Xiaofeng Zheng

ORCID: 0000-0002-7130-6029
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Internet Traffic Analysis and Secure E-voting
  • Network Security and Intrusion Detection
  • Spam and Phishing Detection
  • Advanced Malware Detection Techniques
  • Advanced Wireless Communication Technologies
  • Caching and Content Delivery
  • Web Application Security Vulnerabilities
  • Wireless Communication Security Techniques
  • Wireless Signal Modulation Classification
  • Cooperative Communication and Network Coding
  • User Authentication and Security Systems
  • Dynamics and Control of Mechanical Systems
  • Structural Health Monitoring Techniques
  • Bacteriophages and microbial interactions
  • PARP inhibition in cancer therapy
  • Security and Verification in Computing
  • Escherichia coli research studies
  • DNA Repair Mechanisms
  • RNA modifications and cancer
  • Advanced Decision-Making Techniques
  • Privacy, Security, and Data Protection
  • Satellite Communication Systems
  • Opportunistic and Delay-Tolerant Networks
  • Peer-to-Peer Network Technologies
  • Numerical methods for differential equations

Xinjiang Agricultural University
2025

Tsinghua University
1999-2024

Peking University
2024

State Key Laboratory of Protein and Plant Gene Research
2024

Center for Information Technology
2021

Beijing University of Posts and Telecommunications
2020-2021

In this paper, we report a series of flaws in the software stack that leads to strong revival DNS cache poisoning --- classic attack which is mitigated practice with simple and effective randomization-based defenses such as randomized source port. To successfully poison on typical server, an off-path adversary would need send impractical number $2^32 $ spoofed responses simultaneously guessing correct port (16-bit) transaction ID (16-bit). Surprisingly, discover weaknesses allow "divide...

10.1145/3372297.3417280 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2020-10-30

This investigation aimed to examine the virulence genes and antimicrobial resistance profiles of Shiga toxin-producing

10.1089/fpd.2024.0056 article EN Foodborne Pathogens and Disease 2025-01-06

We describe how malicious customers can attack the availability of Content Delivery Networks (CDNs) by creating forwarding loops inside one CDN or across multiple CDNs.Such cause request to be processed repeatedly even indefinitely, resulting in undesired resource consumption and potential Denial-of-Service attacks.To evaluate practicality such forwarding-loop attacks, we examined 16 popular providers found all them are vulnerable some form attacks.While CDNs appear aware this threat have...

10.14722/ndss.2016.23442 article EN 2016-01-01

Numerous measurement researches have been performed to discover the IPv4 network security issues by leveraging fast Internet-wide scanning techniques. However, IPv6 brings 128-bit address space and renders brute-force impractical. Although significant efforts dedicated enumerating active hosts, limited technique efficiency probing accuracy, large-scale empirical studies under increasing networks are infeasible now. To fill this research gap, extensively adopted allocation strategy, we...

10.1109/dsn48987.2021.00025 article EN 2021-06-01

HTTPS is principally designed for secure end-to-end communication, which adds confidentiality and integrity to sensitive data transmission. While several man-in-the-middle attacks (e.g., SSL Stripping) are available break the secured connections, state-of-the-art security policies HSTS) have significantly increased cost of successful attacks. However, TLS certificates shared by multiple domains make hijacking possible again.

10.1145/3372297.3417252 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2020-10-30

Public hosting services provide convenience for domain owners to build web applications with better scalability and security. However, if a name points released service endpoints (e.g., nameservers allocated by provider), adversaries can take over the applying same endpoints. Such security threat is called "hosting-based takeover''. In recent years, large number of takeover incidents have occurred; even well-known websites like subdomains microsoft.com been impacted. until now, there has no...

10.1145/3579440 article EN Proceedings of the ACM on Measurement and Analysis of Computing Systems 2023-02-27

The Internet has become a complex distributed network with numerous middle-boxes, where an end-to-end HTTP request is often processed by multiple intermediate servers before it reaches its destination. However, general problem in this the semantic gap attack, which defined as inconsistent interpretations processing chain. While some studies have found individual attacks, most of them are based on ad-hoc manual analysis, inadequate for fundamentally enhancing security assurance system...

10.1109/dsn53405.2022.00014 article EN 2022-06-01

We carry out the first in-depth characterization of residential proxies (RESIPs) in China, for which little is studied previous works. Our study made possible through a semantic-based classifier to automatically capture RESIP services. In addition classifier, new techniques have also been identified RESIPs without interacting with and relaying traffic services, can significantly lower cost thus allow continuous monitoring RESIPs. service has achieved good performance recall 99.7% precision...

10.1145/3548606.3559377 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2022-11-07

This paper investigates effect of malicious intelligence reflecting surface (IRS). The IRS is utilized for performing attack by randomly data sequences legitimate users (LUs) to a base station (BS). We find that the LUs are correlative signals reflected IRS. correlation undermines performance traditional eigenvalue decomposition (EVD)-based channel estimation (CE) methods. To address this challenge, we propose an empirical-distribution-based approach in presence proposed method works...

10.1109/iccworkshops50388.2021.9473775 article EN 2022 IEEE International Conference on Communications Workshops (ICC Workshops) 2021-06-01

Public hosting services offer a convenient and secure option for creating web applications. However, adversaries can take over domain by exploiting released service endpoints, leading to hosting-based takeover. This threat has affected numerous popular websites, including the subdomains of microsoft.com. no effective detection system identifying vulnerable domains at scale exists date. paper fills research gap presenting novel framework, HostingChecker, detecting takeovers. HostingChecker...

10.1145/3578338.3593534 article EN 2023-06-14

This paper considers channel coding problems with the requirement of guaranteeing information integrity in presence malicious relays (MRs). The proved random scheme yields to an achievable rate formula which is identical its counterpart obtained non-MRs system as long a non-manipulable condition satisfied. No pre-shared secret or transmission needed for scheme. Hence generally larger than those achieved based on schemes. In addition, we further prove that systems binary symmetric channels...

10.1109/tvt.2020.3025305 article EN IEEE Transactions on Vehicular Technology 2020-09-21

Public hosting services offer a convenient and secure option for creating web applications. However, adversaries can take over domain by exploiting released service endpoints, leading to hosting-based takeover. This threat has affected numerous popular websites, including the subdomains of microsoft.com. no effective detection system identifying vulnerable domains at scale exists date. paper fills research gap presenting novel framework, HostingChecker, detecting takeovers. HostingChecker...

10.1145/3606376.3593534 article EN ACM SIGMETRICS Performance Evaluation Review 2023-06-26

This paper investigates effect of malicious intelligence reflecting surface (IRS). The IRS is utilized for performing attack by randomly data sequences legitimate users (LUs) to a base station (BS). We find that the LUs are correlative signals reflected IRS. correlation undermines performance traditional eigenvalue decomposition (EVD)-based channel estimation (CE) methods. To address this challenge, we propose empirical-distribution-based approach in presence proposed method works capturing...

10.48550/arxiv.2008.13400 preprint EN cc-by-nc-sa arXiv (Cornell University) 2020-01-01

As a fundamental communicative service, email is playing an important role in both individual and corporate communications, which also makes it one of the most frequently attack vectors. An email's authenticity based on authentication chain involving multiple protocols, roles services, inconsistency among creates security threats. Thus, depends weakest link chain, as any failed part can break whole chain-based defense. This paper systematically analyzes transmission identifies series new...

10.48550/arxiv.2011.08420 preprint EN other-oa arXiv (Cornell University) 2020-01-01
Coming Soon ...