Stealthy malware detection and monitoring through VMM-based “out-of-the-box” semantic view reconstruction X Jiang, X Wang, D Xu ACM Transactions on Information and System Security (TISSEC) 13 (2), 1-28, 2010 | 931 | 2010 |
Stealthy malware detection and monitoring through VMM-based “out-of-the-box” semantic view reconstruction X Jiang, X Wang, D Xu ACM Transactions on Information and System Security (TISSEC) 13 (2), 1-28, 2010 | 931 | 2010 |
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays X Wang, DS Reeves Proceedings of the 10th ACM conference on Computer and communications …, 2003 | 352 | 2003 |
Tracking anonymous peer-to-peer voip calls on the internet X Wang, S Chen, S Jajodia Proceedings of the 12th ACM conference on Computer and communications …, 2005 | 327 | 2005 |
Containment of Unknown and Polymorphic Fast Spreading Worms S Chen, X Wang US Patent App. 12/042,587, 2008 | 323 | 2008 |
Network flow watermarking attack on low-latency anonymous communication systems X Wang, S Chen, S Jajodia 2007 IEEE Symposium on Security and Privacy (SP'07), 116-130, 2007 | 303 | 2007 |
Interval centroid based watermark X Wang, S Chen US Patent 7,724,782, 2010 | 227 | 2010 |
Inter-packet delay based correlation for tracing encrypted connections through stepping stones X Wang, DS Reeves, SF Wu Computer Security—ESORICS 2002: 7th European Symposium on Research in …, 2002 | 225 | 2002 |
ReFormat: Automatic reverse engineering of encrypted messages Z Wang, X Jiang, W Cui, X Wang, M Grace Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009 | 223 | 2009 |
Sleepy watermark tracing: An active network-based intrusion response framework X Wang, DS Reeves, SF Wu, J Yuill Trusted Information: The New Decade Challenge 16, 369-384, 2001 | 218 | 2001 |
“Out-of-the-box” Monitoring of VM-based High-Interaction Honeypots X Jiang, X Wang Recent Advances in Intrusion Detection: 10th International Symposium, RAID …, 2007 | 202 | 2007 |
Tracing traffic through intermediate hosts that repacketize flows YJ Pyun, YH Park, X Wang, DS Reeves, P Ning IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007 | 153 | 2007 |
Countering persistent kernel rootkits through systematic hook discovery Z Wang, X Jiang, W Cui, X Wang Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008 | 131 | 2008 |
Billing Attacks on SIP-Based VoIP Systems. R Zhang, X Wang, X Yang, X Jiang WOOT 7, 1-8, 2007 | 95 | 2007 |
Deciduous: Decentralized source identification for network-based intrusions HY Chang, R Narayan, SF Wu, BM Vetter, X Wang, M Brown, JJ Yuill, ... Integrated Network Management VI. Distributed Management for the Networked …, 1999 | 81 | 1999 |
A first step towards live botmaster traceback D Ramsbrock, X Wang, X Jiang Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008 | 79 | 2008 |
Active timing-based correlation of perturbed traffic flows with chaff packets P Peng, P Ning, DS Reeves, X Wang 25th IEEE International Conference on Distributed Computing Systems …, 2005 | 67 | 2005 |
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers R Zhang, X Wang, R Farley, X Yang, X Jiang Proceedings of the 4th International Symposium on Information, Computer, and …, 2009 | 66 | 2009 |
Robust correlation of encrypted attack traffic through stepping stones by flow watermarking X Wang, D Reeves IEEE Transactions on Dependable and Secure Computing 8 (3), 434-449, 2010 | 56 | 2010 |
On the anonymity and traceability of peer-to-peer VoIP calls S Chen, X Wang, S Jajodia IEEE Network 20 (5), 32-37, 2006 | 54 | 2006 |