Xiaojing Liao
Xiaojing Liao
Verified email at indiana.edu
Title
Cited by
Cited by
Year
Acing the ioc game: Toward automatic discovery and analysis of open-source cyber threat intelligence
X Liao, K Yuan, XF Wang, Z Li, L Xing, R Beyah
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1332016
Semfuzz: Semantics-based automatic generation of proof-of-concept exploits
W You, P Zong, K Chen, XF Wang, X Liao, P Bian, B Liang
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
522017
Staying secure and unprepared: Understanding and mitigating the security risks of apple zeroconf
X Bai, L Xing, N Zhang, XF Wang, X Liao, T Li, SM Hu
2016 IEEE Symposium on Security and Privacy (SP), 655-674, 2016
402016
Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~ X and iOS
L Xing, X Bai, T Li, XF Wang, K Chen, X Liao, SM Hu, X Han
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
382015
Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~ X and iOS
L Xing, X Bai, T Li, XF Wang, K Chen, X Liao, SM Hu, X Han
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
382015
Privacy-preserving and secure top-k query in two-tier wireless sensor network
X Liao, J Li
2012 IEEE Global Communications Conference (GLOBECOM), 335-341, 2012
362012
Under the shadow of sunshine: Understanding and detecting bulletproof hosting on legitimate service provider networks
S Alrwais, X Liao, X Mi, P Wang, XF Wang, F Qian, R Beyah, D McCoy
2017 IEEE Symposium on Security and Privacy (SP), 805-823, 2017
332017
Seeking nonsense, looking for trouble: Efficient promotional-infection detection through semantic inconsistency search
X Liao, K Yuan, XF Wang, Z Pei, H Yang, J Chen, H Duan, K Du, ...
2016 IEEE Symposium on Security and Privacy (SP), 707-723, 2016
302016
Resident evil: Understanding residential IP proxy as a dark service
X Mi, X Feng, X Liao, B Liu, XF Wang, F Qian, Z Li, S Alrwais, L Sun, Y Liu
2019 IEEE Symposium on Security and Privacy (SP), 1185-1201, 2019
292019
Stealthy porn: Understanding real-world adversarial images for illicit online promotion
K Yuan, D Tang, X Liao, XF Wang, X Feng, Y Chen, M Sun, H Lu, K Zhang
2019 IEEE Symposium on Security and Privacy (SP), 952-966, 2019
212019
Cracking wall of confinement: Understanding and analyzing malicious domain takedowns
E Alowaisheq
The Network and Distributed System Security Symposium (NDSS), 2019
182019
Characterizing long-tail SEO spam on cloud web hosting services
X Liao, C Liu, D McCoy, E Shi, S Hao, R Beyah
Proceedings of the 25th International Conference on World Wide Web, 321-332, 2016
182016
Reading Thieves' cant: automatically identifying and understanding dark jargons from cybercrime marketplaces
K Yuan, H Lu, X Liao, XF Wang
27th USENIX Security Symposium (USENIX Security 18), 1027-1041, 2018
152018
Catching predators at watering holes: finding and understanding strategically compromised websites
S Alrwais, K Yuan, E Alowaisheq, X Liao, A Oprea, XF Wang, Z Li
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
152016
Unauthorized cross-app resource access on mac os x and ios
L Xing, X Bai, T Li, XF Wang, K Chen, X Liao, SM Hu, X Han
arXiv preprint arXiv:1505.06836, 2015
152015
Di-PriDA: Differentially private distributed load balancing control for the smart grid
X Liao, P Srinivasan, D Formby, RA Beyah
IEEE Transactions on Dependable and Secure Computing 16 (6), 1026-1039, 2017
142017
Systems and methods for detection of infected websites
X Wang, K Yuan, X Liao, RA Beyah
US Patent 10,880,330, 2020
132020
Lurking malice in the cloud: Understanding and detecting cloud repository as a malicious service
X Liao, S Alrwais, K Yuan, L Xing, XF Wang, S Hao, R Beyah
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
122016
S-match: Verifiable privacy-preserving profile matching for mobile social services
X Liao, S Uluagac, RA Beyah
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
122014
Understanding and securing device vulnerabilities through automated bug report analysis
X Feng, X Liao, X Wang, H Wang, Q Li, K Yang, H Zhu, L Sun
SEC'19: Proceedings of the 28th USENIX Conference on Security Symposium, 2019
112019
The system can't perform the operation now. Try again later.
Articles 1–20