Follow
Haixin Duan,  段海新
Haixin Duan, 段海新
Verified email at tsinghua.edu.cn - Homepage
Title
Cited by
Cited by
Year
When HTTPS meets CDN: A case of authentication in delegated service
J Liang, J Jiang, H Duan, K Li, T Wan, J Wu
2014 IEEE Symposium on Security and Privacy, 67-82, 2014
1632014
How you get shot in the back: A systematical study about cryptojacking in the real world
G Hong, Z Yang, S Yang, L Zhang, Y Nan, Z Zhang, M Yang, Y Zhang, ...
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1542018
{Dependence-Preserving} data compaction for scalable forensic analysis
MN Hossain, J Wang, O Weisse, R Sekar, D Genkin, B He, SD Stoller, ...
27th USENIX Security Symposium (USENIX Security 18), 1723-1740, 2018
1362018
An end-to-end, large-scale measurement of dns-over-encryption: How far have we come?
C Lu, B Liu, Z Li, S Hao, H Duan, M Zhang, C Leng, Y Liu, Z Zhang, J Wu
Proceedings of the Internet Measurement Conference, 22-35, 2019
1272019
An empirical reexamination of global DNS behavior
H Gao, V Yegneswaran, Y Chen, P Porras, S Ghosh, J Jiang, H Duan
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, 267-278, 2013
1212013
Behavior-based malware analysis and detection
W Liu, P Ren, K Liu, H Duan
2011 first international workshop on complexity and data mining, 39-42, 2011
1112011
IntentFuzzer: detecting capability leaks of android applications
K Yang, J Zhuge, Y Wang, L Zhou, H Duan
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
1072014
Improved Electrical Properties of Low-Temperature Sintered Cu Doped BaCaZrTiO Ceramics.
Y Zhang, H Sun, W Chen
Journal of Electronic Materials 45 (10), 2016
942016
Dns cache poisoning attack reloaded: Revolutions with side channels
K Man, Z Qian, Z Wang, X Zheng, Y Huang, H Duan
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
932020
校园网安全问题分析与对策
段海新
中国教育网络, 22-25, 2005
792005
Who is answering my queries: Understanding and characterizing interception of the {DNS} resolution path
B Liu, C Lu, H Duan, Y Liu, Z Li, S Hao, M Yang
27th USENIX Security Symposium (USENIX Security 18), 1113-1128, 2018
752018
A Reexamination of Internationalized Domain Names: The Good, the Bad and the Ugly.
B Liu, C Lu, Z Li, Y Liu, HX Duan, S Hao, Z Zhang
DSN, 654-665, 2018
672018
Don't let one rotten apple spoil the whole barrel: Towards automated detection of shadowed domains
D Liu, Z Li, K Du, H Wang, B Liu, H Duan
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
672017
Cookies Lack Integrity:{Real-World} Implications
X Zheng, J Jiang, J Liang, H Duan, S Chen, T Wan, N Weaver
24th USENIX Security Symposium (USENIX Security 15), 707-721, 2015
672015
Hold-on: Protecting against on-path DNS poisoning
H Duan, N Weaver, Z Zhao, M Hu, J Liang, J Jiang, K Li, V Paxson
Proc. Workshop on Securing and Trusting Internet Names, SATIN, 2012
622012
Sharing more and checking less: Leveraging common input keywords to detect bugs in embedded systems
L Chen, Y Wang, Q Cai, Y Zhan, H Hu, J Linghu, Q Hou, C Zhang, H Duan, ...
30th USENIX Security Symposium (USENIX Security 21), 303-319, 2021
602021
Can voters detect malicious manipulation of ballot marking devices?
M Bernhard, A McDonald, H Meng, J Hwa, N Bajaj, K Chang, ...
2020 IEEE Symposium on Security and Privacy (SP), 679-694, 2020
59*2020
Reexamining DNS from a global recursive resolver perspective
H Gao, V Yegneswaran, J Jiang, Y Chen, P Porras, S Ghosh, H Duan
IEEE/ACM Transactions on Networking 24 (1), 43-57, 2014
562014
僵尸网络机理与防御技术
江健, 诸葛建伟, 段海新, 吴建平
软件学报 23 (1), 82-96, 2012
562012
Efficient performance estimate for one-class support vector machine
QA Tran, X Li, H Duan
Pattern Recognition Letters 26 (8), 1174-1182, 2005
562005
The system can't perform the operation now. Try again later.
Articles 1–20