CDN JUDO: BREAKING THE CDN DOS PROTECTION WITH ITSELF (English)
- New search for: Guo, Run
- New search for: Li, Weizhong
- New search for: Liu, Baojun
- New search for: Hao, Shuang
- New search for: Zhang, Jia
- New search for: Duan, Haixin
- New search for: Sheng, Kaiwen
- New search for: Chen, Jianjun
- New search for: Liu, Ying
- New search for: Guo, Run
- New search for: Li, Weizhong
- New search for: Liu, Baojun
- New search for: Hao, Shuang
- New search for: Zhang, Jia
- New search for: Duan, Haixin
- New search for: Sheng, Kaiwen
- New search for: Chen, Jianjun
- New search for: Liu, Ying
In:
Network and Distributed System Security Symposium 2020 ; Volume 2 of 2
; 926-940
;
2020
- Conference paper / Print
-
Title:CDN JUDO: BREAKING THE CDN DOS PROTECTION WITH ITSELF
-
Contributors:Guo, Run ( author ) / Li, Weizhong ( author ) / Liu, Baojun ( author ) / Hao, Shuang ( author ) / Zhang, Jia ( author ) / Duan, Haixin ( author ) / Sheng, Kaiwen ( author ) / Chen, Jianjun ( author ) / Liu, Ying ( author )
-
Conference:Network and Distributed System Security Symposium ; 27. ; 2020 ; San Diego, Calif.
-
Published in:
-
Publisher:
- New search for: Curran Associates, Inc.
-
Place of publication:Red Hook, NY
-
Publication date:2020
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Source:
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 736
-
EASI: EDGE-BASED SENDER IDENTIFICATION ON RESOURCE-CONSTRAINED PLATFORMS FOR AUTOMOTIVE NETWORKSKneib, Marcel / Schell, Oleg / Huth, Christopher et al. | 2020
- 752
-
BLAG: IMPROVING THE ACCURACY OF BLACKLISTSRamanathan, Sivaramakrishnan / Mirkovic, Jelena / Yu, Minlan et al. | 2020
- 767
-
DEFREC: ESTABLISHING PHYSICAL FUNCTION VIRTUALIZATION TO DISRUPT RECONNAISSANCE OF POWER GRIDS' CYBER-PHYSICAL INFRASTRUCTURESLin, Hui / Zhuang, Jianing / Hu, Yih-Chun / Zhou, Huayu et al. | 2020
- 785
-
REVISITING LEAKAGE ABUSE ATTACKSBlackstone, Laura / Kamara, Seny / Moataz, Tarik et al. | 2020
- 803
-
METAL: A METADATA-HIDING FILE-SHARING SYSTEMChen, Weikeng / Popa, Raluca Ada et al. | 2020
- 821
-
MACAO: A MALICIOUSLY-SECURE AND CLIENT-EFFICIENT ACTIVE ORAMHoang, Thang / Guajardo, Jorge / Yavuz, Attila et al. | 2020
- 839
-
HETEROGENEOUS PRIVATE INFORMATION RETRIEVALMozaffari, Hamid / Houmansadr, Amir et al. | 2020
- 857
-
DYNAMIC SEARCHABLE ENCRYPTION WITH SMALL CLIENT STORAGEDemertzis, Ioannis / Chamani, Javad Ghareh / Papadopoulos, Dimitrios / Papamanthou, Charalampos et al. | 2020
- 875
-
WITHDRAWING THE BGP RE-ROUTING CURTAIN: UNDERSTANDING THE SECURITY IMPACT OF BGP POISONING THROUGH REAL-WORLD MEASUREMENTSSmith, Jared M. / Birkeland, Kyle / McDaniel, Tyler / Schuchard, Max et al. | 2020
- 893
-
IMPA4GT: IMPERSONATION ATTACKS IN 4G NETWORKSRupprecht, David / Kohls, Katharina / Holz, Thorsten / Poepper, Christina et al. | 2020
- 908
-
PRACTICAL TRAFFIC ANALYSIS ATTACKS ON SECURE MESSAGING APPLICATIONSBahramali, Alireza / Houmansadr, Amir / Soltani, Ramin / Goeckel, Dennis / Towsley, Don et al. | 2020
- 926
-
CDN JUDO: BREAKING THE CDN DOS PROTECTION WITH ITSELFGuo, Run / Li, Weizhong / Liu, Baojun / Hao, Shuang / Zhang, Jia / Duan, Haixin / Sheng, Kaiwen / Chen, Jianjun / Liu, Ying et al. | 2020
- 941
-
DEEPBINDIFF: LEARNING PROGRAM-WIDE CODE REPRESENTATIONS FOR BINARY DIFFINGDuan, Yue / Li, Xuezixiang / Wang, Jinghan / Yin, Heng et al. | 2020
- 957
-
PRECISELY CHARACTERIZING SECURITY IMPACT IN A FLOOD OF PATCHES VIA SYMBOLIC RULE COMPARISONWu, Qiushi / He, Yang / McCamant, Stephen / Lu, Kangjie et al. | 2020
- 975
-
UNICORN: RUNTIME PROVENANCE-BASED DETECTOR FOR ADVANCED PERSISTENT THREATSHan, Xueyuan / Pasquier, Thomas / Bates, Adam / Mickens, James / Seltzer, Margo et al. | 2020
- 993
-
CUSTOS: PRACTICAL TAMPER-EVIDENT AUDITING OF OPERATING SYSTEMS USING TRUSTED EXECUTIONPaccagnella, Riccardo / Datta, Pubali / Hassan, Wajih Ul / Bates, Adam / Fletcher, Christopher W / Miller, Andrew / Tian, Dave et al. | 2020
- 1011
-
YOU ARE WHAT YOU DO: HUNTING STEALTHY MALWARE VIA DATA PROVENANCE ANALYSISWang, Qi / Hassan, Wajih UI / Li, Ding / Jee, Kangkook / Yu, Xiao / Zou, Kexuan / Rhee, Junghwan / Chen, Zhengzhang / Cheng, Wei / Gunter, Carl A. et al. | 2020
- 1028
-
OMEGALOG: HIGH-FIDELITY ATTACK INVESTIGATION VIA TRANSPARENT MULTI-LAYER LOG ANALYSISHassan, Wajih Ul / Noureddine, Mohammad A. / Datta, Pubali / Bates, Adam et al. | 2020
- 1044
-
TRIDENT: EFFICIENT 4PC FRAMEWORK FOR PRIVACY PRESERVING MACHINE LEARNINGChaudhari, Harsh / Rachuri, Rahul / Suresh, Ajith et al. | 2020
- 1062
-
SECURE SUBLINEAR TIME DIFFERENTIALLY PRIVATE MEDIAN COMPUTATIONBöhler, Jonas / Kerschbaum, Florian et al. | 2020
- 1080
-
CLOUDLEAK: LARGE-SCALE DEEP LEARNING MODELS STEALING THROUGH ADVERSARIAL EXAMPLESYu, Honggang / Yang, Kaichen / Zhang, Teng / Tsai, Yun-Yun / Ho, Tsung-Yi / Jin, Yier et al. | 2020
- 1096
-
BLAZE: BLAZING FAST PRIVACY-PRESERVING MACHINE LEARNINGPatra, Arpita / Suresh, Ajith et al. | 2020
- 1114
-
PREVALENCE AND IMPACT OF LOW-ENTROPY PACKING SCHEMES IN THE MALWARE ECOSYSTEMMantovani, Alessandro / Aonzo, Simone / Ugarte-Pedrero, Xabier / Merlo, Alessio / Balzarotti, Davide et al. | 2020
- 1129
-
WHEN MALWARE IS PACKIN' HEAT; LIMITS OF MACHINE LEARNING CLASSIFIERS BASED ON STATIC ANALYSIS FEATURESAghakhani, Hojjat / Gritti, Fabio / Mecca, Francesco / Lindorfer, Martina / Ortolani, Stefano / Balzarotti, Davide / Vigna, Giovanni / Kruegel, Christopher et al. | 2020
- 1149
-
UISCOPE: ACCURATE, INSTRUMENTATION-FREE, AND VISIBLE ATTACK INVESTIGATION FOR GUI APPLICATIONSYang, Runqing / Ma, Shiqing / Xu, Haitao / Zhang, Xiangyu / Chen, Yan et al. | 2020
- 1167
-
OCULOCK: EXPLORING HUMAN VISUAL SYSTEM FOR AUTHENTICATION IN VIRTUAL REALITY HEAD-MOUNTED DISPLAYLuo, Shiqing / Nguyen, Anh / Song, Chen / Lin, Feng / Xu, Wenyao / Yan, Zhisheng et al. | 2020
- 1182
-
ON THE RESILIENCE OF BIOMETRIC AUTHENTICATION SYSTEMS AGAINST RANDOM INPUTSZhao, Benjamin Zi Hao / Asghar, Hassan Jameel / Kaafar, Mohamed Ali et al. | 2020
- 1200
-
STRONG AUTHENTICATION WITHOUT TEMPER-RESISTANT HARDWARE AND APPLICATION TO FEDERATED IDENTITIESZhang, Zhenfeng / Wang, Yuchen / Yang, Kang et al. | 2020
- 1215
-
A VIEW FROM THE COCKPIT: EXPLORING PILOT REACTIONS TO ATTACKS ON AVIONIC SYSTEMSSmith, Matthew / Strohmeier, Martin / Harman, Jonathan / Lenders, Vincent / Martinovic, Ivan et al. | 2020
- 1233
-
GENOTYPE EXTRACTION AND FALSE RELATIVE ATTACKS: SECURITY RISKS TO THIRD-PARTY GENETIC GENEALOGY SERVICES BEYOND IDENTITY INFERENCENey, Peter / Ceze, Luis / Kohno, Tadayoshi et al. | 2020
- 1248
-
COMPLEX SECURITY POLICY? A LONGITUDINAL ANALYSIS OF DEPLOYED CONTENT SECURITY POLICIESRoth, Sebastian / Barron, Timothy / Calzavara, Stefano / Nikiforakis, Nick / Stock, Ben et al. | 2020
- 1266
-
INTO THE DEEP WEB: UNDERSTANDING E-COMMERCE FRAUD FROM AUTONOMOUS CHAT WITH CYBERCRIMINALSWang, Peng / Liao, Xiaojing / Qin, Yue / Wang, Xiaofeng et al. | 2020
- 1282
-
COMPLIANCE CAUTIONS: INVESTIGATING SECURITY ISSUES ASSOCIATED WITH U.S. DIGITAL-SECURITY STANDARDSStevens, Rock / Dykstra, Josiah / Everette, Wendy Knox / Chapman, James / Bladow, Garrett / Farmer, Alexander / Halliday, Kevin / Mazurek, Michelle L. et al. | 2020
- 1298
-
LET'S REVOKE: SCALABLE GLOBAL CERTIFICATE REVOCATIONSmith, Trevor / Dickenson, Luke / Seamons, Kent et al. | 2020
- 1312
-
POST-QUANTUM AUTHENTICATION IN TLS 1.3: A PERFORMANCE STUDYSikeridis, Dimitrios / Kampanakis, Panos / Devetsikiotis, Michael et al. | 2020
- 1328
-
DISCO: SIDESTEPPING RPKI'S DEPLOYMENT BARRIERSHlavacek, Tomas / Cunha, Italo / Gilad, Yossi / Herzberg, Amir / Katz-Bassett, Ethan / Schapira, Michael / Shulman, Haya et al. | 2020
- 1345
-
PROOF OF STORAGE-TIME: EFFICIENTLY CHECKING CONTINUOUS DATA AVAILABILTIYAteniese, Giuseppe / Chen, Long / Etemad, Mohammard / Tang, Qiang et al. | 2020
- 1360
-
SPEECHMINER: A FRAMEWORK FOR INVESTIGATING AND MEASURING SPECULATIVE EXECUTION VULNERABILITIESXiao, Yuan / Zhang, Yingian / Teodorescu, Radu et al. | 2020
- 1377
-
PROTECTION: ROOT-OF-TRUST FOR IO IN COMPROMISED PLATFORMSDhar, Aritra / Ulqinaku, Enis / Kostiainen, Kari / Capkun, Srdjan et al. | 2020
- 1395
-
CONTEXT: A GENERIC APPROACH FOR MITIGATING SPECTRESchwarz, Michael / Lipp, Moritz / Canella, Claudio / Schilling, Robert / Kargl, Florian / Gruss, Daniel et al. | 2020
- 1413
-
TOWARDS PLAUSIBLE GRAPH ANONYMIZATIONZhang, Yang / Humbert, Mathias / Surma, Bartlomiej / Manoharan, Praveen / Vreeken, Jilles / Backes, Michael et al. | 2020
- 1428
-
ADVERSARIAL CLASSIFICATION UNDER DIFFERENTIAL PRIVACYGiraldo, Jairo / Cardenas, Alvaro / Kantarcioglu, Murat / Katz, Jonathan et al. | 2020
- 1446
-
LOCALLY DIFFERENTIALLY PRIVATE FREQUENCY ESTIMATION WITH CONSISTENCYWang, Tianhao / Lopuhaä-Zwakenberg, Milan / Li, Zitao / Skoric, Boris / Li, Ninghui et al. | 2020
- 1462
-
DESENSITIZATION: PRIVACY-AWARE AND ATTACK-PRESERVING CRASH REPORTDing, Ren / Hu, Hong / Xu, Wen / Kim, Taesoo et al. | 2020