Follow
Daiping Liu
Daiping Liu
Palo Alto Networks
Verified email at udel.edu - Homepage
Title
Cited by
Cited by
Year
All your dns records point to us: Understanding the security threats of dangling dns records
D Liu, S Hao, H Wang
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1112016
E-commerce reputation manipulation: The emergence of reputation-escalation-as-a-service
H Xu, D Liu, H Wang, A Stavrou
Proceedings of the 24th International Conference on World Wide Web, 1296-1306, 2015
912015
Detecting malicious javascript in pdf through document instrumentation
D Liu, H Wang, A Stavrou
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
812014
Don’t Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains
D Liu, Z Li, K Du, H Wang, B Liu, H Duan
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
672017
A robust and efficient defense against use-after-free exploits via concurrent pointer sweeping
D Liu, M Zhang, H Wang
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
552018
Click fraud detection on the advertiser side
H Xu, D Liu, A Koehl, H Wang, A Stavrou
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
532014
E-android: A new energy profiling tool for smartphones
X Gao, D Liu, D Liu, H Wang, A Stavrou
2017 IEEE 37th international conference on distributed computing systems …, 2017
332017
A comprehensive measurement-based investigation of DNS hijacking
R Houser, S Hao, Z Li, D Liu, C Cotton, H Wang
2021 40th International Symposium on Reliable Distributed Systems (SRDS …, 2021
242021
Detecting passive cheats in online games via performance-skillfulness inconsistency
D Liu, X Gao, M Zhang, H Wang, A Stavrou
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
232017
An empirical investigation of ecommerce-reputation-escalation-as-a-service
H Xu, D Liu, H Wang, A Stavrou
ACM Transactions on the Web (TWEB) 11 (2), 1-35, 2017
122017
Network traffic analysis using refined bayesian reasoning to detect flooding and port scan attacks
D Liu, M Zhang, T Li
2008 International Conference on Advanced Computer Theory and Engineering …, 2008
122008
executable-only-memory-switch (xom-switch): Hiding your code from advanced code reuse attacks in one shot
M Zhang, R Sahita, D Liu
Black Hat Asia, 2018
102018
All Use-After-Free Vulnerabilities Are Not Created Equal: An Empirical Study on Their Characteristics and Detectability
Z Chen, D Liu, J Xiao, H Wang
Proceedings of the 26th International Symposium on Research in Attacks …, 2023
42023
In-line detection of algorithmically generated domains
D Liu, M Walter, B Hua, S Li, F Fei, S Chung, J Wang, W Xu
US Patent 11,729,134, 2023
42023
Ready raider one: Exploring the misuse of cloud gaming services
G Liu, D Liu, S Hao, X Gao, K Sun, H Wang
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
42022
Dial" N" for NXDomain: The Scale, Origin, and Security Implications of DNS Queries to Non-Existent Domains
G Liu, L Jin, S Hao, Y Zhang, D Liu, A Stavrou, H Wang
Proceedings of the 2023 ACM on Internet Measurement Conference, 198-212, 2023
32023
Real-time detection of dns tunneling traffic
D Liu, J Wang, M Walter, F Fei, W Xu
US Patent App. 16/799,655, 2021
32021
Automated extraction and classification of malicious indicators
J Szurdi, D Liu, J Wang
US Patent 11,882,130, 2024
12024
A study of the multiple sign-in feature in web applications
M Albahar, X Gao, G Dagher, D Liu, F Zhang, J Xiao
Security and Privacy in Communication Networks: 15th EAI International …, 2019
12019
Dynamic application flow cluster based on traffic behavior distance
B Peng, W Guo, D Liu, J Fu
2010 3rd International Conference on Advanced Computer Theory and …, 2010
12010
The system can't perform the operation now. Try again later.
Articles 1–20