RAPTOR: Routing Attacks on Privacy in Tor Y Sun, A Edmundson, L Vanbever, J Rexford, M Chiang, P Mittal USENIX Security Symposium 2015, 271--286, 2015 | 288 | 2015 |
Bamboozling certificate authorities with {BGP} H Birge-Lee, Y Sun, A Edmundson, J Rexford, P Mittal USENIX Security Symposium, 833-849, 2018 | 114 | 2018 |
Counter-RAPTOR: Safeguarding Tor against active routing attacks Y Sun, A Edmundson, N Feamster, M Chiang, P Mittal 2017 IEEE Symposium on Security and Privacy (SP), 977-992, 2017 | 76 | 2017 |
Securing internet applications from routing attacks Y Sun, M Apostolaki, H Birge-Lee, L Vanbever, J Rexford, M Chiang, ... Communications of the ACM 64 (6), 86-96, 2021 | 30 | 2021 |
Tempest: Temporal dynamics in anonymity systems R Wails, Y Sun, A Johnson, M Chiang, P Mittal Privacy Enhancing Technologies Symposium (PETS) 2018, 2018 | 30 | 2018 |
DPSelect: a differential privacy based guard relay selection algorithm for Tor H Hanley, Y Sun, S Wagh, P Mittal Privacy Enhancing Technologies Symposium (PETS) 2019, 2019 | 21 | 2019 |
Using BGP to acquire bogus TLS certificates H Birge-Lee, Y Sun, A Edmundson, J Rexford, P Mittal Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2017 …, 2017 | 21 | 2017 |
Countering Malicious Processes with Process-DNS Association. S Sivakorn, K Jee, Y Sun, L Korts-Pärn, Z Li, C Lumezanu, Z Wu, LA Tang, ... NDSS, 2019 | 19 | 2019 |
Proof-of-Concept Study for a Roadway Reservation System P Su, BB Park, J Lee, Y Sun Transportation Research Record: Journal of the Transportation Research Board …, 2013 | 19* | 2013 |
Detecting Malware Injection with Program-DNS Behavior Y Sun, K Jee, S Sivakorn, Z Li, C Lumezanu, L Korts-Parn, Z Wu, J Rhee, ... IEEE European Symposium on Security and Privacy (EuroS&P), 2020 | 14 | 2020 |
RAPID: real-time alert investigation with context-aware prioritization for efficient threat discovery Y Liu, X Shu, Y Sun, J Jang, P Mittal Proceedings of the 38th Annual Computer Security Applications Conference …, 2022 | 10 | 2022 |
Host level detect mechanism for malicious DNS activities K Jee, LI Zhichun, G Jiang, L Korts-Parn, Z Wu, Y Sun, J Rhee US Patent 10,574,674, 2020 | 10 | 2020 |
Creating a Secure Underlay for the Internet H Birge-Lee, J Wanner, G Cimaszewski, J Kwon, L Wang, F Wirz, P Mittal, ... USENIX Security Symposium, 2022 | 6 | 2022 |
Deciphering the Digital Veil: Exploring the Ecosystem of DNS HTTPS Resource Records H Dong, Y Zhang, H Lee, S Huque, Y Sun arXiv preprint arXiv:2403.15672, 2024 | | 2024 |
Global Analysis with Aggregation-based Beaconing Detection across Large Campus Networks Y Zhang, H Dong, A Nottingham, M Buchanan, DE Brown, Y Sun Proceedings of the 39th Annual Computer Security Applications Conference …, 2023 | | 2023 |
Behind the Scenes: Uncovering TLS and Server Certificate Practice of IoT Device Vendors in the Wild H Dong, H Shu, V Prakash, Y Zhang, MT Paracha, D Choffnes, ... Proceedings of the 2023 ACM on Internet Measurement Conference, 457-477, 2023 | | 2023 |
Enhancing Anonymity Systems under Network and User Dynamics Y Sun Princeton University, 2020 | | 2020 |