[go: up one dir, main page]

Follow
Daiping Liu
Daiping Liu
Palo Alto Networks
Verified email at udel.edu - Homepage
Title
Cited by
Cited by
Year
All your dns records point to us: Understanding the security threats of dangling dns records
D Liu, S Hao, H Wang
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1272016
E-commerce reputation manipulation: The emergence of reputation-escalation-as-a-service
H Xu, D Liu, H Wang, A Stavrou
Proceedings of the 24th International Conference on World Wide Web, 1296-1306, 2015
1022015
Detecting malicious javascript in pdf through document instrumentation
D Liu, H Wang, A Stavrou
2014 44th Annual IEEE/IFIP international conference on dependable systems …, 2014
912014
Don’t Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains
D Liu, Z Li, K Du, H Wang, B Liu, H Duan
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
752017
A robust and efficient defense against use-after-free exploits via concurrent pointer sweeping
D Liu, M Zhang, H Wang
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
592018
Click fraud detection on the advertiser side
H Xu, D Liu, A Koehl, H Wang, A Stavrou
European Symposium on Research in Computer Security, 419-438, 2014
552014
A comprehensive measurement-based investigation of DNS hijacking
R Houser, S Hao, Z Li, D Liu, C Cotton, H Wang
2021 40th International Symposium on Reliable Distributed Systems (SRDS …, 2021
382021
E-android: A new energy profiling tool for smartphones
X Gao, D Liu, D Liu, H Wang, A Stavrou
2017 IEEE 37th international conference on distributed computing systems …, 2017
352017
Detecting passive cheats in online games via performance-skillfulness inconsistency
D Liu, X Gao, M Zhang, H Wang, A Stavrou
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
302017
All use-after-free vulnerabilities are not created equal: an empirical study on their characteristics and detectability
Z Chen, D Liu, J Xiao, H Wang
Proceedings of the 26th International Symposium on Research in Attacks …, 2023
132023
Dial" n" for nxdomain: The scale, origin, and security implications of dns queries to non-existent domains
G Liu, L Jin, S Hao, Y Zhang, D Liu, A Stavrou, H Wang
Proceedings of the 2023 ACM on Internet Measurement Conference, 198-212, 2023
122023
An empirical investigation of ecommerce-reputation-escalation-as-a-service
H Xu, D Liu, H Wang, A Stavrou
ACM Transactions on the Web (TWEB) 11 (2), 1-35, 2017
122017
Network traffic analysis using refined bayesian reasoning to detect flooding and port scan attacks
D Liu, M Zhang, T Li
2008 International Conference on Advanced Computer Theory and Engineering …, 2008
122008
executable-only-memory-switch (xom-switch): Hiding your code from advanced code reuse attacks in one shot
M Zhang, R Sahita, D Liu
Black Hat Asia, 2018
102018
Automated extraction and classification of malicious indicators
J Szurdi, D Liu, J Wang
US Patent 11,882,130, 2024
82024
In-line detection of algorithmically generated domains
D Liu, M Walter, B Hua, S Li, F Fei, S Chung, J Wang, W Xu
US Patent 11,729,134, 2023
72023
Ready raider one: Exploring the misuse of cloud gaming services
G Liu, D Liu, S Hao, X Gao, K Sun, H Wang
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
72022
Toward Understanding the Security of Plugins in Continuous Integration Services
X Li, Y Gu, C Qiao, Z Zhang, D Liu, L Ying, H Duan, X Gao
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and …, 2024
52024
Real-time detection of dns tunneling traffic
D Liu, J Wang, M Walter, F Fei, W Xu
US Patent App. 16/799,655, 2021
52021
Inline package name based supply chain attack detection and prevention
R Duan, D Liu, J Wang, Z Xiao
US Patent 11,863,586, 2024
32024
The system can't perform the operation now. Try again later.
Articles 1–20