Search For:

Displaying 1-10 out of 10 total
CipherXRay: Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution
Found in: IEEE Transactions on Dependable and Secure Computing
By Xin Li,Xinyuan Wang,Wentao Chang
Issue Date:March 2014
pp. 101-114
Malwares are becoming increasingly stealthy, more and more malwares are using cryptographic algorithms (e.g., packing, encrypting C&C communication) to protect themselves from being analyzed. The use of cryptographic algorithms and truly transie...
 
Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
Found in: IEEE Transactions on Dependable and Secure Computing
By Xinyuan Wang, Douglas S. Reeves
Issue Date:May 2011
pp. 434-449
Network-based intruders seldom attack their victims directly from their own computer. Often, they stage their attacks through intermediate “stepping stones” in order to conceal their identity and origin. To identify the source of the attack behind the step...
 
An Application-Level Data Transparent Authentication Scheme without Communication Overhead
Found in: IEEE Transactions on Computers
By Songqing Chen, Shiping Chen, Xinyuan Wang, Zhao Zhang, Sushil Jajodia
Issue Date:July 2010
pp. 943-954
With abundant aggregate network bandwidth, continuous data streams are commonly used in scientific and commercial applications. Correspondingly, there is an increasing demand of authenticating these data streams. Existing strategies explore data stream aut...
 
Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems
Found in: Security and Privacy, IEEE Symposium on
By Xinyuan Wang, Shiping Chen, Sushil Jajodia
Issue Date:May 2007
pp. 116-130
<p>Many proposed low-latency anonymous communication systems have used various flow transformations such as traffic padding, adding cover traffic (or bogus packets), packet dropping, flow mixing, flow splitting, and flow merging to achieve anonymity....
 
WormTerminator
Found in: Symposium On Architecture For Networking And Communications Systems
By Songqing Chen, Xinyuan Wang, Lei Liu, Xinwen Zhang
Issue Date:December 2006
pp. 173-182
The fast spreading worm is becoming one of the most serious threats to today's networked information systems. A fast spreading worm could infect hundreds of thousands of hosts within a few m
 
A Host-Based Approach for Unknown Fast-Spreading Worm Detection and Containment
Found in: ACM Transactions on Autonomous and Adaptive Systems (TAAS)
By Lei Liu, Songqing Chen, Xinwen Zhang, Xinyuan Wang, Zhao Zhang
Issue Date:January 2014
pp. 1-18
The fast-spreading worm, which immediately propagates itself after a successful infection, is becoming one of the most serious threats to today’s networked information systems. In this article, we present WormTerminator, a host-based solution for fas...
     
Stealthy malware detection and monitoring through VMM-based “out-of-the-box” semantic view reconstruction
Found in: ACM Transactions on Information and System Security (TISSEC)
By Dongyan Xu, Xinyuan Wang, Xuxian Jiang
Issue Date:February 2010
pp. 1-28
An alarming trend in recent malware incidents is that they are armed with stealthy techniques to detect, evade, and subvert malware detection facilities of the victim. On the defensive side, a fundamental limitation of traditional host-based antimalware sy...
     
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers
Found in: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security (ASIACCS '09)
By Ruishan Zhang, Ryan Farley, Xiaohui Yang, Xinyuan Wang, Xuxian Jiang
Issue Date:March 2009
pp. 48-54
The man-in-the-middle (MITM) attack has been shown to be one of the most serious threats to the security and trust of existing VoIP protocols and systems. For example, the MITM who is in the VoIP signaling and/or media path can easily wiretap, divert and e...
     
WormTerminator: an effective containment of unknown and polymorphic fast spreading worms
Found in: Proceedings of the 2006 ACM/IEEE symposium on Architecture for networking and communications systems (ANCS '06)
By Lei Liu, Songqing Chen, Xinwen Zhang, Xinyuan Wang
Issue Date:December 2006
pp. 173-182
The fast spreading worm is becoming one of the most serious threats to today's networked information systems. A fast spreading worm could infect hundreds of thousands of hosts within a few minutes. In order to stop a fast spreading worm, we need the capabi...
     
Tracking anonymous peer-to-peer VoIP calls on the internet
Found in: Proceedings of the 12th ACM conference on Computer and communications security (CCS '05)
By Shiping Chen, Sushil Jajodia, Xinyuan Wang
Issue Date:November 2005
pp. 81-91
Peer-to-peer VoIP calls are becoming increasingly popular due to their advantages in cost and convenience. When these calls are encrypted from end to end and anonymized by low latency anonymizing network, they are considered by many people to be both secur...
     
 1