Hercule: Attack story reconstruction via community discovery on correlated log graph K Pei, Z Gu, B Saltaformaggio, S Ma, F Wang, Z Zhang, L Si, X Zhang, ... Proceedings of the 32Nd Annual Conference on Computer Security Applications …, 2016 | 180 | 2016 |
{MPI}: Multiple perspective attack investigation with semantic aware execution partitioning S Ma, J Zhai, F Wang, KH Lee, X Zhang, D Xu 26th USENIX Security Symposium (USENIX Security 17), 1111-1128, 2017 | 128 | 2017 |
MCI: Modeling-based causality inference in audit logging for attack investigation Y Kwon, F Wang, W Wang, KH Lee, WC Lee, S Ma, X Zhang, D Xu, S Jha, ... Network and Distributed Systems Security (NDSS) Symposium, 2018 | 113 | 2018 |
PS-TRUST: Provably secure solution for truthful double spectrum auctions Z Chen, L Huang, L Li, W Yang, H Miao, M Tian, F Wang IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 1249-1257, 2014 | 42 | 2014 |
NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces. Y Ye, Z Zhang, F Wang, X Zhang, D Xu NDSS, 2021 | 36 | 2021 |
A novel text steganography by context-based equivalent substitution F Wang, L Huang, Z Chen, W Yang, H Miao 2013 IEEE international conference on signal processing, communication and …, 2013 | 27 | 2013 |
Lprov: Practical library-aware provenance tracing F Wang, Y Kwon, S Ma, X Zhang, D Xu Proceedings of the 34th Annual Computer Security Applications Conference …, 2018 | 16 | 2018 |
A novel distributed covert channel in HTTP F Wang, L Huang, H Miao, M Tian Security and Communication Networks 7 (6), 1031-1041, 2014 | 5 | 2014 |
{ProFactory}: Improving {IoT} Security via Formalized Protocol Customization F Wang, J Wu, Y Nan, Y Aafer, X Zhang, D Xu, M Payer 31st USENIX Security Symposium (USENIX Security 22), 3879-3896, 2022 | 4 | 2022 |
LiHB: Lost in HTTP Behaviors-A Behavior-Based Covert Channel in HTTP Y Shen, L Huang, F Wang, X Lu, W Yang, L Li Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia …, 2015 | 4 | 2015 |
A novel web tunnel detection method based on protocol behaviors F Wang, L Huang, Z Chen, H Miao, W Yang Security and Privacy in Communication Networks: 9th International ICST …, 2013 | 3 | 2013 |
Steganography in HTML Based on Substitution of Script Codes F Wang, L Huang, H Miao, Z Chen, W Yang International Journal of Security and Its Applications 7 (4), 387-398, 2013 | 2 | 2013 |
Forensics and Formalized Protocol Customization for Enhancing Networking Security F Wang Purdue University, 2021 | | 2021 |