Software-defined networking for smart grid resilience: Opportunities and challenges X Dong, H Lin, R Tan, RK Iyer, Z Kalbarczyk Proceedings of the 1st ACM workshop on cyber-physical system security, 61-68, 2015 | 217 | 2015 |
Optimal false data injection attack against automatic generation control in power grids R Tan, HH Nguyen, EYS Foo, X Dong, DKY Yau, Z Kalbarczyk, RK Iyer, ... 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS …, 2016 | 99 | 2016 |
Security analysis of urban railway systems: the need for a cyber-physical perspective B Chen, C Schmittner, Z Ma, WG Temple, X Dong, DL Jones, WH Sanders Computer Safety, Reliability, and Security: SAFECOMP 2015 Workshops, ASSURE …, 2015 | 68 | 2015 |
AdSentry: comprehensive and flexible confinement of JavaScript-based advertisements X Dong, M Tran, Z Liang, X Jiang Proceedings of the 27th Annual Computer Security Applications Conference …, 2011 | 63 | 2011 |
Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning Y Jia, Y Chen, X Dong, P Saxena, J Mao, Z Liang computers & security 55, 62-80, 2015 | 56 | 2015 |
I Know Where You’ve Been: Geo-Inference Attacks via the Browser Cache Y Jia, X Dong, Z Liang, P Saxena Proceedings of the Web 2.0 Security & Privacy Workshop (W2SP 2014), 2014 | 55 | 2014 |
Towards fine-grained access control in javascript contexts K Patil, X Dong, X Li, Z Liang, X Jiang 2011 31st International Conference on Distributed Computing Systems, 720-729, 2011 | 51 | 2011 |
Model-based cybersecurity assessment with nescor smart grid failure scenarios S Jauhar, B Chen, WG Temple, X Dong, Z Kalbarczyk, WH Sanders, ... 2015 IEEE 21st Pacific Rim international symposium on dependable computing …, 2015 | 46 | 2015 |
Tracking the trackers: Fast and scalable dynamic analysis of web content for privacy violations M Tran, X Dong, Z Liang, X Jiang Applied Cryptography and Network Security: 10th International Conference …, 2012 | 43 | 2012 |
An empirical study of dangerous behaviors in firefox extensions J Wang, X Li, X Liu, X Dong, J Wang, Z Liang, Z Feng Information Security: 15th International Conference, ISC 2012, Passau …, 2012 | 40 | 2012 |
Secure and efficient software-based attestation for industrial control devices with arm processors B Chen, X Dong, G Bai, S Jauhar, Y Cheng Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017 | 29 | 2017 |
A Comprehensive Client-side Behavior Model for Diagnosing Attacks in Ajax Applications X Dong, K Patil, J Mao, Z Liang Proceedings of the 18th International Conference on Engineering of Complex …, 2013 | 28 | 2013 |
Protecting sensitive web content from client-side vulnerabilities with CRYPTONS X Dong, Z Chen, H Siadati, S Tople, P Saxena, Z Liang Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 27 | 2013 |
A simulation study on smart grid resilience under software-defined networking controller failures U Ghosh, X Dong, R Tan, Z Kalbarczyk, DKY Yau, RK Iyer Proceedings of the 2nd ACM International Workshop on Cyber-Physical System …, 2016 | 22 | 2016 |
A Quantitative Evaluation of Privilege Separation in Web Browser Designs X Dong, H Hu, Z Liang, P Saxena Proceedings of the 18th European Symposium on Research in Computer Security …, 2013 | 17 | 2013 |
You can’t be me: Enabling trusted paths and user sub-origins in web browsers E Budianto, Y Jia, X Dong, P Saxena, Z Liang Research in Attacks, Intrusions and Defenses: 17th International Symposium …, 2014 | 14 | 2014 |
The right tool for the job: A case for common input scenarios for security assessment X Dong, S Jauhar, WG Temple, B Chen, Z Kalbarczyk, WH Sanders, ... Graphical Models for Security: Third International Workshop, GraMSec 2016 …, 2016 | 2 | 2016 |
‘Establishing common input scenarios for security assessment X Dong, S Jauhar, WG Temple, B Chen, Z Kalbarczyk, WH Sanders, ... Adv. Digit. Sci. Center, Singapore, Tech. Rep, 2023 | 1 | 2023 |
Swapguard: A software-only solution for attesting hot-swappable devices in power grids X Dong, S Jauhar, B Chen 2016 IEEE International Conference on Smart Grid Communications …, 2016 | 1 | 2016 |
A usage-pattern perspective for privacy ranking of Android apps X Li, X Dong, Z Liang Information Systems Security: 10th International Conference, ICISS 2014 …, 2014 | 1 | 2014 |