


Остановите войну!
for scientists:


default search action
Guofei Gu
Person information

- affiliation: Texas A&M University, SUCCESS Lab, College Station, TX, USA
- affiliation (PhD 2008): Georgia Institute of Technology, College of Computing, Atlanta, GA, USA
- affiliation: Fudan University, Shanghai, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j28]Menghao Zhang
, Guanyu Li
, Xiao Kong, Chang Liu, Mingwei Xu
, Guofei Gu
, Jianping Wu:
NetHCF: Filtering Spoofed IP Traffic With Programmable Switches. IEEE Trans. Dependable Secur. Comput. 20(2): 1641-1655 (2023) - [j27]Ala Altaweel
, Radu Stoleru
, Guofei Gu
, Arnab Kumar Maity, Suman Bhunia
:
On Detecting Route Hijacking Attack in Opportunistic Mobile Networks. IEEE Trans. Dependable Secur. Comput. 20(3): 2516-2532 (2023) - [j26]Sungmin Hong
, Lei Xu, Jianwei Huang, Hongda Li
, Hongxin Hu
, Guofei Gu
:
SysFlow: Toward a Programmable Zero Trust Framework for System Security. IEEE Trans. Inf. Forensics Secur. 18: 2794-2809 (2023) - 2022
- [j25]Renjie Xie, Jiahao Cao
, Qi Li
, Kun Sun
, Guofei Gu
, Mingwei Xu
, Yuan Yang
:
Disrupting the SDN Control Channel via Shared Links: Attacks and Countermeasures. IEEE/ACM Trans. Netw. 30(5): 2158-2172 (2022) - [c103]Hongda Li, Qiqing Huang, Fei Ding, Hongxin Hu, Long Cheng, Guofei Gu, Ziming Zhao:
Understanding and Detecting Remote Infection on Linux-based IoT Devices. AsiaCCS 2022: 873-887 - [c102]Lei Xue, Yangyang Liu, Tianqi Li, Kaifa Zhao, Jianfeng Li, Le Yu, Xiapu Luo, Yajin Zhou, Guofei Gu:
SAID: State-aware Defense Against Injection Attacks on In-vehicle Network. USENIX Security Symposium 2022: 1921-1938 - [c101]Le Yu, Yangyang Liu, Pengfei Jing, Xiapu Luo, Lei Xue, Kaifa Zhao, Yajin Zhou, Ting Wang, Guofei Gu, Sen Nie, Shi Wu:
Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols. USENIX Security Symposium 2022: 1939-1956 - [c100]Phakpoom Chinprutthiwong, Jianwei Huang, Guofei Gu:
SWAPP: A New Programmable Playground for Web Application Security. USENIX Security Symposium 2022: 2029-2046 - [c99]Payton Walker, Nathan McClaran, Zihao Zheng, Nitesh Saxena, Guofei Gu:
BiasHacker: Voice Command Disruption by Exploiting Speaker Biases in Automatic Speech Recognition. WISEC 2022: 119-124 - 2021
- [j24]Menghao Zhang
, Guanyu Li
, Lei Xu, Jiasong Bai, Mingwei Xu
, Guofei Gu, Jianping Wu:
Control Plane Reflection Attacks and Defenses in Software-Defined Networks. IEEE/ACM Trans. Netw. 29(2): 623-636 (2021) - [j23]Guanyu Li
, Menghao Zhang
, Shicheng Wang
, Chang Liu, Mingwei Xu
, Ang Chen, Hongxin Hu
, Guofei Gu, Qi Li
, Jianping Wu:
Enabling Performant, Flexible and Cost-Efficient DDoS Defense With Programmable Switches. IEEE/ACM Trans. Netw. 29(4): 1509-1526 (2021) - [c98]Guofei Gu:
Programmable Security in the Age of Software-Defined Infrastructure. CCSW@CCS 2021: 1 - [c97]Yangyong Zhang, Sunpreet S. Arora, Maliheh Shirvanian, Jianwei Huang, Guofei Gu:
Practical Speech Re-use Prevention in Voice-driven Services. RAID 2021: 282-295 - [c96]Phakpoom Chinprutthiwong, Raj Vardhan, Guangliang Yang, Yangyong Zhang, Guofei Gu:
The Service Worker Hiding in Your Browser: The Next Web Attack Target? RAID 2021: 312-323 - [c95]Lei Xue, Hao Zhou
, Xiapu Luo, Yajin Zhou, Yang Shi, Guofei Gu, Fengwei Zhang, Man Ho Au:
Happer: Unpacking Android Apps via a Hardware-Assisted Approach. IEEE Symposium on Security and Privacy 2021: 1641-1658 - [c94]Feng Xiao, Jianwei Huang, Yichang Xiong, Guangliang Yang, Hong Hu, Guofei Gu, Wenke Lee:
Abusing Hidden Properties to Attack the Node.js Ecosystem. USENIX Security Symposium 2021: 2951-2968 - [i4]Yangyong Zhang, Maliheh Shirvanian, Sunpreet S. Arora, Jianwei Huang, Guofei Gu:
Practical Speech Re-use Prevention in Voice-driven Services. CoRR abs/2101.04773 (2021) - [i3]Raj Vardhan, Ninghao Liu, Phakpoom Chinprutthiwong, Weijie Fu, Zhenyu Hu, Xia Ben Hu, Guofei Gu:
ExAD: An Ensemble Approach for Explanation-based Adversarial Detection. CoRR abs/2103.11526 (2021) - 2020
- [c93]Phakpoom Chinprutthiwong, Raj Vardhan, Guangliang Yang, Guofei Gu:
Security Study of Service Worker Cross-Site Scripting. ACSAC 2020: 643-654 - [c92]Guofei Gu:
Your Cybersecurity Is Now Programmable: Experiments on Networking and Blockchain Systems. SBC@AsiaCCS 2020: 2 - [c91]Benyu Zhang, Matei Zaharia, Shouling Ji, Raluca Ada Popa, Guofei Gu:
PPMLP 2020: Workshop on Privacy-Preserving Machine Learning In Practice. CCS 2020: 2139-2140 - [c90]Guorui Yu, Guangliang Yang, Tongxin Li, Xinhui Han, Shijie Guan, Jialong Zhang, Guofei Gu:
MinerGate: A Novel Generic and Accurate Defense Solution Against Web Based Cryptocurrency Mining Attacks. CNCERT 2020: 50-70 - [c89]Ting Chen, Rong Cao, Ting Li, Xiapu Luo, Guofei Gu, Yufei Zhang, Zhou Liao, Hang Zhu, Gang Chen, Zheyuan He, Yuxing Tang, Xiaodong Lin, Xiaosong Zhang:
SODA: A Generic Online Detection Framework for Smart Contracts. NDSS 2020 - [c88]Jiahao Cao, Renjie Xie, Kun Sun, Qi Li, Guofei Gu, Mingwei Xu:
When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN. NDSS 2020 - [c87]Menghao Zhang, Guanyu Li, Shicheng Wang, Chang Liu, Ang Chen, Hongxin Hu, Guofei Gu, Qi Li, Mingwei Xu, Jianping Wu:
Poseidon: Mitigating Volumetric DDoS Attacks with Programmable Switches. NDSS 2020 - [c86]Feng Xiao, Jinquan Zhang, Jianwei Huang, Guofei Gu, Dinghao Wu, Peng Liu:
Unexpected Data Dependency Creation and Chaining: A New Attack to SDN. IEEE Symposium on Security and Privacy 2020: 1512-1526 - [e6]Hung-Min Sun, Shiuh-Pyng Shieh, Guofei Gu, Giuseppe Ateniese:
ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020. ACM 2020, ISBN 978-1-4503-6750-9 [contents] - [e5]Benyu Zhang, Raluca Ada Popa, Matei Zaharia, Guofei Gu, Shouling Ji:
PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, Virtual Event, USA, November, 2020. ACM 2020, ISBN 978-1-4503-8088-1 [contents] - [i2]Jianwei Huang, Vinod Yegneswaran, Phillip A. Porras, Guofei Gu:
On the Privacy and Integrity Risks of Contact-Tracing Applications. CoRR abs/2012.03283 (2020)
2010 – 2019
- 2019
- [j22]Lei Chen, Guofei Gu, Wenjia Li, Rami J. Haddad:
Editorial: special issue on "The security, privacy, and digital forensics of mobile networks and mobile cloud". Digit. Commun. Networks 5(4): 203-204 (2019) - [j21]Gail-Joon Ahn
, Guofei Gu, Hongxin Hu
, Seungwon Shin
:
Guest Editors' Introduction: Special Section on Security in Emerging Networking Technologies. IEEE Trans. Dependable Secur. Comput. 16(6): 913-914 (2019) - [c85]Ala Altaweel
, Radu Stoleru, Guofei Gu, Arnab Kumar Maity:
CollusiveHijack: A New Route Hijacking Attack and Countermeasures in Opportunistic Networks. CNS 2019: 73-81 - [c84]Guanyu Li, Menghao Zhang
, Chang Liu, Xiao Kong, Ang Chen, Guofei Gu, Haixin Duan:
NETHCF: Enabling Line-rate and Adaptive Spoofed IP Traffic Filtering. ICNP 2019: 1-12 - [c83]Yangyong Zhang, Lei Xu, Abner Mendoza, Guangliang Yang, Phakpoom Chinprutthiwong, Guofei Gu:
Life after Speech Recognition: Fuzzing Semantic Misinterpretation for Voice Assistant Applications. NDSS 2019 - [c82]Jiahao Cao, Qi Li, Renjie Xie, Kun Sun, Guofei Gu, Mingwei Xu, Yuan Yang:
The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links. USENIX Security Symposium 2019: 19-36 - [c81]Guangliang Yang, Jeff Huang, Guofei Gu:
Iframes/Popups Are Dangerous in Mobile WebView: Studying and Mitigating Differential Context Vulnerabilities. USENIX Security Symposium 2019: 977-994 - [e4]Gail-Joon Ahn, Guofei Gu, Hongxin Hu, Seungwon Shin:
SDN-NFV@CODASPY 2019 - roceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, Richardson, TX, USA, March 27, 2019. ACM 2019, ISBN 978-1-4503-6179-8 [contents] - 2018
- [j20]David Hausheer, Oliver Hohlfeld
, Stefan Schmid, Guofei Gu:
Security and performance of software-defined networks and functions virtualization. Comput. Networks 138: 15-17 (2018) - [j19]Weili Han
, Zhigong Li, Minyue Ni, Guofei Gu, Wenyuan Xu:
Shadow Attacks Based on Password Reuses: A Quantitative Empirical Analysis. IEEE Trans. Dependable Secur. Comput. 15(2): 309-320 (2018) - [j18]Jing Zheng
, Qi Li
, Guofei Gu, Jiahao Cao
, David K. Y. Yau, Jianping Wu:
Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis. IEEE Trans. Inf. Forensics Secur. 13(7): 1838-1853 (2018) - [j17]Lei Xue
, Xiaobo Ma, Xiapu Luo
, Edmond W. W. Chan, TungNgai Miu, Guofei Gu:
LinkScope: Toward Detecting Target Link Flooding Attacks. IEEE Trans. Inf. Forensics Secur. 13(10): 2423-2438 (2018) - [c80]Haopei Wang, Guangliang Yang, Phakpoom Chinprutthiwong, Lei Xu, Yangyong Zhang, Guofei Gu:
Towards Fine-grained Network Security Forensics and Diagnosis in the SDN Era. CCS 2018: 3-16 - [c79]Hongda Li, Hongxin Hu, Guofei Gu, Gail-Joon Ahn
, Fuqiang Zhang:
vNIDS: Towards Elastic Security with Safe and Efficient Virtualization of Network Intrusion Detection Systems. CCS 2018: 17-34 - [c78]Richard Skowyra, Lei Xu, Guofei Gu, Veer Dedhia, Thomas Hobson, Hamed Okhravi, James Landry:
Effective Topology Tampering Attacks and Defenses in Software-Defined Networks. DSN 2018: 374-385 - [c77]Seungwon Shin, Zhaoyan Xu, Yeonkeun Kim, Guofei Gu:
CloudRand: Building Heterogeneous and Moving-Target Network Interfaces. ICCCN 2018: 1-11 - [c76]Guangliang Yang, Jeff Huang, Guofei Gu:
Automated Generation of Event-Oriented Exploits in Android Hybrid Apps. NDSS 2018 - [c75]Menghao Zhang
, Guanyu Li, Lei Xu, Jun Bi, Guofei Gu, Jiasong Bai:
Control Plane Reflection Attacks in SDNs: New Attacks and Countermeasures. RAID 2018: 161-183 - [c74]Jialong Zhang, Jiyong Jang, Guofei Gu, Marc Ph. Stoecklin, Xin Hu:
Error-Sensor: Mining Information from HTTP Error Traffic for Malware Intelligence. RAID 2018: 467-489 - [c73]Guangliang Yang, Jeff Huang, Guofei Gu, Abner Mendoza:
Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage Enabled Mobile Applications. IEEE Symposium on Security and Privacy 2018: 742-755 - [c72]Abner Mendoza, Guofei Gu:
Mobile Application Web API Reconnaissance: Web-to-Mobile Inconsistencies & Vulnerabilities. IEEE Symposium on Security and Privacy 2018: 756-769 - [c71]Abner Mendoza, Phakpoom Chinprutthiwong, Guofei Gu:
Uncovering HTTP Header Inconsistencies and the Impact on Desktop/Mobile Websites. WWW 2018: 247-256 - [e3]Gail-Joon Ahn, Guofei Gu, Hongxin Hu, Seungwon Shin:
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, SDN-NFVSec@CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018. ACM 2018 [contents] - 2017
- [j16]Yuhong Nan
, Zhemin Yang, Min Yang, Shunfan Zhou, Yuan Zhang, Guofei Gu, Xiaofeng Wang, Limin Sun:
Identifying User-Input Privacy in Mobile Applications at a Large Scale. IEEE Trans. Inf. Forensics Secur. 12(3): 647-661 (2017) - [j15]Changhoon Yoon
, Seungsoo Lee, Heedo Kang, Taejune Park, Seungwon Shin
, Vinod Yegneswaran, Phillip A. Porras, Guofei Gu:
Flow Wars: Systemizing the Attack Surface and Defenses in Software-Defined Networks. IEEE/ACM Trans. Netw. 25(6): 3514-3530 (2017) - [c70]Guofei Gu, Hongxin Hu, Eric Keller, Zhiqiang Lin, Donald E. Porter:
Building a Security OS With Software Defined Infrastructure. APSys 2017: 4:1-4:8 - [c69]Ala Altaweel
, Radu Stoleru, Guofei Gu:
EvilDirect: A New Wi-Fi Direct Hijacking Attack and Countermeasures. ICCCN 2017: 1-11 - [c68]Chao Yang, Jialong Zhang, Guofei Gu:
Understanding the Market-Level and Network-Level Behaviors of the Android Malware Ecosystem. ICDCS 2017: 2452-2457 - [c67]Haopei Wang, Abhinav Srivastava, Lei Xu, Sungmin Hong, Guofei Gu:
Bring your own controller: Enabling tenant-defined SDN apps in IaaS clouds. INFOCOM 2017: 1-9 - [c66]Guangliang Yang, Abner Mendoza, Jialong Zhang, Guofei Gu:
Precisely and Scalably Vetting JavaScript Bridge in Android Hybrid Apps. RAID 2017: 143-166 - [c65]Lei Xue, Yajin Zhou, Ting Chen, Xiapu Luo, Guofei Gu:
Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART. USENIX Security Symposium 2017: 289-306 - [c64]Lei Xu, Jeff Huang, Sungmin Hong, Jialong Zhang, Guofei Gu:
Attacking the Brain: Races in the SDN Control Plane. USENIX Security Symposium 2017: 451-468 - [e2]Gail-Joon Ahn, Guofei Gu, Hongxin Hu, Seungwon Shin:
Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, SDN-NFVSec@CODASPY 2017, Scottsdale, Arizona, USA, March 24, 2017. ACM 2017, ISBN 978-1-4503-4908-6 [contents] - 2016
- [j14]Amin Hassanzadeh, Zhaoyan Xu, Radu Stoleru, Guofei Gu, Michalis Polychronakis:
PRIDE: A practical intrusion detection system for resource constrained wireless mesh networks. Comput. Secur. 62: 114-132 (2016) - [j13]Yuan Zhang, Min Yang
, Guofei Gu, Hao Chen
:
Rethinking Permission Enforcement Mechanism on Mobile Systems. IEEE Trans. Inf. Forensics Secur. 11(10): 2227-2240 (2016) - [c63]Seungwon Shin, Lei Xu, Sungmin Hong, Guofei Gu:
Enhancing Network Security through Software Defined Networking (SDN). ICCCN 2016: 1-9 - [c62]Jialong Zhang, Xin Hu, Jiyong Jang, Ting Wang, Guofei Gu, Marc Ph. Stoecklin:
Hunting for invisibility: Characterizing and detecting malicious web infrastructures through server visibility analysis. INFOCOM 2016: 1-9 - [c61]Sungmin Hong, Robert Baykov, Lei Xu, Srinath Nadimpalli, Guofei Gu:
Towards SDN-Defined Programmable BYOD (Bring Your Own Device) Security. NDSS 2016 - [e1]Gail-Joon Ahn, Guofei Gu, Hongxin Hu, Seungwon Shin:
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, SDN-NFV@CODASPY 2016, New Orleans, LA, USA, March 11, 2016. ACM 2016, ISBN 978-1-4503-4078-6 [contents] - 2015
- [j12]Chenxiong Qian, Xiapu Luo
, Le Yu, Guofei Gu:
VulHunter: Toward Discovering Vulnerabilities in Android Applications. IEEE Micro 35(1): 44-53 (2015) - [j11]Seungwon Shin, Haopei Wang, Guofei Gu:
A First Step Toward Network Security Virtualization: From Concept To Prototype. IEEE Trans. Inf. Forensics Secur. 10(10): 2236-2249 (2015) - [j10]Shui Yu
, Guofei Gu, Ahmed Barnawi, Song Guo
, Ivan Stojmenovic:
Malware Propagation in Large-Scale Networks. IEEE Trans. Knowl. Data Eng. 27(1): 170-179 (2015) - [c60]Haopei Wang, Lei Xu, Guofei Gu:
FloodGuard: A DoS Attack Prevention Extension in Software-Defined Networks. DSN 2015: 239-250 - [c59]Jialong Zhang, Sabyasachi Saha, Guofei Gu, Sung-Ju Lee, Marco Mellia
:
Systematic Mining of Associated Server Herds for Malware Campaign Discovery. ICDCS 2015: 630-641 - [c58]Abner Mendoza, Kapil Singh, Guofei Gu:
What is wrecking your data plan? A measurement study of mobile web overhead. INFOCOM 2015: 2740-2748 - [c57]Sungmin Hong, Lei Xu, Haopei Wang, Guofei Gu:
Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures. NDSS 2015 - [c56]Yuan Zhang, Min Yang, Guofei Gu, Hao Chen
:
FineDroid: Enforcing Permissions with System-Wide Application Execution Context. SecureComm 2015: 3-22 - [c55]Chao Yang, Guangliang Yang, Ashish Gehani, Vinod Yegneswaran, Dawood Tariq, Guofei Gu:
Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps. SecureComm 2015: 58-77 - [c54]Yuhong Nan, Min Yang, Zhemin Yang, Shunfan Zhou, Guofei Gu, Xiaofeng Wang:
UIPicker: User-Input Privacy Identification in Mobile Applications. USENIX Security Symposium 2015: 993-1008 - 2014
- [j9]Yuan Zhang, Min Yang, Zhemin Yang, Guofei Gu, Peng Ning, Binyu Zang:
Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps. IEEE Trans. Inf. Forensics Secur. 9(11): 1828-1842 (2014) - [c53]Chao Yang, Jialong Zhang, Guofei Gu:
A taste of tweets: reverse engineering Twitter spammers. ACSAC 2014: 86-95 - [c52]Zhaoyan Xu, Antonio Nappa
, Robert Baykov, Guangliang Yang, Juan Caballero, Guofei Gu:
AUTOPROBE: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis. CCS 2014: 179-190 - [c51]Chao Yang, Zhaoyan Xu, Guofei Gu, Vinod Yegneswaran, Phillip A. Porras:
DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications. ESORICS (1) 2014: 163-182 - [c50]Yong Wang, Zhaoyan Xu, Jialong Zhang, Lei Xu, Haopei Wang, Guofei Gu:
SRID: State Relation Based Intrusion Detection for False Data Injection Attacks in SCADA. ESORICS (2) 2014: 401-418 - [c49]Antonio Nappa, Zhaoyan Xu, M. Zubair Rafique, Juan Caballero, Guofei Gu:
CyberProbe: Towards Internet-Scale Active Detection of Malicious Servers. NDSS 2014 - [c48]Zhaoyan Xu, Jialong Zhang, Guofei Gu, Zhiqiang Lin:
GoldenEye: Efficiently and Effectively Unveiling Malware's Targeted Environment. RAID 2014: 22-45 - [c47]Yinzhi Cao, Chao Yang, Vaibhav Rastogi, Yan Chen, Guofei Gu:
Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-On Cross Site Scripting Attacks. SecureComm (1) 2014: 582-601 - [c46]Jialong Zhang, Jayant Notani, Guofei Gu:
Characterizing Google Hacking: A First Large-Scale Quantitative Study. SecureComm (1) 2014: 602-622 - 2013
- [j8]Ronaldo M. Salles, Guofei Gu, Morton Swimmer:
Editorial for Computer Networks special issue on ''Botnet Activity: Analysis, Detection and Shutdown''. Comput. Networks 57(2): 375-377 (2013) - [j7]Seungwon Shin, Zhaoyan Xu, Guofei Gu:
EFFORT: A new host-network cooperated framework for efficient and effective bot malware detection. Comput. Networks 57(13): 2628-2642 (2013) - [j6]Chao Yang, Robert Chandler Harkreader, Guofei Gu:
Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers. IEEE Trans. Inf. Forensics Secur. 8(8): 1280-1293 (2013) - [c45]Seungwon Shin, Vinod Yegneswaran, Phillip A. Porras, Guofei Gu:
AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks. CCS 2013: 413-424 - [c44]Yuan Zhang, Min Yang, Bingquan Xu, Zhemin Yang, Guofei Gu, Peng Ning, Xiaoyang Sean Wang, Binyu Zang:
Vetting undesirable behaviors in android apps with permission use analysis. CCS 2013: 611-622 - [c43]Zhemin Yang, Min Yang, Yuan Zhang, Guofei Gu, Peng Ning, Xiaoyang Sean Wang:
AppIntent: analyzing sensitive data transmission in android for privacy leakage detection. CCS 2013: 1043-1054 - [c42]Shardul Vikram, Chao Yang, Guofei Gu:
NOMAD: Towards non-intrusive moving-target defense against web bots. CNS 2013: 55-63 - [c41]Amit A. Amleshwaram, A. L. Narasimha Reddy, Sandeep Yadav, Guofei Gu, Chao Yang:
CATS: Characterizing automation of Twitter spammers. COMSNETS 2013: 1-10 - [c40]Sooel Son
, Seungwon Shin, Vinod Yegneswaran, Phillip A. Porras, Guofei Gu:
Model checking invariant security properties in OpenFlow. ICC 2013: 1974-1979 - [c39]Zhaoyan Xu, Jialong Zhang, Guofei Gu, Zhiqiang Lin:
AUTOVAC: Automatically Extracting System Resource Constraints and Generating Vaccines for Malware Immunization. ICDCS 2013: 112-123 - [c38]Amin Hassanzadeh, Zhaoyan Xu, Radu Stoleru, Guofei Gu, Michalis Polychronakis:
PRIDE: Practical Intrusion Detection in Resource Constrained Wireless Mesh Networks. ICICS 2013: 213-228 - [c37]Seungwon Shin, Phillip A. Porras, Vinod Yegneswaran, Martin W. Fong, Guofei Gu, Mabry Tyson:
FRESCO: Modular Composable Security Services for Software-Defined Networks. NDSS 2013 - [c36]Jialong Zhang, Guofei Gu:
NEIGHBORWATCHER: A Content-Agnostic Comment Spam Inference System. NDSS 2013 - [c35]Seungwon Shin, Guofei Gu:
Attacking software-defined networks: a first feasibility study. HotSDN 2013: 165-166 - 2012
- [j5]Scott Hand, Zhiqiang Lin, Guofei Gu, Bhavani Thuraisingham:
Bin-Carver: Automatic recovery of binary executable files. Digit. Investig. 9(Supplement): S108-S117 (2012) - [j4]Seungwon Shin, Guofei Gu, A. L. Narasimha Reddy, Christopher P. Lee:
A Large-Scale Empirical Study of Conficker. IEEE Trans. Inf. Forensics Secur. 7(2): 676-690 (2012) - [j3]Chao Yang, Yimin Song, Guofei Gu:
Active User-Side Evil Twin Access Point Detection Using Statistical Techniques. IEEE Trans. Inf. Forensics Secur. 7(5): 1638-1651 (2012) - [j2]Weiqin Ma, Pu Duan, Sanmin Liu, Guofei Gu, Jyh-Charn Liu:
Shadow attacks: automatically evading system-call-behavior based malware detection. J. Comput. Virol. 8(1-2): 1-13 (2012) - [c34]Guofei Gu:
Machine learning meets social networking security: detecting and analyzing malicious social networks for fun and profit. AISec 2012: 1-2 - [c33]Cong Zheng, Shixiong Zhu, Shuaifu Dai, Guofei Gu, Xiaorui Gong, Xinhui Han, Wei Zou:
SmartDroid: an automatic system for revealing UI-based trigger conditions in android applications. SPSM@CCS 2012: 93-104 - [c32]Zhaoyan Xu, Lingfeng Chen, Guofei Gu, Christopher Kruegel:
PeerPress: utilizing enemies' P2P strength against them. CCS 2012: 581-592 - [c31]Chao Yang, Vinod Yegneswaran, Phillip A. Porras, Guofei Gu:
Detecting money-stealing apps in alternative Android markets. CCS 2012: 1034-1036 - [c30]Zhaoyan Xu, Jialong Zhang, Guofei Gu, Zhiqiang Lin:
Automatic generation of vaccines for malware immunization. CCS 2012: 1037-1039 - [c29]Seungwon Shin, Guofei Gu:
CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?). ICNP 2012: 1-6 - [c28]Seungwon Shin, Zhaoyan Xu, Guofei Gu:
EFFORT: Efficient and effective bot malware detection. INFOCOM 2012: 2846-2850 - [c27]Jialong Zhang, Chao Yang, Zhaoyan Xu, Guofei Gu:
PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks. RAID 2012: 230-253 - [c26]Phillip A. Porras, Seungwon Shin, Vinod Yegneswaran, Martin W. Fong, Mabry Tyson, Guofei Gu:
A security enforcement kernel for OpenFlow networks. HotSDN@SIGCOMM 2012: 121-126 - [c25]Chao Yang, Robert Chandler Harkreader, Jialong Zhang, Seungwon Shin, Guofei Gu:
Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. WWW 2012: 71-80 - 2011
- [j1]Tielei Wang, Tao Wei, Guofei Gu, Wei Zou:
Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic Execution. ACM Trans. Inf. Syst. Secur. 14(2): 15:1-15:28 (2011) - [c24]