What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Zhuoqing Morley Mao
Google Scholar
26
publications in security and cryptology related venues
Year
Venue
Title
2018
conf/ccs
No One In The Middle: Enabling Network Access Control Via Transparent Attribution.
Jeremy Erickson
Qi Alfred Chen
Xiaochen Yu
Erinjen Lin
Robert Levy
Zhuoqing Morley Mao
2017
conf/ccs
Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic Study.
Qi Alfred Chen
Matthew Thomas
Eric Osterweil
Yulong Cao
Jie You
Zhuoqing Morley Mao
2017
conf/ccs
An Initial Investigation of Protocol Customization.
David Ke Hong
Qi Alfred Chen
Zhuoqing Morley Mao
2017
conf/eurosp
Open Doors for Bob and Mallory: Open Port Usage in Android Apps and Security Implications.
Yunhan Jack Jia
Qi Alfred Chen
Yikai Lin
Chao Kong
Zhuoqing Morley Mao
2017
conf/ndss
ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms.
Yunhan Jack Jia
Qi Alfred Chen
Shiqi Wang
Amir Rahmati
Earlence Fernandes
Zhuoqing Morley Mao
Atul Prakash
2016
conf/ccs
The Misuse of Android Unix Domain Sockets and Security Implications.
Yuru Shao
Jason Ott
Yunhan Jack Jia
Zhiyun Qian
Zhuoqing Morley Mao
2016
conf/fc
Android UI Deception Revisited: Attacks and Defenses.
Earlence Fernandes
Qi Alfred Chen
Justin Paupore
Georg Essl
J. Alex Halderman
Zhuoqing Morley Mao
Atul Prakash
2016
conf/sp
MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era.
Qi Alfred Chen
Eric Osterweil
Matthew Thomas
Zhuoqing Morley Mao
2016
conf/ndss
Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework.
Yuru Shao
Qi Alfred Chen
Zhuoqing Morley Mao
Jason Ott
Zhiyun Qian
2015
conf/ccs
Static Detection of Packet Injection Vulnerabilities: A Case for Identifying Attacker-controlled Implicit Information Leaks.
Qi Alfred Chen
Zhiyun Qian
Yunhan Jack Jia
Yuru Shao
Zhuoqing Morley Mao
2014
conf/uss
Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks.
Qi Alfred Chen
Zhiyun Qian
Zhuoqing Morley Mao
2013
conf/ccs
SocialWatch: detection of online service abuse via large-scale social graphs.
Junxian Huang
Yinglian Xie
Fang Yu
Qifa Ke
Martín Abadi
Eliot Gillum
Zhuoqing Morley Mao
2012
conf/ccs
Innocent by association: early recognition of legitimate users.
Yinglian Xie
Fang Yu
Qifa Ke
Martín Abadi
Eliot Gillum
Krish Vitaldevaria
Jason Walter
Junxian Huang
Zhuoqing Morley Mao
2012
conf/ccs
Collaborative TCP sequence number inference attack: how to crack sequence number under a second.
Zhiyun Qian
Zhuoqing Morley Mao
Yinglian Xie
2012
conf/sp
Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security.
Zhiyun Qian
Zhuoqing Morley Mao
2012
conf/ndss
You Can Run, but You Can't Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks.
Zhiyun Qian
Zhaoguang Wang
Qiang Xu
Zhuoqing Morley Mao
Ming Zhang
Yi-Min Wang
2010
conf/sp
Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique.
Zhiyun Qian
Zhuoqing Morley Mao
Yinglian Xie
Fang Yu
2010
conf/ndss
On Network-level Clusters for Spam Detection.
Zhiyun Qian
Zhuoqing Morley Mao
Yinglian Xie
Fang Yu
2010
conf/ndss
On the Safety of Enterprise Policy Deployment.
Yudong Gao
Ni Pan
Xu Chen
Zhuoqing Morley Mao
2009
conf/dsn
HC-BGP: A light-weight and flexible scheme for securing prefix ownership.
Ying Zhang
Zheng Zhang
Zhuoqing Morley Mao
Y. Charlie Hu
2008
conf/dsn
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware.
Xu Chen
Jonathon Andersen
Zhuoqing Morley Mao
Michael D. Bailey
Jose Nazario
2007
conf/sp
Accurate Real-time Identification of IP Prefix Hijacking.
Xin Hu
Zhuoqing Morley Mao
2007
conf/ndss
Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing.
Ying Zhang
Zhuoqing Morley Mao
Jia Wang
2007
conf/dsn
A Firewall for Routers: Protecting against Routing Misbehavior.
Ying Zhang
Zhuoqing Morley Mao
Jia Wang
2006
conf/dsn
Hotspots: The Root Causes of Non-Uniformity in Self-Propagating Malware.
Evan Cooke
Zhuoqing Morley Mao
Farnam Jahanian
2005
conf/ndss
Enriching Intrusion Alerts Through Multi-Host Causality.
Samuel T. King
Zhuoqing Morley Mao
Dominic G. Lucchetti
Peter M. Chen
Coauthors
Amir Rahmati
(1)
Atul Prakash
(2)
Chao Kong
(1)
David Ke Hong
(1)
Dominic G. Lucchetti
(1)
Earlence Fernandes
(2)
Eliot Gillum
(2)
Eric Osterweil
(2)
Erinjen Lin
(1)
Evan Cooke
(1)
Fang Yu
(4)
Farnam Jahanian
(1)
Georg Essl
(1)
J. Alex Halderman
(1)
Jason Ott
(2)
Jason Walter
(1)
Jeremy Erickson
(1)
Jia Wang
(2)
Jie You
(1)
Jonathon Andersen
(1)
Jose Nazario
(1)
Junxian Huang
(2)
Justin Paupore
(1)
Krish Vitaldevaria
(1)
Martín Abadi
(2)
Matthew Thomas
(2)
Michael D. Bailey
(1)
Ming Zhang
(1)
Ni Pan
(1)
Peter M. Chen
(1)
Qi Alfred Chen
(10)
Qiang Xu
(1)
Qifa Ke
(2)
Robert Levy
(1)
Samuel T. King
(1)
Shiqi Wang
(1)
Xiaochen Yu
(1)
Xin Hu
(1)
Xu Chen
(2)
Y. Charlie Hu
(1)
Yi-Min Wang
(1)
Yikai Lin
(1)
Ying Zhang
(3)
Yinglian Xie
(5)
Yudong Gao
(1)
Yulong Cao
(1)
Yunhan Jack Jia
(4)
Yuru Shao
(3)
Zhaoguang Wang
(1)
Zheng Zhang
(1)
Zhiyun Qian
(9)
Zhuoqing Morley Mao
(26)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to