Publications

2016

Bo Zong, Xusheng Xiao, Zhichun Li, Zhenyu Wu, Zhiyun Qian, Xifeng Yan, Ambuj K. Singh, Guofei Jiang

Behavior Query Discovery in System-Generated Temporal Graphs Inproceedings

VLDB, 2016.

Links | BibTeX

Zhang Xu, Zhenyu Wu, Zhichun Li, Kangkook Jee, Junghwan Rhee, Xusheng Xiao, Fengyuan Xu, Haining Wang, Guofei Jiang

High Fidelity Data Reduction for Big Data Security Dependency Analyses Inproceedings

ACM CCS, 2016.

Links | BibTeX

2015

Jianjun Huang, Zhichun Li, Xusheng Xiao, Zhenyu Wu, Kangjie Lu, Xiangyu Zhang, Guofei Jiang

SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps Inproceedings

USENIX Security, 2015, (Top 10 finalists for CSAW Best Paper Award).

Links | BibTeX

Kangjie Lu, Zhichun Li, Vasileios Kemerlis, Zhenyu Wu, Long Lu, Cong Zheng, Zhiyun Qian, Wenke Lee, Guofei Jiang

Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting Inproceedings

the Annual Network & Distributed System Security Symposium (NDSS), 2015.

Links | BibTeX

2013

Yinzhi Cao, Vaibhav Rastogi, Zhichun Li, Yan Chen, Alex Moshchuk

Redefining Web Browser Principals with a Configurable Origin Policy Inproceedings

IEEE/IFIP International Conference on Dependable Systems and Network (DSN), 2013.

Links | BibTeX

2012

Long Lu, Zhichun Li, Zhenyu Wu, Wenke Lee, Guofei Jiang

CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities Inproceedings

ACM CCS, 2012.

Links | BibTeX

Yinzhi Cao, Zhichun Li, Vaibhav Rastogi, Xitao Wen, Yan Chen

Virtual Browser: a Virtualized Browser to Sandbox Third-party JavaScripts with Enhanced Security Inproceedings

ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2012.

Links | BibTeX

2011

Zhichun Li, Anup Goyal, Yan Chen, Aleksandar Kuzmanovic

Measurement and Diagnosis of Address Misconfigured P2P Traffic Journal Article

IEEE Network Magazine, 25 (3), 2011.

Links | BibTeX

Zhichun Li, Anup Goyal, Yan Chen, Vern Paxson

Towards Situational Awareness of Large-scale Botnet Probing Events Journal Article

IEEE Transactions on Information Forensics and Security, 6 (1), 2011.

Links | BibTeX

Zhichun Li, Yi Tang, Yinzhi Cao, Vaibhav Rastogi, Yan Chen, Bin Liu

WebShield: Enabling Various Web Defense Techniques without Client Side Modifications Inproceedings

the Annual Network & Distributed System Security Symposium (NDSS), 2011.

Links | BibTeX

2010

Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Yan Chen, Ben Y. Zhao

Detecting and Characterizing Social Spam Campaigns Inproceedings

ACM SIGCOMM IMC, 2010.

Links | BibTeX

Zhichun Li, Gao Xia, Hongyu Gao, Yi Tang, Yan Chen, Bin Liu, Junchen Jiang, Yuezhou Lv

NetShield: Matching with a Large Vulnerability Signature Ruleset for High Performance Network Defense Inproceedings

ACM SIGCOMM, 2010.

Links | BibTeX

Zhichun Li, Yan Gao, Yan Chen

HiFIND: A High-Speed Flow-Level Intrusion Detection Approach with DoS Resiliency Journal Article

Journal of Computer Networks, 54 (8), 2010.

Links | BibTeX

Zhichun Li, Ming Zhang, Zhaosheng Zhu, Yan Chen, Albert Greenberg, Yi-Min Wang

WebProphet: Automating Performance Prediction for Web Services Inproceedings

USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2010.

Links | BibTeX

Zhichun Li, Anup Goyal, Yan Chen, Aleksandar Kuzmanovic

Measurement and Diagnosis of Address Misconfigured P2P Traffic Inproceedings

IEEE INFOCOM, 2010.

Links | BibTeX

Lanjia Wang, Zhichun Li, Yan Chen, Judy Fu, Xing Li

Thwarting Zero-Day Polymorphic Worms with Network-Level Length-Based Signature Generation Journal Article

ACM/IEEE Transaction on Networking (TON), 18 (1), 2010.

Links | BibTeX

2009

Zhichun Li, Anup Goyal, Yan Chen, Vern Paxson

Automating Analysis of Large-Scale Botnet Probing Events Inproceedings

ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2009.

Links | BibTeX

2007

Zhichun Li, Lanjia Wang, Yan Chen, Zhi (Judy) Fu

Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms Inproceedings

IEEE ICNP, 2007.

Links | BibTeX

Robert Schweller, Zhichun Li, Yan Chen, Yan Gao, Ashish Gupta, Elliot Parsons, Yin Zhang, Peter Dinda, Ming-Yang Kao, Gokhan Memik

Reversible sketches: Enabling monitoring and analysis over high-speed data streams Journal Article

IEEE/ACM Transactions on Networking, 15 (5), 2007.

Links | BibTeX

2006

Zhichun Li, Yan Chen, Aaron Beach

Towards Scalable and Robust Distributed Intrusion Alert Fusion with Good Load Balancing Inproceedings

ACM SIGCOMM Workshop on Large-Scale Attack Defense, 2006.

Links | BibTeX

Yan Gao, Zhichun Li, Yan Chen

A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks Inproceedings

The International Conference on Distributed Computing Systems (ICDCS), 2006.

Links | BibTeX

Zhichun Li, Manan Sanghi, Brian Chavez, Yan Chen, Ming-Yang Kao

Hamsa: Fast Signature Generation for Zero-day Polymorphic Worms with Provable Attack Resilience Inproceedings

IEEE Symposium on Security and Privacy, 2006.

Links | BibTeX

Robert Schweller, Zhichun Li, Yan Chen, Yan Gao, Ashish Gupta, Elliot Parsons, Yin Zhang, Peter Dinda, Ming-Yang Kao, Gokhan Memik

Reverse Hashing for High-speed Network Monitoring: Algorithms, Evaluation, and Applications Inproceedings

IEEE INFOCOM, 2006.

Links | BibTeX

Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Ben Watson

IDGraphs: Intrusion Detection and Analysis Using Stream Compositing Journal Article

IEEE Computer Graphics & Applications, 26 (2), pp. 28-39, 2006.

Links | BibTeX

2005

Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Ben Watson

IDGraphs: Intrusion Detection and Analysis Using Histographs Inproceedings

the IEEE Workshop on Visualization for Computer Security (VizSEC), in conjunction with Visualization 2005 and InfoVis 2005 conferences, 2005.

Links | BibTeX

2003

Zhichun Li, Hui Zhang, Yue You, Tao He

Linuxflow: A High Speed Backbone Measurement Facility Inproceedings

Passive and Active Measurement Workshop (PAM), 2003.

Links | BibTeX

Zhichun Li, Hui Zhang, Yue You, Zimu Li

"Design and Implementation of A High Speed Backbone Measurement System"(in Chinese) Inproceedings

Journal of Computer Engineering (Chinese), pp. 53-56, 2003.

Links | BibTeX

Tao He, Hui Zhang, Xing Li, Zhichun Li

A Methodology for Analyzing Backbone Network Traffic at Stream-Level Inproceedings

IEEE International Conference on Communication Technology (ICCT), 2003.

Links | BibTeX