| 2009 |
20 | | Ruishan Zhang,
Xinyuan Wang,
Ryan Farley,
Xiaohui Yang,
Xuxian Jiang:
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers.
ASIACCS 2009: 61-69 |
19 | | Jing Jin,
Xinyuan Wang:
On the effectiveness of low latency anonymous network in the presence of timing attack.
DSN 2009: 429-438 |
18 | | Zhi Wang,
Xuxian Jiang,
Weidong Cui,
Xinyuan Wang,
Mike Grace:
ReFormat: Automatic Reverse Engineering of Encrypted Messages.
ESORICS 2009: 200-215 |
17 | | Ruishan Zhang,
Xinyuan Wang,
Xiaohui Yang,
Ryan Farley,
Xuxian Jiang:
An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems.
ISPEC 2009: 59-70 |
16 | | Ryan Farley,
Xinyuan Wang:
Roving Bugnet: Distributed Surveillance Threat and Mitigation.
SEC 2009: 39-50 |
| 2008 |
15 | | Zhi Wang,
Xuxian Jiang,
Weidong Cui,
Xinyuan Wang:
Countering Persistent Kernel Rootkits through Systematic Hook Discovery.
RAID 2008: 21-38 |
14 | | Daniel Ramsbrock,
Xinyuan Wang,
Xuxian Jiang:
A First Step towards Live Botmaster Traceback.
RAID 2008: 59-77 |
| 2007 |
13 | | Xuxian Jiang,
Xinyuan Wang,
Dongyan Xu:
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction.
ACM Conference on Computer and Communications Security 2007: 128-138 |
12 | | Xinyuan Wang,
Shiping Chen,
Sushil Jajodia:
Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems.
IEEE Symposium on Security and Privacy 2007: 116-130 |
11 | | Young June Pyun,
Young Hee Park,
Xinyuan Wang,
Douglas S. Reeves,
Peng Ning:
Tracing Traffic through Intermediate Hosts that Repacketize Flows.
INFOCOM 2007: 634-642 |
10 | | Xuxian Jiang,
Xinyuan Wang:
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots.
RAID 2007: 198-218 |
| 2006 |
9 | | Songqing Chen,
Xinyuan Wang,
Lei Liu,
Xinwen Zhang:
WormTerminator: an effective containment of unknown and polymorphic fast spreading worms.
ANCS 2006: 173-182 |
8 | | Shiping Chen,
Xinyuan Wang,
Sushil Jajodia:
On the anonymity and traceability of peer-to-peer VoIP calls.
IEEE Network 20(5): 32-37 (2006) |
7 | | Xinyuan Wang:
The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones.
IJSN 1(3/4): 184-197 (2006) |
| 2005 |
6 | | Xinyuan Wang,
Shiping Chen,
Sushil Jajodia:
Tracking anonymous peer-to-peer VoIP calls on the internet.
ACM Conference on Computer and Communications Security 2005: 81-91 |
5 | | Pai Peng,
Peng Ning,
Douglas S. Reeves,
Xinyuan Wang:
Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets.
ICDCS Workshops 2005: 107-113 |
| 2004 |
4 | | Xinyuan Wang:
The loop fallacy and serialization in tracing intrusion connections through stepping stones.
SAC 2004: 404-411 |
| 2003 |
3 | | Xinyuan Wang,
Douglas S. Reeves:
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays.
ACM Conference on Computer and Communications Security 2003: 20-29 |
| 2002 |
2 | | Xinyuan Wang,
Douglas S. Reeves,
Shyhtsun Felix Wu:
Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones.
ESORICS 2002: 244-263 |
| 2001 |
1 | | Xinyuan Wang,
Douglas S. Reeves,
Shyhtsun Felix Wu,
Jim Yuill:
Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework.
SEC 2001: 369-384 |