- Internet Traffic Analysis and Secure E-voting
- Network Security and Intrusion Detection
- Spam and Phishing Detection
- Advanced Malware Detection Techniques
- Advanced Wireless Communication Technologies
- Caching and Content Delivery
- Web Application Security Vulnerabilities
- Wireless Communication Security Techniques
- Wireless Signal Modulation Classification
- Cooperative Communication and Network Coding
- User Authentication and Security Systems
- Dynamics and Control of Mechanical Systems
- Structural Health Monitoring Techniques
- Bacteriophages and microbial interactions
- PARP inhibition in cancer therapy
- Security and Verification in Computing
- Escherichia coli research studies
- DNA Repair Mechanisms
- RNA modifications and cancer
- Advanced Decision-Making Techniques
- Privacy, Security, and Data Protection
- Satellite Communication Systems
- Opportunistic and Delay-Tolerant Networks
- Peer-to-Peer Network Technologies
- Numerical methods for differential equations
Xinjiang Agricultural University
2025
Tsinghua University
1999-2024
Peking University
2024
State Key Laboratory of Protein and Plant Gene Research
2024
Center for Information Technology
2021
Beijing University of Posts and Telecommunications
2020-2021
In this paper, we report a series of flaws in the software stack that leads to strong revival DNS cache poisoning --- classic attack which is mitigated practice with simple and effective randomization-based defenses such as randomized source port. To successfully poison on typical server, an off-path adversary would need send impractical number $2^32 $ spoofed responses simultaneously guessing correct port (16-bit) transaction ID (16-bit). Surprisingly, discover weaknesses allow "divide...
This investigation aimed to examine the virulence genes and antimicrobial resistance profiles of Shiga toxin-producing
We describe how malicious customers can attack the availability of Content Delivery Networks (CDNs) by creating forwarding loops inside one CDN or across multiple CDNs.Such cause request to be processed repeatedly even indefinitely, resulting in undesired resource consumption and potential Denial-of-Service attacks.To evaluate practicality such forwarding-loop attacks, we examined 16 popular providers found all them are vulnerable some form attacks.While CDNs appear aware this threat have...
Numerous measurement researches have been performed to discover the IPv4 network security issues by leveraging fast Internet-wide scanning techniques. However, IPv6 brings 128-bit address space and renders brute-force impractical. Although significant efforts dedicated enumerating active hosts, limited technique efficiency probing accuracy, large-scale empirical studies under increasing networks are infeasible now. To fill this research gap, extensively adopted allocation strategy, we...
HTTPS is principally designed for secure end-to-end communication, which adds confidentiality and integrity to sensitive data transmission. While several man-in-the-middle attacks (e.g., SSL Stripping) are available break the secured connections, state-of-the-art security policies HSTS) have significantly increased cost of successful attacks. However, TLS certificates shared by multiple domains make hijacking possible again.
Public hosting services provide convenience for domain owners to build web applications with better scalability and security. However, if a name points released service endpoints (e.g., nameservers allocated by provider), adversaries can take over the applying same endpoints. Such security threat is called "hosting-based takeover''. In recent years, large number of takeover incidents have occurred; even well-known websites like subdomains microsoft.com been impacted. until now, there has no...
The Internet has become a complex distributed network with numerous middle-boxes, where an end-to-end HTTP request is often processed by multiple intermediate servers before it reaches its destination. However, general problem in this the semantic gap attack, which defined as inconsistent interpretations processing chain. While some studies have found individual attacks, most of them are based on ad-hoc manual analysis, inadequate for fundamentally enhancing security assurance system...
We carry out the first in-depth characterization of residential proxies (RESIPs) in China, for which little is studied previous works. Our study made possible through a semantic-based classifier to automatically capture RESIP services. In addition classifier, new techniques have also been identified RESIPs without interacting with and relaying traffic services, can significantly lower cost thus allow continuous monitoring RESIPs. service has achieved good performance recall 99.7% precision...
This paper investigates effect of malicious intelligence reflecting surface (IRS). The IRS is utilized for performing attack by randomly data sequences legitimate users (LUs) to a base station (BS). We find that the LUs are correlative signals reflected IRS. correlation undermines performance traditional eigenvalue decomposition (EVD)-based channel estimation (CE) methods. To address this challenge, we propose an empirical-distribution-based approach in presence proposed method works...
Public hosting services offer a convenient and secure option for creating web applications. However, adversaries can take over domain by exploiting released service endpoints, leading to hosting-based takeover. This threat has affected numerous popular websites, including the subdomains of microsoft.com. no effective detection system identifying vulnerable domains at scale exists date. paper fills research gap presenting novel framework, HostingChecker, detecting takeovers. HostingChecker...
This paper considers channel coding problems with the requirement of guaranteeing information integrity in presence malicious relays (MRs). The proved random scheme yields to an achievable rate formula which is identical its counterpart obtained non-MRs system as long a non-manipulable condition satisfied. No pre-shared secret or transmission needed for scheme. Hence generally larger than those achieved based on schemes. In addition, we further prove that systems binary symmetric channels...
Public hosting services offer a convenient and secure option for creating web applications. However, adversaries can take over domain by exploiting released service endpoints, leading to hosting-based takeover. This threat has affected numerous popular websites, including the subdomains of microsoft.com. no effective detection system identifying vulnerable domains at scale exists date. paper fills research gap presenting novel framework, HostingChecker, detecting takeovers. HostingChecker...
This paper investigates effect of malicious intelligence reflecting surface (IRS). The IRS is utilized for performing attack by randomly data sequences legitimate users (LUs) to a base station (BS). We find that the LUs are correlative signals reflected IRS. correlation undermines performance traditional eigenvalue decomposition (EVD)-based channel estimation (CE) methods. To address this challenge, we propose empirical-distribution-based approach in presence proposed method works capturing...
As a fundamental communicative service, email is playing an important role in both individual and corporate communications, which also makes it one of the most frequently attack vectors. An email's authenticity based on authentication chain involving multiple protocols, roles services, inconsistency among creates security threats. Thus, depends weakest link chain, as any failed part can break whole chain-based defense. This paper systematically analyzes transmission identifies series new...