Publications

2019

Shen Wang; Zhengzhang Chen; Phillip S Yu; Lu-An Tang; Zhichun Li; Junghwan Rhee; Haifeng Chen

Deep Program Reidentification: A Graph Neural Network Solution Inproceedings

SIAM International Conference on Data Mining (SDM), 2019.

BibTeX

Yuseok Jeon; Junghwan Rhee; Chung Hwan Kim; Zhichun Li; Mathis Payer; Byungyoung Lee; Zhenyu Wu; Kangkook Jee

PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications Inproceedings

ACM Conference on Data and Application Security and Privacy (CODASPY), 2019.

BibTeX

Suphannee Sivakorn; Kangkook Jee; Yixin Sun; Lauri Kort-Parn; Zhichun Li; Cristian Lumezanu; Lu-An Tang; Ding Li

Countering Malicious Processes with Process-DNS Association Inproceedings

NDSS, 2019.

Links | BibTeX

Wajih Ul Hassan; Shengjian Guo; Ding Li; Zhichun Li; Zhengzhang Chen; Kangkook Jee; Zhichun Li; Adam Bates

NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage Inproceedings

NDSS, 2019.

Links | BibTeX

2018

Cheng Cao; Zhengzhang Chen; James Caverlee; Lu-An Tang; Chen Luo; Zhichun Li

Behavior-based Community Detection: Application to Host Assessment In Enterprise Information Networks Inproceedings

ACM International Conference on Information and Knowledge Management (CIKM), 2018.

Links | BibTeX

Ying Lin; Zhengzhang Chen; Cheng Cao; Lu-An Tang; Kai Zhang; Wei Cheng; Zhichun; Li

Collaborative Alert Ranking for Anomaly Detection Inproceedings

ACM International Conference on Information and Knowledge Management (CIKM), 2018.

Links | BibTeX

Yutao Tang; Ding Li; Zhichun Li; Mu Zhang; Kangkook Jee; Xusheng Xiao; Zhenyu Wu; Junghwan Rhee; Fengyuan Xu; Qun Li

NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis Inproceedings

ACM CCS, 2018.

Links | BibTeX

Peng Gao; Xusheng Xiao; Ding Li; Zhichun Li; Kangkook Jee; Zhenyu Wu; Chung Hwan Kim; Sanjeev R Kulkarni; Prateek Mittal

SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection Inproceedings

USENIX Security, 2018.

Links | BibTeX

Chen Luo; Zhengzhang Chen; Lu-An tang; Anshumali Shrivastava; Zhichun Li; Haifeng Chen; Jieping Ye

TINET: Learning Invariant Networks via Knowledge Transfer Inproceedings

KDD, 2018.

Links | BibTeX

Peng Gao; Xusheng Xiao; Zhichun Li; Kangkook Jee; Fengyuan Xu; Sanjeev R Kulkarni; Prateek Mittal

AIQL: Enabling Efficient Attack Investigation from System Monitoring Data Inproceedings

USENIX Annual Technical Conference (ATC), 2018.

Links | BibTeX

Yushan Liu; Mu Zhang; Ding Li; Kangkook Jee; Zhichun Li; Zhenyu Wu; Junghwan Rhee; Prateek Mittal

Towards a Timely Causality Analysis for Enterprise Security Inproceedings

NDSS, 2018.

Links | BibTeX

2017

Boxiang Dong; Zhenzhang Chen; Hui (Wendy) Wang; Lu-An Tang; Kai Zhang; Yin Lin; Zhichun Li; Haifeng Chen

Efficient Discovery of Abnormal Event Sequences in Enterprise Security Systems Inproceedings

ACM CIKM, 2017.

Links | BibTeX

2016

Bo Zong; Xusheng Xiao; Zhichun Li; Zhenyu Wu; Zhiyun Qian; Xifeng Yan; Ambuj K Singh; Guofei Jiang

Behavior Query Discovery in System-Generated Temporal Graphs Inproceedings

VLDB, 2016.

Links | BibTeX

Zhang Xu; Zhenyu Wu; Zhichun Li; Kangkook Jee; Junghwan Rhee; Xusheng Xiao; Fengyuan Xu; Haining Wang; Guofei Jiang

High Fidelity Data Reduction for Big Data Security Dependency Analyses Inproceedings

ACM CCS, 2016.

Links | BibTeX

2015

Jianjun Huang; Zhichun Li; Xusheng Xiao; Zhenyu Wu; Kangjie Lu; Xiangyu Zhang; Guofei Jiang

SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps Inproceedings

USENIX Security, 2015.

Links | BibTeX

Kangjie Lu; Zhichun Li; Vasileios Kemerlis; Zhenyu Wu; Long Lu; Cong Zheng; Zhiyun Qian; Wenke Lee; Guofei Jiang

Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting Inproceedings

the Annual Network & Distributed System Security Symposium (NDSS), 2015.

Links | BibTeX

2013

Yinzhi Cao; Vaibhav Rastogi; Zhichun Li; Yan Chen; Alex Moshchuk

Redefining Web Browser Principals with a Configurable Origin Policy Inproceedings

IEEE/IFIP International Conference on Dependable Systems and Network (DSN), 2013.

Links | BibTeX

2012

Long Lu; Zhichun Li; Zhenyu Wu; Wenke Lee; Guofei Jiang

CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities Inproceedings

ACM CCS, 2012.

Links | BibTeX

Yinzhi Cao; Zhichun Li; Vaibhav Rastogi; Xitao Wen; Yan Chen

Virtual Browser: a Virtualized Browser to Sandbox Third-party JavaScripts with Enhanced Security Inproceedings

ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2012.

Links | BibTeX

2011

Zhichun Li; Anup Goyal; Yan Chen; Aleksandar Kuzmanovic

Measurement and Diagnosis of Address Misconfigured P2P Traffic Journal Article

IEEE Network Magazine, 25 (3), 2011.

Links | BibTeX

Yan Chen Zhichun Li Anup Goyal; Vern Paxson

Towards Situational Awareness of Large-scale Botnet Probing Events Journal Article

IEEE Transactions on Information Forensics and Security, 6 (1), 2011.

Links | BibTeX

Zhichun Li; Yi Tang; Yinzhi Cao; Vaibhav Rastogi; Yan Chen; Bin Liu

WebShield: Enabling Various Web Defense Techniques without Client Side Modifications Inproceedings

the Annual Network & Distributed System Security Symposium (NDSS), 2011.

Links | BibTeX

2010

Hongyu Gao; Jun Hu; Christo Wilson; Zhichun Li; Yan Chen; Ben Y Zhao

Detecting and Characterizing Social Spam Campaigns Inproceedings

ACM SIGCOMM IMC, 2010.

Links | BibTeX

Zhichun Li; Gao Xia; Hongyu Gao; Yi Tang; Yan Chen; Bin Liu; Junchen Jiang; Yuezhou Lv

NetShield: Matching with a Large Vulnerability Signature Ruleset for High Performance Network Defense Inproceedings

ACM SIGCOMM, 2010.

Links | BibTeX

Zhichun Li; Yan Gao; Yan Chen

HiFIND: A High-Speed Flow-Level Intrusion Detection Approach with DoS Resiliency Journal Article

Journal of Computer Networks, 54 (8), 2010.

Links | BibTeX

Zhichun Li; Ming Zhang; Zhaosheng Zhu; Yan Chen; Albert Greenberg; Yi-Min Wang

WebProphet: Automating Performance Prediction for Web Services Inproceedings

USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2010.

Links | BibTeX

Zhichun Li; Anup Goyal; Yan Chen; Aleksandar Kuzmanovic

Measurement and Diagnosis of Address Misconfigured P2P Traffic Inproceedings

IEEE INFOCOM, 2010.

Links | BibTeX

Lanjia Wang; Zhichun Li; Yan Chen; Judy Fu; Xing Li

Thwarting Zero-Day Polymorphic Worms with Network-Level Length-Based Signature Generation Journal Article

ACM/IEEE Transaction on Networking (TON), 18 (1), 2010.

Links | BibTeX

2009

Yan Chen Zhichun Li Anup Goyal; Vern Paxson

Automating Analysis of Large-Scale Botnet Probing Events Inproceedings

ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2009.

Links | BibTeX

2007

Zhichun Li; Lanjia Wang; Yan Chen; Zhi (Judy) Fu

Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms Inproceedings

IEEE ICNP, 2007.

Links | BibTeX

Robert Schweller; Zhichun Li; Yan Chen; Yan Gao; Ashish Gupta; Elliot Parsons; Yin Zhang; Peter Dinda; Ming-Yang Kao; Gokhan Memik

Reversible sketches: Enabling monitoring and analysis over high-speed data streams Journal Article

IEEE/ACM Transactions on Networking, 15 (5), 2007.

Links | BibTeX

2006

Zhichun Li; Yan Chen; Aaron Beach

Towards Scalable and Robust Distributed Intrusion Alert Fusion with Good Load Balancing Inproceedings

ACM SIGCOMM Workshop on Large-Scale Attack Defense, 2006.

Links | BibTeX

Yan Gao; Zhichun Li; Yan Chen

A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks Inproceedings

The International Conference on Distributed Computing Systems (ICDCS), 2006.

Links | BibTeX

Zhichun Li; Manan Sanghi; Brian Chavez; Yan Chen; Ming-Yang Kao

Hamsa: Fast Signature Generation for Zero-day Polymorphic Worms with Provable Attack Resilience Inproceedings

IEEE Symposium on Security and Privacy, 2006.

Links | BibTeX

Robert Schweller; Zhichun Li; Yan Chen; Yan Gao; Ashish Gupta; Elliot Parsons; Yin Zhang; Peter Dinda; Ming-Yang Kao; Gokhan Memik

Reverse Hashing for High-speed Network Monitoring: Algorithms, Evaluation, and Applications Inproceedings

IEEE INFOCOM, 2006.

Links | BibTeX

Pin Ren; Yan Gao; Zhichun Li; Yan Chen; Ben Watson

IDGraphs: Intrusion Detection and Analysis Using Stream Compositing Journal Article

IEEE Computer Graphics & Applications, 26 (2), pp. 28-39, 2006.

Links | BibTeX

2005

Pin Ren; Yan Gao; Zhichun Li; Yan Chen; Ben Watson

IDGraphs: Intrusion Detection and Analysis Using Histographs Inproceedings

the IEEE Workshop on Visualization for Computer Security (VizSEC), in conjunction with Visualization 2005 and InfoVis 2005 conferences, 2005.

Links | BibTeX

2003

Zhichun Li; Hui Zhang; Yue You; Tao He

Linuxflow: A High Speed Backbone Measurement Facility Inproceedings

Passive and Active Measurement Workshop (PAM), 2003.

Links | BibTeX

Zhichun Li; Hui Zhang; Yue You; Zimu Li

"Design and Implementation of A High Speed Backbone Measurement System"(in Chinese) Inproceedings

Journal of Computer Engineering (Chinese), pp. 53-56, 2003.

Links | BibTeX

Tao He; Hui Zhang; Xing Li; Zhichun Li

A Methodology for Analyzing Backbone Network Traffic at Stream-Level Inproceedings

IEEE International Conference on Communication Technology (ICCT), 2003.

Links | BibTeX