
Wenke Lee
2008
conf/ccs
Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries.
David Dagon
Manos Antonakakis
Paul Vixie
Tatuya Jinmei
Wenke Lee
2008
conf/ccs
Principled reasoning and practical applications of alert fusion in intrusion detection systems.
Guofei Gu
Alvaro A. Cárdenas
Wenke Lee
2008
conf/ccs
Ether: malware analysis via hardware virtualization extensions.
Artem Dinaburg
Paul Royal
Monirul Islam Sharif
Wenke Lee
2008
conf/uss
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection.
Guofei Gu
Roberto Perdisci
Junjie Zhang
Wenke Lee
2008
conf/sp
Lares: An Architecture for Secure Active Monitoring Using Virtualization.
Bryan D. Payne
Martim Carbone
Monirul Islam Sharif
Wenke Lee
2008
conf/esorics
Eureka: A Framework for Enabling Static Malware Analysis.
Monirul Islam Sharif
Vinod Yegneswaran
Hassen Saïdi
Phillip A. Porras
Wenke Lee
2008
conf/ndss
Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority.
David Dagon
Niels Provos
Christopher P. Lee
Wenke Lee
2008
conf/ndss
Impeding Malware Analysis Using Conditional Code Obfuscation.
Monirul Islam Sharif
Andrea Lanzi
Jonathon T. Giffin
Wenke Lee
2008
conf/ndss
BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic.
Guofei Gu
Junjie Zhang
Wenke Lee
2008
conf/dsn
Evaluating email's feasibility for botnet command and control.
Kapil Singh
Abhinav Srivastava
Jonathon T. Giffin
Wenke Lee
2008
conf/acsac
McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables.
Roberto Perdisci
Andrea Lanzi
Wenke Lee
2007
conf/uss
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation.
Guofei Gu
Phillip A. Porras
Vinod Yegneswaran
Martin W. Fong
Wenke Lee
2007
conf/acsac
Secure and Flexible Monitoring of Virtual Machines.
Bryan D. Payne
Wenke Lee
2007
conf/acsac
A Taxonomy of Botnet Structures.
David Dagon
Guofei Gu
Christopher P. Lee
Wenke Lee
2007
conf/tcc
Intrusion-Resilient Key Exchange in the Bounded Retrieval Model.
David Cash
Yan Zong Ding
Yevgeniy Dodis
Wenke Lee
Richard J. Lipton
Shabsi Walfish
2006
conf/ccs
Measuring intrusion detection capability: an information-theoretic approach.
Guofei Gu
Prahlad Fogla
David Dagon
Wenke Lee
Boris Skoric
2006
conf/ccs
Evading network anomaly detection systems: formal reasoning and practical techniques.
Prahlad Fogla
Wenke Lee
2006
conf/uss
Polymorphic Blending Attacks.
Prahlad Fogla
Monirul Islam Sharif
Roberto Perdisci
Oleg M. Kolesnikov
Wenke Lee
2006
conf/sp
MisleadingWorm Signature Generators Using Deliberate Noise Injection.
Roberto Perdisci
David Dagon
Wenke Lee
Prahlad Fogla
Monirul Islam Sharif
2006
conf/acns
DSO: Dependable Signing Overlay.
Guofei Gu
Prahlad Fogla
Wenke Lee
Douglas M. Blough
2006
conf/esorics
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems.
Guofei Gu
Prahlad Fogla
David Dagon
Wenke Lee
Boris Skoric
2006
conf/ndss
Modeling Botnet Propagation Using Time Zones.
David Dagon
Cliff Changchun Zou
Wenke Lee
2006
conf/acsac
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware.
Paul Royal
Mitch Halpin
David Dagon
Robert Edmonds
Wenke Lee
2005
conf/fc
Protecting Secret Data from Insider Attacks.
David Dagon
Wenke Lee
Richard J. Lipton
2004
conf/sp
Formalizing Sensitivity in Static Analysis for Intrusion Detection.
Henry Hanping Feng
Jonathon T. Giffin
Yong Huang
Somesh Jha
Wenke Lee
Barton P. Miller
2004
conf/esorics
Discovering Novel Attack Strategies from INFOSEC Alerts.
Xinzhou Qin
Wenke Lee
2004
conf/acsac
Attack Plan Recognition and Prediction Using Causal Networks.
Xinzhou Qin
Wenke Lee
2004
conf/acsac
Worm Detection, Early Warning and Response Based on Local Victim Information.
Guofei Gu
Monirul Islam Sharif
Xinzhou Qin
David Dagon
Wenke Lee
George F. Riley
2003
conf/sp
Anomaly Detection Using Call Stack Information.
Henry Hanping Feng
Oleg M. Kolesnikov
Prahlad Fogla
Wenke Lee
Weibo Gong
2002
conf/nspw
Guarding the next Internet frontier: countering denial of information attacks.
Mustaque Ahamad
Leo Mark
Wenke Lee
Edward Omicienski
Andre dos Santos
Ling Liu
Calton Pu
2001
conf/nspw
Heterogeneous networking: a new survivability paradigm.
Yongguang Zhang
Harrick M. Vin
Lorenzo Alvisi
Wenke Lee
Son K. Dao
2001
conf/sp
Information-Theoretic Measures for Anomaly Detection.
Wenke Lee
Dong Xiang
1999
conf/sp
A Data Mining Framework for Building Intrusion Detection Models.
Wenke Lee
Salvatore J. Stolfo
Kui W. Mok
1998
conf/uss
Data Mining Approaches for Intrusion Detection.
Wenke Lee
Salvatore J. Stolfo
Coauthors
Abhinav Srivastava
(1)
Adam Bates
(1)
Alessandro Orso
(2)
Alex C. Snoeren
(1)
Alexander Moshchuk
(1)
Alexandra Boldyreva
(2)
Alvaro A. Cárdenas
(1)
Ambra Demontis
(1)
Andre dos Santos
(1)
Andrea Lanzi
(6)
Andrea Possemato
(1)
Andrew Chang
(1)
Anmol Sheth
(1)
Antonio Bianchi
(1)
Aravind Machiry
(1)
Artem Dinaburg
(1)
Ashish Bijlani
(2)
Barton P. Miller
(1)
Battista Biggio
(1)
Billy Lau
(2)
Boris Skoric
(2)
Bradley Reaves
(1)
Brendan Dolan-Gavitt
(2)
Brendan Saltaformaggio
(7)
Bryan D. Payne
(3)
Burak Sahin
(2)
Byoungyoung Lee
(6)
Calton Pu
(1)
Carter Yagemann
(8)
ChangSeok Oh
(2)
Chao Zhang
(1)
Charles Lever
(1)
Chengyu Song
(11)
Chenxiong Qian
(7)
Christopher Kruegel
(2)
Christopher P. Lee
(3)
Cliff Changchun Zou
(1)
Cong Zheng
(1)
Dan Doozan
(1)
David Cash
(1)
David Dagon
(17)
David Melski
(1)
David Pfaff
(1)
David Soukal
(1)
Dinghao Wu
(3)
Dong Xiang
(1)
Douglas M. Blough
(1)
Edmond W. W. Chan
(2)
Edward Omicienski
(1)
Erkam Uzun
(4)
Evan Downing
(5)
Fang Yu
(1)
Feng Xiao
(4)
Gelei Deng
(1)
George F. Riley
(1)
George Macon
(1)
Giovanni Vigna
(2)
Grant Williams
(1)
Guangliang Yang
(3)
Guofei Gu
(12)
Guofei Jiang
(2)
Hangfan Zhang
(2)
Haoran Wang
(1)
Harrick M. Vin
(1)
Harsh Grover
(1)
Hassen Saïdi
(1)
Helen J. Wang
(1)
Henry Hanping Feng
(2)
Hong Hu
(7)
Hyungjoon Koo
(2)
Hyungon Moon
(1)
Igino Corona
(1)
Insu Yun
(1)
Irfan Essa
(1)
J. Sukarno Mertoguno
(1)
Jaidip Kotak
(1)
Jean-Paul Watson
(1)
Jennifer Stoll
(1)
Jianwei Huang
(1)
Jisheng Zhao
(1)
Jizhou Chen
(3)
Joey Allen
(6)
Jonathon T. Giffin
(5)
Josh Hodosh
(1)
Junjie Zhang
(8)
Kandy Phan
(1)
Kangjie Lu
(7)
Kapil Singh
(3)
Keaton Sadoski
(2)
Kennon Bittick
(1)
Kevin Borgolte
(1)
Kevin Day
(1)
Key-whan Chung
(1)
Kui W. Mok
(1)
Kyuhong Park
(2)
Leo Mark
(1)
Ling Liu
(1)
Liu Yang
(1)
Long Lu
(8)
Lorenzo Alvisi
(1)
Manos Antonakakis
(10)
Mansour Alharthi
(1)
Marcus Peinado
(1)
Marie-Therese Walter
(1)
Martim Carbone
(2)
Martin Andreoni
(1)
Martin W. Fong
(1)
Matthew Landen
(5)
Matthew Pruett
(2)
Mattia Fazzini
(2)
Maura Pintor
(1)
Meng Xu
(2)
Michael Backes
(2)
Michael D. Brown
(1)
Michael Zhivich
(1)
Mitch Halpin
(1)
Mohammad A. Noureddine
(1)
Monirul Islam Sharif
(10)
Monjur Alam
(1)
Moses Ike
(4)
Mustaque Ahamad
(1)
Nick Feamster
(3)
Niels Provos
(1)
Nikolaos Vasiloglou
(2)
Oleg M. Kolesnikov
(2)
Omar Alrawi
(2)
Patrick Traynor
(1)
Paul Royal
(3)
Paul Vixie
(1)
Peng Zhou
(3)
Phillip A. Porras
(4)
Prahlad Fogla
(7)
Raghav Bhat
(1)
Ram Shankar
(1)
Ranjita Pai Kasturi
(1)
Ren Ding
(2)
Richard J. Lipton
(2)
Robert Edmonds
(1)
Roberto Perdisci
(22)
Rocky K. C. Chang
(3)
Romuald Valme
(2)
Rui Zhong
(4)
Ruian Duan
(3)
Runze Zhang
(1)
Ryan Elder
(1)
Saeed Abu-Nimeh
(1)
Sai Ragam
(1)
Salvatore J. Stolfo
(2)
Saman A. Zonouz
(1)
Sangdon Park
(1)
Sangho Lee
(3)
Sanya Chaba
(1)
Sarah Mackay
(1)
Seulbae Kim
(1)
Shabsi Walfish
(1)
Shenglong Yao
(1)
Shuang Hao
(1)
Simon P. Chung
(16)
Simon Pak Ho Chung
(6)
Somesh Jha
(1)
Son K. Dao
(1)
Stefan Nümberger
(1)
Stefan Nürnberger
(1)
Steven Han
(1)
Sumeer Bhola
(1)
Taesoo Kim
(16)
Tatuya Jinmei
(1)
Tielei Wang
(6)
Tim Leek
(2)
Udi Weinsberg
(1)
Unum Sarfraz
(2)
Vasileios P. Kemerlis
(1)
Vinod Yegneswaran
(4)
Vladimir Kolesnikov
(2)
Wajih Ul Hassan
(1)
Wei Meng
(4)
Weibo Gong
(1)
Weidong Cui
(2)
Weiren Wang
(1)
Wenke Lee
(129)
William Harris
(2)
William R. Harris
(1)
Willian T. Lunardi
(1)
Xiangyu Zhang
(1)
Xiapu Luo
(9)
Xinyu Xing
(3)
Xinzhou Qin
(3)
Xuxian Jiang
(1)
Yacin Nadji
(4)
Yan Zong Ding
(1)
Yang Ji
(5)
Yanick Fratantonio
(3)
Yeongjin Jang
(6)
Yevgeniy Dodis
(1)
Yibin Yang
(1)
Yichang Xiong
(1)
Yinglian Xie
(1)
Yisroel Mirsky
(3)
Yiyuan Xiong
(1)
Yizheng Chen
(2)
Yong Huang
(1)
Yongguang Zhang
(1)
Yongheng Chen
(5)
Yunheung Paek
(1)
Yupeng Yang
(4)
Yuval Elovici
(1)
Zheng Yang
(6)
Zhenyu Wu
(2)
Zhichun Li
(2)
Zhiyun Qian
(1)
Zhongfu Su
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to