Search Results - "Liu, Daiping"
-
1
Detecting Malicious Javascript in PDF through Document Instrumentation
Published in 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (01-06-2014)“…An emerging threat vector, embedded malware inside popular document formats, has become rampant since 2008. Owed to its wide-spread use and Javascript support,…”
Get full text
Conference Proceeding -
2
E-Android: A New Energy Profiling Tool for Smartphones
Published in 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) (01-06-2017)“…As the limited battery lifetime remains a major factor restricting the applicability of a smartphone, significant research efforts have been devoted to…”
Get full text
Conference Proceeding -
3
Detecting Passive Cheats in Online Games via Performance-Skillfulness Inconsistency
Published in 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (01-06-2017)“…As the most commonly used bots in first-person shooter (FPS) online games, aimbots are notoriously difficult to detect because they are completely passive and…”
Get full text
Conference Proceeding -
4
A Comprehensive Measurement-based Investigation of DNS Hijacking
Published in 2021 40th International Symposium on Reliable Distributed Systems (SRDS) (01-09-2021)“…Attacks against the domain name system (DNS) have long plagued the Internet, requiring continual investigation and vigilance to prevent the abuse of this…”
Get full text
Conference Proceeding -
5
Understanding and Detecting Newly Emerging Attack Vectors in Cybercrimes
Published 01-01-2018“…Numerous efforts have been devoted to securing computer systems in the past decade, which has rendered many previously popular attacks ineffective. In response…”
Get full text
Dissertation -
6
Dynamic application flow cluster based on traffic behavior distance
Published in 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE) (01-08-2010)“…New network applications as well as security threats are emerging in an endless stream. However, existing methods cannot efficiently identify and classify the…”
Get full text
Conference Proceeding