What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Hao Chen
Google Scholar
ORCID:
0000-0002-4072-0710
33
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/uss
Make Agent Defeat Agent: Automatic Detection of Taint-Style Vulnerabilities in LLM-based Agents.
Fengyu Liu
Yuan Zhang
Jiaqi Luo
Jiarun Dai
Tian Chen
Letian Yuan
Zhengmin Yu
Youkun Shi
Ke Li
Chengyuan Zhou
Hao Chen
Min Yang
2024
conf/ccs
Prompt Fuzzing for Fuzz Driver Generation.
Yunlong Lyu
Yuxuan Xie
Peng Chen
Hao Chen
2024
conf/dsn
Intrusion Detection at Scale with the Assistance of a Command-line Language Model.
Jiongliang Lin
Yiwen Guo
Hao Chen
2023
conf/ccs
Hopper: Interpretative Fuzzing for Libraries.
Peng Chen
Yuxuan Xie
Yunlong Lyu
Yuxiao Wang
Hao Chen
2022
journals/compsec
AflIot: Fuzzing on linux-based IoT device with binary-level instrumentation.
Xuechao Du
Andong Chen
Boyuan He
Hao Chen
Fan Zhang
Yan Chen
2022
conf/cns
Membership Inference Attack in Face of Data Transformations.
Jiyu Chen
Yiwen Guo
Hao Chen
Neil Gong
2019
conf/ccs
Matryoshka: Fuzzing Deeply Nested Branches.
Peng Chen
Jianzhong Liu
Hao Chen
2018
conf/sp
Angora: Efficient Fuzzing by Principled Search.
Peng Chen
Hao Chen
2017
conf/ccs
MagNet: A Two-Pronged Defense against Adversarial Examples.
Dongyu Meng
Hao Chen
2017
conf/cns
Evaluating private modes in desktop and mobile browsers and their resistance to fingerprinting.
Yuanyi Wu
Dongyu Meng
Hao Chen
2016
journals/tifs
Rethinking Permission Enforcement Mechanism on Mobile Systems.
Yuan Zhang
Min Yang
Guofei Gu
Hao Chen
2016
conf/ccs
revDroid: Code Analysis of the Side Effects after Dynamic Permission Revocation of Android Apps.
Zheran Fang
Weili Han
Dong Li
Zeqing Guo
Danhao Guo
Xiaoyang Sean Wang
Zhiyun Qian
Hao Chen
2013
conf/ccs
Underground economy of android application plagiarism.
Hao Chen
2013
conf/esorics
AnDarwin: Scalable Detection of Semantically Similar Android Applications.
Jonathan Crussell
Clint Gibler
Hao Chen
2012
journals/compsec
Noncespaces: Using randomization to defeat cross-site scripting attacks.
Matthew Van Gundy
Hao Chen
2012
conf/ccs
Privacy-preserving alibi systems.
Benjamin Davis
Hao Chen
Matthew K. Franklin
2012
conf/esorics
Attack of the Clones: Detecting Cloned Applications on Android Markets.
Jonathan Crussell
Clint Gibler
Hao Chen
2011
conf/uss
TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion.
Liang Cai
Hao Chen
2011
conf/ndss
Good Neighbor: Ad hoc Pairing of Nearby Wireless Devices by Multiple Antennas.
Liang Cai
Kai Zeng
Hao Chen
Prasant Mohapatra
2009
conf/ccs
Secure file system services for web 2.0 applications.
Francis Hsu
Hao Chen
2009
conf/ccs
Multi-party off-the-record messaging.
Ian Goldberg
Berkant Ustaoglu
Matthew Van Gundy
Hao Chen
2009
conf/ndss
Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks.
Matthew Van Gundy
Hao Chen
2008
conf/ccs
OMash: enabling secure web mashups via object abstractions.
Steven Crites
Francis Hsu
Hao Chen
2008
conf/ndss
Exploiting Opportunistic Scheduling in Cellular Data Networks.
Radmilo Racic
Denys Ma
Hao Chen
Xin Liu
2007
conf/ndss
A Quantitative Study of Forum Spamming Using Context-based Analysis.
Yuan Niu
Hao Chen
Francis Hsu
Yi-Min Wang
Ming Ma
2007
conf/acsac
Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms.
Matthew Van Gundy
Hao Chen
Zhendong Su
Giovanni Vigna
2006
conf/sp
FIREMAN: A Toolkit for FIREwall Modeling and ANalysis.
Lihua Yuan
Jianning Mai
Zhendong Su
Hao Chen
Chen-Nee Chuah
Prasant Mohapatra
2006
conf/acsac
Back to the Future: A Framework for Automatic Malware Removal and System Repair.
Francis Hsu
Hao Chen
Thomas Ristenpart
Jason Li
Zhendong Su
2005
conf/acsac
Model Checking An Entire Linux Distribution for Security Violations.
Benjamin Schwarz
Hao Chen
David A. Wagner
Jeremy Lin
Wei Tu
Geoff Morrison
Jacob West
2004
conf/ccs
Using build-integrated static checking to preserve correctness invariants.
Hao Chen
Jonathan S. Shapiro
2004
conf/ndss
Model Checking One Million Lines of C Code.
Hao Chen
Drew Dean
David A. Wagner
2002
conf/ccs
MOPS: an infrastructure for examining security properties of software.
Hao Chen
David A. Wagner
2002
conf/uss
Setuid Demystified.
Hao Chen
David A. Wagner
Drew Dean
Coauthors
Andong Chen
(1)
Benjamin Davis
(1)
Benjamin Schwarz
(1)
Berkant Ustaoglu
(1)
Boyuan He
(1)
Chen-Nee Chuah
(1)
Chengyuan Zhou
(1)
Clint Gibler
(2)
Danhao Guo
(1)
David A. Wagner
(4)
Denys Ma
(1)
Dong Li
(1)
Dongyu Meng
(2)
Drew Dean
(2)
Fan Zhang
(1)
Fengyu Liu
(1)
Francis Hsu
(4)
Geoff Morrison
(1)
Giovanni Vigna
(1)
Guofei Gu
(1)
Hao Chen
(33)
Ian Goldberg
(1)
Jacob West
(1)
Jason Li
(1)
Jeremy Lin
(1)
Jianning Mai
(1)
Jianzhong Liu
(1)
Jiaqi Luo
(1)
Jiarun Dai
(1)
Jiongliang Lin
(1)
Jiyu Chen
(1)
Jonathan Crussell
(2)
Jonathan S. Shapiro
(1)
Kai Zeng
(1)
Ke Li
(1)
Letian Yuan
(1)
Liang Cai
(2)
Lihua Yuan
(1)
Matthew K. Franklin
(1)
Matthew Van Gundy
(4)
Min Yang
(2)
Ming Ma
(1)
Neil Gong
(1)
Peng Chen
(4)
Prasant Mohapatra
(2)
Radmilo Racic
(1)
Steven Crites
(1)
Thomas Ristenpart
(1)
Tian Chen
(1)
Wei Tu
(1)
Weili Han
(1)
Xiaoyang Sean Wang
(1)
Xin Liu
(1)
Xuechao Du
(1)
Yan Chen
(1)
Yi-Min Wang
(1)
Yiwen Guo
(2)
Youkun Shi
(1)
Yuan Niu
(1)
Yuan Zhang
(2)
Yuanyi Wu
(1)
Yunlong Lyu
(2)
Yuxiao Wang
(1)
Yuxuan Xie
(2)
Zeqing Guo
(1)
Zhendong Su
(3)
Zhengmin Yu
(1)
Zheran Fang
(1)
Zhiyun Qian
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to