What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Chaoyi Lu
Google Scholar
16
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
HADES Attack: Understanding and Evaluating Manipulation Risks of Email Blocklists.
Ruixuan Li
Chaoyi Lu
Baojun Liu
Yunyi Zhang
Geng Hong
Haixin Duan
Yanzhong Lin
Qingfeng Pan
Min Yang
Jun Shao
2024
conf/ndss
Understanding the Implementation and Security Implications of Protective DNS Services.
Mingxuan Liu
Yiming Zhang
Xiang Li
Chaoyi Lu
Baojun Liu
Haixin Duan
Xiaofeng Zheng
2023
conf/ccs
TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers.
Wei Xu
Xiang Li
Chaoyi Lu
Baojun Liu
Haixin Duan
Jia Zhang
Jianjun Chen
Tao Wan
2023
conf/ccs
Silence is not Golden: Disrupting the Load Balancing of Authoritative DNS Servers.
Fenglu Zhang
Baojun Liu
Eihal Alowaisheq
Jianjun Chen
Chaoyi Lu
Linjian Song
Yong Ma
Ying Liu
Haixin Duan
Min Yang
2023
conf/uss
The Maginot Line: Attacking the Boundary of DNS Caching Protection.
Xiang Li
Chaoyi Lu
Baojun Liu
Qifan Zhang
Zhou Li
Haixin Duan
Qi Li
2022
conf/eurosp
Ethics in Security Research: Visions, Reality, and Paths Forward.
Yiming Zhang
Mingxuan Liu
Mingming Zhang
Chaoyi Lu
Haixin Duan
2021
conf/ccs
Rusted Anchors: A National Client-Side View of Hidden Root CAs in the Web PKI Ecosystem.
Yiming Zhang
Baojun Liu
Chaoyi Lu
Zhou Li
Haixin Duan
Jiachen Li
Zaifeng Zhang
2021
conf/uss
Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks.
Kaiwen Shen
Chuhan Wang
Minglei Guo
Xiaofeng Zheng
Chaoyi Lu
Baojun Liu
Yuxuan Zhao
Shuang Hao
Haixin Duan
Qingfeng Pan
Min Yang
2021
conf/ndss
From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR.
Chaoyi Lu
Baojun Liu
Yiming Zhang
Zhou Li
Fenglu Zhang
Haixin Duan
Ying Liu
Joann Qiongna Chen
Jinjin Liang
Zaifeng Zhang
Shuang Hao
Min Yang
2020
conf/ccs
Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks.
Mingming Zhang
Xiaofeng Zheng
Kaiwen Shen
Ziqiao Kong
Chaoyi Lu
Yu Wang
Haixin Duan
Shuang Hao
Baojun Liu
Min Yang
2020
conf/ccs
Lies in the Air: Characterizing Fake-base-station Spam Ecosystem in China.
Yiming Zhang
Baojun Liu
Chaoyi Lu
Zhou Li
Haixin Duan
Shuang Hao
Mingxuan Liu
Ying Liu
Dong Wang
Qiang Li
2020
conf/uss
Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Devices.
Xiaofeng Zheng
Chaoyi Lu
Jian Peng
Qiushi Yang
Dongjie Zhou
Baojun Liu
Keyu Man
Shuang Hao
Haixin Duan
Zhiyun Qian
2019
conf/eurosp
TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis.
Baojun Liu
Zhou Li
Peiyuan Zong
Chaoyi Lu
Hai-Xin Duan
Ying Liu
Sumayah A. Alrwais
XiaoFeng Wang
Shuang Hao
Yaoqi Jia
Yiming Zhang
Kai Chen
Zaifeng Zhang
2018
conf/uss
Measuring Privacy Threats in China-Wide Mobile Networks.
Mingming Zhang
Baojun Liu
Chaoyi Lu
Jia Zhang
Shuang Hao
Hai-Xin Duan
2018
conf/uss
Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path.
Baojun Liu
Chaoyi Lu
Hai-Xin Duan
Ying Liu
Zhou Li
Shuang Hao
Min Yang
2018
conf/dsn
A Reexamination of Internationalized Domain Names: The Good, the Bad and the Ugly.
Baojun Liu
Chaoyi Lu
Zhou Li
Ying Liu
Hai-Xin Duan
Shuang Hao
Zaifeng Zhang
Coauthors
Baojun Liu
(15)
Chaoyi Lu
(16)
Chuhan Wang
(1)
Dong Wang
(1)
Dongjie Zhou
(1)
Eihal Alowaisheq
(1)
Fenglu Zhang
(2)
Geng Hong
(1)
Hai-Xin Duan
(4)
Haixin Duan
(12)
Jia Zhang
(2)
Jiachen Li
(1)
Jian Peng
(1)
Jianjun Chen
(2)
Jinjin Liang
(1)
Joann Qiongna Chen
(1)
Jun Shao
(1)
Kai Chen
(1)
Kaiwen Shen
(2)
Keyu Man
(1)
Linjian Song
(1)
Min Yang
(6)
Minglei Guo
(1)
Mingming Zhang
(3)
Mingxuan Liu
(3)
Peiyuan Zong
(1)
Qi Li
(1)
Qiang Li
(1)
Qifan Zhang
(1)
Qingfeng Pan
(2)
Qiushi Yang
(1)
Ruixuan Li
(1)
Shuang Hao
(9)
Sumayah A. Alrwais
(1)
Tao Wan
(1)
Wei Xu
(1)
Xiang Li
(3)
XiaoFeng Wang
(1)
Xiaofeng Zheng
(4)
Yanzhong Lin
(1)
Yaoqi Jia
(1)
Yiming Zhang
(6)
Ying Liu
(6)
Yong Ma
(1)
Yu Wang
(1)
Yunyi Zhang
(1)
Yuxuan Zhao
(1)
Zaifeng Zhang
(4)
Zhiyun Qian
(1)
Zhou Li
(7)
Ziqiao Kong
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to