Hao Chen's Publications

MAdFraud: Investigating Ad Fraud in Android Applications PDF Abstract Data Set Presentation Jon Crussell, Ryan Stevens, and Hao Chen. 12th International Conference on Mobile Systems, Applications and Services (MobiSys), Bretton Woods, NH, USA, June 16-19, 2014. (13.5%)

Using and Asking: APIs Used in the Android Market and Asked About in StackOverflow. PDF Abstract Daryl Posnett, David Kavaler, Clint Gibler, Hao Chen, Prem Devanbu, and Vladimir Filkov. 5th International Conference on Social Informatics (SocInfo), Kyoto, Japan, November 25-27, 2013.

AnDarwin: Scalable Semantics-Based Detection of Similar Android Applications. PDF Abstract Dataset Jonathan Crussell, Clint Gibler, and Hao Chen. 18th European Symposium on Research in Computer Security (ESORICS), Egham, U.K., September 9-13, 2013. (18%)

RetroSkeleton: Retrofitting Android Apps. PDF AbstractPresentationVideo YouTubeBenjamin Davis and Hao Chen. 11th International Conference on Mobile Systems, Applications and Services (MobiSys), Taipei, Taiwan, June 25-28, 2013. (15.7%)

AdRob: Examining the Landscape and Impact of Android Application Plagiarism. PDF AbstractPresentationVideoYouTube Clint Gibler, Ryan Stevens, Jon Crussell, Hao Chen, Hui Zang, and Heesook Choi. 11th International Conference on Mobile Systems, Applications and Services (MobiSys), Taipei, Taiwan, June 25-28, 2013. (15.7%)

Quantifying the Effects of Removing Permissions from Android Applications. PDF Abstract Eric Gustafson, Kristen Kennedy, and Hao Chen. IEEE Mobile Security Technologies (MoST), San Francisco, CA, May 23, 2013. (40%)

Asking for (and About) Permissions Used by Android Apps. PDF AbstractPresentationRyan Stevens, Jonathan Ganz, Prem Devanbu, Hao Chen and Vladimir Filkov. 10th Working Conference on Mining Software Repositories (MSR), San Francisco, CA, May 18-19, 2013. (38.2%)

Attack of the Clones: Detecting Cloned Applications on Android Markets. PDF Abstract Jonathan Crussell, Clint Gibler, and Hao Chen. 17th European Symposium on Research in Computer Security (ESORICS), Pisa, Italy, September 10-12, 2012. (20%)

AndroidLeaks: Automatically Detecting Potential Privacy Leaks In Android Applications on a Large Scale. PDF AbstractClint Gibler, Jon Crussell, Jeremy Erickson, and Hao Chen. 5th International Conference on Trust & Trustworthy Computing (TRUST), Vienna, Austria, June 13-15, 2012.

On the Practicality of Motion Based Keystroke Inference Attack. PDF AbstractLiang Cai and Hao Chen. 5th International Conference on Trust & Trustworthy Computing (TRUST), Vienna, Austria, June 13-15, 2012.

Investigating User Privacy in Android Ad Libraries.PDF AbstractRyan Stevens, Clint Gibler, Jon Crussell, and Jeremy Erickson and Hao Chen. IEEE Mobile Security Technologies (MoST), San Francisco, CA, May 24, 2012. (39%)

I-ARM-Droid: A Rewriting Framework for In-App Reference Monitors for Android Applications. PDF AbstractBenjamin Davis, Ben Sanders, Armen Khodaverdian, and Hao Chen. IEEE Mobile Security Technologies (MoST), San Francisco, CA, May 24, 2012. (39%)

Opaak: Using Mobile Phones to Limit Anonymous Identities Online. PDF AbstractGabriel Maganis, Elaine Shi, Hao Chen, and Dawn Song. 10th International Conference on Mobile Systems, Applications and Services (MobiSys), Low Wood Bay, Lake District, United Kingdom, June 26-28, 2012. (18%)

Privacy-Preserving Alibi Systems. PDF AbstractBenjamin Davis, Hao Chen, and Matthew Franklin. 7th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Seoul, South Korea, May 1-3, 2012. (30%)

Noncespaces: Using randomization to defeat cross-site scripting attacks. PDF Abstract Matthew Van Gundy and Hao Chen. Computer & Security, 31:612-628, 2012.

TouchLogger: Inferring Keystrokes On Touch Screen From Smartphone Motion. PDF AbstractSlides (PPTPDF)Liang Cai and Hao Chen. 6th USENIX Workshop on Hot Topics in Security (HotSec '11), San Francisco, CA, August 9, 2011. (20%).

Gesture Authentication with Touch Input for Mobile Devices. PDF Abstract Yuan Niu and Hao Chen. 3rd International Conference on Security and Privacy in Mobile Information and Communication Systems (MobiSec), Aalborg, Denmark, May 17-19, 2011.

Good Neighbor: Secure Pairing of Nearby Wireless Devices by Multiple Antennas. PDF AbstractSlidesLiang Cai, Kai Zeng, Hao Chen, and Prasant Mohapatra. 18th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 6-9, 2011. (20%)

DBTaint: Cross-Application Information Flow Tracking via Databases. PDF AbstractSlidesBenjamin Davis and Hao Chen. USENIX Conference on Web Application, Boston, MA, June 23-24, 2010.

WebCallerID: Leveraging Cellular Networks for Web Authentication. PDF AbstractFrancis Hsu, Hao Chen, and Sridhar Machiraju. Journal of Computer Security, 19(5), 2011..

CapAuth: A Capability-based Handover Scheme. PDF AbstractLiang Cai, Sridhar Machiraju, and Hao Chen. IEEE INFOCOM 2010: The 27th Conference on Computer Communications, San Diego, CA, March 15-19, 2010.

Exploiting and Defending Opportunistic Scheduling in Cellular Data Networks. PDF AbstractRadmilo Racic, Denys Ma, Hao Chen, and Xin Liu. IEEE Transactions on Mobile Computing, 9:609-620, 2010.

Secure File System Services for Web 2.0 Applications. PDF Abstract Francis Hsu and Hao Chen Proceedings of the The ACM Cloud Computing Security Workshop (CCSW), Chicago, IL, November 13, 2009. (37%)

Multi-party Off-the-Record Messaging. PDF Abstract Ian Goldberg, Berkant Ustaoglu, Matthew Van Gundy, and Hao Chen. Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS), Chicago, IL, November 9-13, 2009. (18%)

Mitigating DoS attacks on the paging channel by efficient encoding in page messages. PDF Abstract Liang Cai, Gabriel Maganis, Hui Zang, and Hao Chen. Proceedings of the 5th International Conference on Security and Privacy in Communication Networks (SecureComm), Athens, Greece, September 14-18, 2009. (26%)

Noise Injection for Search Privacy Protection. PDF Abstract Shaozhi Ye, Felix Wu, Raju Pandey, and Hao Chen. Proceedings of the 2009 IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT), Vancouver, Canada, August 29-31, 2009. (13%)

Defending against Sensor-Sniffing Attacks on Mobile Phones. PDF Abstract Liang Cai, Sridhar Machiraju, and Hao Chen. The First ACM SIGCOMM Workshop on Networking, Systems, Applications on Mobile Handhelds (MobiHeld), Barcelona, Spain, August 17, 2009.

Measuring Privacy Risk in Online Social Networks. PDF Abstract Justin Becker and Hao Chen. Web 2.0 Security and Privacy (W2SP), Oakland, CA, May 21, 2009. (36%)

Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks. PDF AbstractSlideMatthew Van Gundy and Hao Chen. Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 8-11, 2009. (12%)

A general framework for benchmarking firewall optimization techniques. PDF Abstract G Misherghi, Lihua Yuan, Zhendong Su, Chen-Nee Chuah, Hao Chen. IEEE Transactions on Network and Service Management, 5(4):227-238, December 2008.

OMash: Enabling Secure Web Mashups via Object Abstractions PDF AbstractSlides (PPTX PDF)Steven Crites, Francis Hsu, and Hao Chen. Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, October 27-31, 2008. (18%)

iPhish: Phishing Vulnerabilities on Consumer Electronics. PDF Abstract Yuan Niu, Francis Hsu and Hao Chen. Proceedings of Usability, Psychology, and Security 2008, San Francisco, CA, April, 2008.

Distributed Authentication for Low-Cost Wireless Networks. PDF Abstract Sridhar Machiraju, Hao Chen, and Jean Bolot. Proceedings of the Ninth Workshop on Mobile Computing Systems and Applications (ACM HotMobile), Napa Valley, CA, February 25-26, 2008. (23%)

Exploiting Opportunistic Scheduling in Cellular Data Networks. PDF AbstractSlidesRadmilo Racic, Denys Ma, Hao Chen, and Xin Liu. Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS 2008), San Diego, CA, February 10-13, 2008. (18%)

Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms. PDF Abstract Matthew Van Gundy, Hao Chen, Zhendong Su, and Giovanni Vigna. Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), Miami Beach, FL, December 10-14, 2007. (22%)

Spam Double-Funnel: Connecting Web Spammers with Advertisers. PDFAbstract Yi-Min Wang, Ming Ma, Yuan Niu, and Hao Chen. Proceedings of the 16th International World Wide Web Conference (WWW2007), Banff, Canada, May 8-12, 2007. (15%)

A Quantitative Study of Forum Spamming Using Context-based Analysis. PDF AbstractSlidesYuan Niu, Yi-Min Wang, Hao Chen, Ming Ma, and Francis Hsu. Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS), pages 79-92, San Diego, CA, February, 2007. (15%)

Back to the Future: A Framework for Automatic Malware Removal and System Repair. PDF PSAbstract Francis Hsu, Hao Chen, Thomas Ristenpart, Jason Li, and Zhendong Su. Proceedings of 2006 Annual Computer Security Applications Conference (ACSAC 22), Miami Beach, FL, December, 2006. (30%)

Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery. PDF PSAbstractSlides Radmilo Racic, Denys Ma, and Hao Chen. Proceedings of the Second IEEE Communications Society / CreateNet International Conference on Security and Privacy in Communication Networks (SecureComm), Baltimore, MD, August, 2006. (25%)

FIREMAN: a toolkit for FIREwall Modeling and ANalysis. PDF AbstractLihua Yuan, Jianning Mai, Zhendong Su, Hao Chen, Chen-Nee Chuah, and Prasant Mohapatra. Proceedings of 2006 IEEE Symposium on Security and Privacy, Oakland, CA, May, 2006. (13%)

Model checking an entire Linux Ddstribution for security violations. PDF PSAbstractSlidesBenjamin Schwarz, Hao Chen, David Wagner, Geoff Morrison, Jacob West, Jeremy Lin, and Wei Tu. Proceedings of 21st Annual Computer Security Applications Conference (ACSAC), Tucson, AZ, December, 2005. (23%)

Using build-integrated static checking to preserve correctness Invariants. PDF PSAbstractSlides(OpenOfficePDF)Hao Chen and Jonathan Shapiro. Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS), pages 288-297, Washington, DC, October 2004. (14%)

Model checking one million lines of C code. PDF PSAbstractSlides(PPT)Hao Chen, Drew Dean, and David Wagner. Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS), pages 171--185, San Diego, CA, February 2004.

Setuid demystified. PDFPSAbstractSlides(PPT)Hao Chen, David Wagner, and Drew Dean. Proceedings of the 11th USENIX Security Symposium, pages 171--190, San Francisco, CA, August 2002.

MOPS: an infrastructure for examining security properties of software. PDFPS AbstractHao Chen and David Wagner. Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS) , pages 235--244, Washington, DC, November 2002.

Optimizing search by showing results in context. PDFPSAbstractSusan Dumais, Edward Cutrell, and Hao Chen. Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI), pages 277--284, Seattle, WA, April 2001.

Bringing order to the web: Automatically categorizing search results. PDFPSWordAbstractSlides(PPT)Hao Chen and Susan Dumais. Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI), pages 145--152, The Hague, The Netherlands, April 2000.

Hierarchical classification of web content. PDFPSAbstractSusan Dumais and Hao Chen. Proceedings of the 23rd ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR), pages 256--263, Athens, Greece, July 2000.

Classified displays of web search results. Susan Dumais, Edward Cutrell, and Hao Chen. 11th ASIS&T SIG/CR Classification Research Workshop, pages 87--90, November 2000.

Evaluation of decision forests on text categorization. PDFPSAbstractSlides(PPT)Hao Chen and Tin K. Ho. Proceedings of the SPIE Conference on Document Recognition and Retrieval VII, volume 3967, pages 191--199, San Jose, CA, January 2000.

Integrating geometrical and linguistic analysis for e-mail signature block parsing. PDFPSAbstractHao Chen, Jianying Hu, and Richard Sproat. ACM Transactions on Information Systems, 17(4):343--366, October 1999.

Emu: An e-mail preprocessor for text-to-speech. PDFPSAbstractRichard Sproat, Jianying Hu, and Hao Chen. 1998 Workshop on Multimedia Signal Processing, pages 239--244, Redondo Beach, CA, December 1998. IEEE Signal Processing Society.

E-mail signature block analysis. PDFPSAbstractHao Chen, Jianying Hu, and Richard Sproat. Proceedings of the 14th International Conference on Pattern Recognition (ICPR), pages 1153--1156, Brisbane, Australia, August 1998.

Piecewise linear modulation model of handwriting. PDFPSAbstractHao Chen, Oscar E. Agazzi, and Ching Y. Suen. Proceedings of the 4th International Conference on Document Analysis and Recognition (ICDAR), pages 363--367, Ulm, Germany, August 1997.


Hao Chen  <chen AT ucdavis.edu>
Last modified: April 7, 2014.
Valid XHTML 1.1! Valid CSS!