What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Danfeng (Daphne) Yao
Google Scholar
ORCID:
0000-0001-8969-2792
23
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/ccs
A First Look at Security and Privacy Risks in the RapidAPI Ecosystem.
Song Liao
Long Cheng
Xiapu Luo
Zheng Song
Haipeng Cai
Danfeng (Daphne) Yao
Hongxin Hu
2023
conf/ccs
Poster: Cybersecurity Usage in the Wild: A look at Deployment Challenges in Intrusion Detection and Alert Handling.
Wyatt Sweat
Danfeng (Daphne) Yao
2023
conf/acns
SpanL: Creating Algorithms for Automatic API Misuse Detection with Program Analysis Compositions.
Sazzadur Rahaman
Miles Frantz
Barton P. Miller
Danfeng (Daphne) Yao
2022
conf/asiaccs
Privacy Guarantees of BLE Contact Tracing for COVID-19 and Beyond: A Case Study on COVIDWISE.
Salman Ahmed
Ya Xiao
Taejoong (Tijay) Chung
Carol J. Fung
Moti Yung
Danfeng (Daphne) Yao
2020
journals/compsec
Prioritizing data flows and sinks for app security transformation.
Ke Tian
Gang Tan
Barbara G. Ryder
Danfeng (Daphne) Yao
2020
conf/ccs
Methodologies for Quantifying (Re-)randomization Security and Timing under JIT-ROP.
Salman Ahmed
Ya Xiao
Kevin Z. Snow
Gang Tan
Fabian Monrose
Danfeng (Daphne) Yao
2019
conf/ccs
Poster: Deployment-quality and Accessible Solutions for Cryptography Code Development.
Sazzadur Rahaman
Ya Xiao
Sharmin Afrose
Ke Tian
Miles Frantz
Na Meng
Barton P. Miller
Fahad Shaon
Murat Kantarcioglu
Danfeng (Daphne) Yao
2019
conf/ccs
CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects.
Sazzadur Rahaman
Ya Xiao
Sharmin Afrose
Fahad Shaon
Ke Tian
Miles Frantz
Murat Kantarcioglu
Danfeng (Daphne) Yao
2019
conf/uss
Comparative Measurement of Cache Configurations' Impacts on Cache Timing Side-Channel Attacks.
Xiaodong Yu
Ya Xiao
Kirk W. Cameron
Danfeng (Daphne) Yao
2017
conf/ccs
POSTER: Detection of CPS Program Anomalies by Enforcing Cyber-Physical Execution Semantics.
Long Cheng
Ke Tian
Danfeng (Daphne) Yao
2017
conf/ccs
Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications.
Amiangshu Bosu
Fang Liu
Danfeng (Daphne) Yao
Gang Wang
2017
conf/ccs
CCS 2017: Women in Cyber Security (CyberW) Workshop.
Danfeng (Daphne) Yao
Elisa Bertino
2017
conf/ccs
Cloud Data Analytics for Security: Applications, Challenges, and Opportunities.
Danfeng (Daphne) Yao
2017
conf/acsac
Orpheus: Enforcing Cyber-Physical Execution Semantics to Defend Against Data-Oriented Attacks.
Long Cheng
Ke Tian
Danfeng (Daphne) Yao
2016
journals/compsec
Causality reasoning about network events for detecting stealthy malware activities.
Hao Zhang
Danfeng (Daphne) Yao
Naren Ramakrishnan
Zhibin Zhang
2016
journals/tifs
Fast Detection of Transformed Data Leaks.
Xiaokui Shu
Jing Zhang
Danfeng (Daphne) Yao
Wu-chun Feng
2016
conf/ccs
Causality-based Sensemaking of Network Traffic for Android Application Security.
Hao Zhang
Danfeng (Daphne) Yao
Naren Ramakrishnan
2015
journals/compsec
Profiling user-trigger dependence for Android malware detection.
Karim O. Elish
Xiaokui Shu
Danfeng (Daphne) Yao
Barbara G. Ryder
Xuxian Jiang
2014
conf/ccs
Detection of stealthy malware activities with traffic causality and scalable triggering relation discovery.
Hao Zhang
Danfeng (Daphne) Yao
Naren Ramakrishnan
2013
conf/ccs
A semantic-aware approach to reasoning about network traffic relations.
Hao Zhang
Danfeng (Daphne) Yao
Naren Ramakrishnan
2012
journals/compsec
Robustness of keystroke-dynamics based biometrics against synthetic forgeries.
Deian Stefan
Xiaokui Shu
Danfeng (Daphne) Yao
2011
conf/acns
Inferring Protocol State Machine from Network Traces: A Probabilistic Approach.
Yipeng Wang
Zhibin Zhang
Danfeng (Daphne) Yao
Buyun Qu
Li Guo
2011
conf/acns
Quantitatively Analyzing Stealthy Communication Channels.
Patrick Butler
Kui Xu
Danfeng (Daphne) Yao
Coauthors
Amiangshu Bosu
(1)
Barbara G. Ryder
(2)
Barton P. Miller
(2)
Buyun Qu
(1)
Carol J. Fung
(1)
Danfeng (Daphne) Yao
(23)
Deian Stefan
(1)
Elisa Bertino
(1)
Fabian Monrose
(1)
Fahad Shaon
(2)
Fang Liu
(1)
Gang Tan
(2)
Gang Wang
(1)
Haipeng Cai
(1)
Hao Zhang
(4)
Hongxin Hu
(1)
Jing Zhang
(1)
Karim O. Elish
(1)
Ke Tian
(5)
Kevin Z. Snow
(1)
Kirk W. Cameron
(1)
Kui Xu
(1)
Li Guo
(1)
Long Cheng
(3)
Miles Frantz
(3)
Moti Yung
(1)
Murat Kantarcioglu
(2)
Na Meng
(1)
Naren Ramakrishnan
(4)
Patrick Butler
(1)
Salman Ahmed
(2)
Sazzadur Rahaman
(3)
Sharmin Afrose
(2)
Song Liao
(1)
Taejoong (Tijay) Chung
(1)
Wu-chun Feng
(1)
Wyatt Sweat
(1)
Xiaodong Yu
(1)
Xiaokui Shu
(3)
Xiapu Luo
(1)
Xuxian Jiang
(1)
Ya Xiao
(5)
Yipeng Wang
(1)
Zheng Song
(1)
Zhibin Zhang
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to