Attack of the Clones: Detecting Cloned Applications on Android Markets. To appear on 17th European Symposium on Research in Computer Security (ESORICS), Pisa, Italy, September 10-12, 2012. (20%)
AndroidLeaks: Automatically Detecting Potential Privacy Leaks In Android Applications on a Large Scale. PDF Abstract Presentation 5th International Conference on Trust & Trustworthy Computing (TRUST), Vienna, Austria, June 13-15, 2012.
On the Practicality of Motion Based Keystroke Infernce Attack. PDF Abstract Presentation 5th International Conference on Trust & Trustworthy Computing (TRUST), Vienna, Austria, June 13-15, 2012.
Investigating User Privacy in Android Ad Libraries. PDF Abstract Presentation IEEE Mobile Security Technologies (MoST), San Francisco, CA, May 24, 2012. (39%)
I-ARM-Droid: A Rewriting Framework for In-App Reference Monitors for Android Applications. PDF Abstract Presentation IEEE Mobile Security Technologies (MoST), San Francisco, CA, May 24, 2012. (39%)
Opaak: Using Mobile Phones to Limit Anonymous Identities Online. PDF Abstract Presentation 10th International Conference on Mobile Systems, Applications and Services (MobiSys), Low Wood Bay, Lake District, United Kingdom, June 26-28, 2012. (18%)
Privacy-Preserving Alibi Systems. PDF Abstract Presentation 7th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Seoul, South Korea, May 1-3, 2012. (30%)
VanGundy:2012:Noncespaces Noncespaces: Using randomization to defeat cross-site scripting attacks. PDF Abstract Computer & Security, 31:612-628, 2012.
TouchLogger: Inferring Keystrokes On Touch Screen From Smartphone Motion. PDF Abstract Slides (PPT PDF) 6th USENIX Workshop on Hot Topics in Security (HotSec '11), San Francisco, CA, August 9, 2011. (20%).
Gesture Authentication with Touch Input for Mobile Devices. PDF Abstract 3rd International Conference on Security and Privacy in Mobile Information and Communication Systems (MobiSec), Aalborg, Denmark, May 17-19, 2011.
Good Neighbor: Secure Pairing of Nearby Wireless Devices by Multiple Antennas. PDF Abstract Slides 18th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 6-9, 2011. (20%)
DBTaint: Cross-Application Information Flow Tracking via Databases. PDF Abstract Slides USENIX Conference on Web Application, Boston, MA, June 23-24, 2010.
WebCallerID: Leveraging Cellular Networks for Web Authentication. PDF Abstract Journal of Computer Security, 19(5), 2011..
CapAuth: A Capability-based Handover Scheme. PDF Abstract IEEE INFOCOM 2010: The 27th Conference on Computer Communications, San Diego, CA, March 15-19, 2010.
Exploiting and Defending Opportunistic Scheduling in Cellular Data Networks. PDF Abstract IEEE Transactions on Mobile Computing, 9:609-620, 2010.
Secure File System Services for Web 2.0 Applications. PDF Abstract Proceedings of the The ACM Cloud Computing Security Workshop (CCSW), Chicago, IL, November 13, 2009. (37%)
Multi-party Off-the-Record Messaging. PDF Abstract Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS), Chicago, IL, November 9-13, 2009. (18%)
Mitigating DoS attacks on the paging channel by efficient encoding in page messages. PDF Abstract Proceedings of the 5th International Conference on Security and Privacy in Communication Networks (SecureComm), Athens, Greece, September 14-18, 2009. (26%)
Noise Injection for Search Privacy Protection. PDF Abstract Proceedings of the 2009 IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT), Vancouver, Canada, August 29-31, 2009. (13%)
Defending against Sensor-Sniffing Attacks on Mobile Phones. PDF Abstract The First ACM SIGCOMM Workshop on Networking, Systems, Applications on Mobile Handhelds (MobiHeld), Barcelona, Spain, August 17, 2009.
Measuring Privacy Risk in Online Social Networks. PDF Abstract Web 2.0 Security and Privacy (W2SP), Oakland, CA, May 21, 2009. (36%)
Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks. PDF Abstract Slide Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 8-11, 2009. (12%)
A general framework for benchmarking firewall optimization techniques. PDF Abstract IEEE Transactions on Network and Service Management, 5(4):227-238, December 2008.
OMash: Enabling Secure Web Mashups via Object Abstractions PDF Abstract Slides (PPTX PDF) Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, October 27-31, 2008. (18%)
iPhish: Phishing Vulnerabilities on Consumer Electronics. PDF Abstract Proceedings of Usability, Psychology, and Security 2008, San Francisco, CA, April, 2008.
Distributed Authentication for Low-Cost Wireless Networks. PDF Abstract Proceedings of the Ninth Workshop on Mobile Computing Systems and Applications (ACM HotMobile), Napa Valley, CA, February 25-26, 2008. (23%)
Exploiting Opportunistic Scheduling in Cellular Data Networks. PDF Abstract Slides Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS 2008), San Diego, CA, February 10-13, 2008. (18%)
Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms. PDF Abstract Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), Miami Beach, FL, December 10-14, 2007. (22%)
Spam Double-Funnel: Connecting Web Spammers with Advertisers. PDF Abstract Proceedings of the 16th International World Wide Web Conference (WWW2007), Banff, Canada, May 8-12, 2007. (15%)
A Quantitative Study of Forum Spamming Using Context-based Analysis. PDF Abstract Slides Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS), pages 79-92, San Diego, CA, February, 2007. (15%)
Back to the Future: A Framework for Automatic Malware Removal and System Repair. PDF PS Abstract Proceedings of 2006 Annual Computer Security Applications Conference (ACSAC 22), Miami Beach, FL, December, 2006. (30%)
Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery. PDF PS Abstract Slides Proceedings of the Second IEEE Communications Society / CreateNet International Conference on Security and Privacy in Communication Networks (SecureComm), Baltimore, MD, August, 2006. (25%)
FIREMAN: a toolkit for FIREwall Modeling and ANalysis. PDF Abstract Proceedings of 2006 IEEE Symposium on Security and Privacy, Oakland, CA, May, 2006. (13%)
Model checking an entire Linux Ddstribution for security violations. PDF PS Abstract Slides Proceedings of 21st Annual Computer Security Applications Conference (ACSAC), Tucson, AZ, December, 2005. (23%)
Using build-integrated static checking to preserve correctness Invariants. PDF PS Abstract Slides(OpenOffice PDF) Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS), pages 288-297, Washington, DC, October 2004. (14%)
Model checking one million lines of C code. PDF PS Abstract Slides(PPT) Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS), pages 171--185, San Diego, CA, February 2004.
Setuid demystified. PDF PS Abstract Slides(PPT) Proceedings of the 11th USENIX Security Symposium, pages 171--190, San Francisco, CA, August 2002.
MOPS: an infrastructure for examining security properties of software. PDF PS Abstract Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS) , pages 235--244, Washington, DC, November 2002.
Optimizing search by showing results in context. PDF PS Abstract Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI), pages 277--284, Seattle, WA, April 2001.
Bringing order to the web: Automatically categorizing search results. PDF PS Word Abstract Slides(PPT) Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI), pages 145--152, The Hague, The Netherlands, April 2000.
Hierarchical classification of web content. PDF PS Abstract Proceedings of the 23rd ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR), pages 256--263, Athens, Greece, July 2000.
Classified displays of web search results. 11th ASIS&T SIG/CR Classification Research Workshop, pages 87--90, November 2000.
Evaluation of decision forests on text categorization. PDF PS Abstract Slides(PPT) Proceedings of the SPIE Conference on Document Recognition and Retrieval VII, volume 3967, pages 191--199, San Jose, CA, January 2000.
Integrating geometrical and linguistic analysis for e-mail signature block parsing. PDF PS Abstract ACM Transactions on Information Systems, 17(4):343--366, October 1999.
Emu: An e-mail preprocessor for text-to-speech. PDF PS Abstract 1998 Workshop on Multimedia Signal Processing, pages 239--244, Redondo Beach, CA, December 1998. IEEE Signal Processing Society.
E-mail signature block analysis. PDF PS Abstract Proceedings of the 14th International Conference on Pattern Recognition (ICPR), pages 1153--1156, Brisbane, Australia, August 1998.
Piecewise linear modulation model of handwriting. PDF PS Abstract Proceedings of the 4th International Conference on Document Analysis and Recognition (ICDAR), pages 363--367, Ulm, Germany, August 1997.
| Hao Chen | <hchen |
AT | cs.ucdavis.edu> |