What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Hsu-Chun Hsiao
Google Scholar
ORCID:
0000-0001-9592-6911
25
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/uss
Bots can Snoop: Uncovering and Mitigating Privacy Risks of Bots in Group Chats.
Kai-Hsiang Chou
Yi-Min Lin
Yi-An Wang
Jonathan Weiping Li
Tiffany Hyun-Jin Kim
Hsu-Chun Hsiao
2024
conf/ccs
Poster: YFuzz: Data-Driven Fuzzing.
Yuan Chang
Chun-Chia Huang
Tatsuya Mori
Hsu-Chun Hsiao
2024
conf/acsac
Verifying Loot-box Probability Without Source-code Disclosure.
Jing-Jie Wang
An-Jie Li
Ting-Yu Fang
Hsu-Chun Hsiao
2023
conf/acns
Capturing Antique Browsers in Modern Devices: A Security Analysis of Captive Portal Mini-Browsers.
Ping-Lun Wang
Kai-Hsiang Chou
Shou-Ching Hsiao
Ann Tene Low
Tiffany Hyun-Jin Kim
Hsu-Chun Hsiao
2022
journals/popets
OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers.
Darion Cassel
Su-Chin Lin
Alessio Buraggina
William Wang
Andrew Zhang
Lujo Bauer
Hsu-Chun Hsiao
Limin Jia
Timothy Libert
2022
conf/ndss
HeadStart: Efficiently Verifiable and Low-Latency Participatory Randomness Generation at Scale.
Hsun Lee
Yuming Hsu
Jing-Jie Wang
Hao-Cheng Yang
Yu-Heng Chen
Yih-Chun Hu
Hsu-Chun Hsiao
2022
conf/dsn
Tool: An Efficient and Flexible Simulator for Byzantine Fault-Tolerant Protocols.
Ping-Lun Wang
Tzu-Wei Chao
Chia-Chien Wu
Hsu-Chun Hsiao
2021
conf/eurosp
ProMutator: Detecting Vulnerable Price Oracles in DeFi by Mutated Transactions.
Shih-Hong Wang
Chia-Chien Wu
Yu-Chuan Liang
Li-Hsun Hsieh
Hsu-Chun Hsiao
2020
conf/ccs
Poster: Challenges in Stopping Ticket Scalping Bots.
Hao-Cheng Yang
Hsun Lee
Hsu-Chun Hsiao
2020
conf/sp
On Using Camera-based Visible Light Communication for Security Protocols.
Wen-Yi Chu
Ting-Guang Yu
Yu-Kai Lin
Shao-Chuan Lee
Hsu-Chun Hsiao
2020
conf/esorics
On the Privacy Risks of Compromised Trigger-Action Platforms.
Yu-Hsi Chiang
Hsu-Chun Hsiao
Chia-Mu Yu
Tiffany Hyun-Jin Kim
2019
journals/tifs
SafeChain: Securing Trigger-Action Programming From Attack Chains.
Kai-Hsiang Hsu
Yu-Hsi Chiang
Hsu-Chun Hsiao
2019
conf/sp
On the Feasibility of Rerouting-Based DDoS Defenses.
Muoi Tran
Min Suk Kang
Hsu-Chun Hsiao
Wei-Hsuan Chiang
Shu-Po Tung
Yu-Su Wang
2018
conf/cans
CLEF: Limiting the Damage Caused by Large Flows in the Internet Core.
Hao Wu
Hsu-Chun Hsiao
Daniele Enrico Asoni
Simon Scherrer
Adrian Perrig
Yih-Chun Hu
2016
conf/ccs
CICADAS: Congesting the Internet with Coordinated and Decentralized Pulsating Attacks.
Yu-Ming Ke
Chih-Wei Chen
Hsu-Chun Hsiao
Adrian Perrig
Vyas Sekar
2016
conf/asiajcis
Migrant Attack: A Multi-resource DoS Attack on Cloud Virtual Machine Migration Schemes.
Jia-Rung Yeh
Hsu-Chun Hsiao
Ai-Chun Pang
2016
conf/ndss
SIBRA: Scalable Internet Bandwidth Reservation Architecture.
Cristina Basescu
Raphael M. Reischuk
Pawel Szalachowski
Adrian Perrig
Yao Zhang
Hsu-Chun Hsiao
Ayumu Kubota
Jumpei Urakawa
2014
conf/ccs
YourPassword: applying feedback loops to improve security behavior of managing multiple passwords.
Tiffany Hyun-Jin Kim
H. Colleen Stuart
Hsu-Chun Hsiao
Yue-Hsun Lin
Leon Zhang
Laura Dabbish
Sara B. Kiesler
2013
conf/ccs
Policy-based secure deletion.
Christian Cachin
Kristiyan Haralambiev
Hsu-Chun Hsiao
Alessandro Sorniotti
2013
conf/ccs
STRIDE: sanctuary trail - refuge from internet DDoS entrapment.
Hsu-Chun Hsiao
Tiffany Hyun-Jin Kim
Sangjae Yoo
Xin Zhang
Soo Bum Lee
Virgil D. Gligor
Adrian Perrig
2012
conf/sp
LAP: Lightweight Anonymity and Privacy.
Hsu-Chun Hsiao
Tiffany Hyun-Jin Kim
Adrian Perrig
Akira Yamada
Samuel C. Nelson
Marco Gruteser
Wei Meng
2012
conf/ndss
ShortMAC: Efficient Data-Plane Fault Localization.
Xin Zhang
Zongwei Zhou
Hsu-Chun Hsiao
Tiffany Hyun-Jin Kim
Adrian Perrig
Patrick Tague
2011
conf/sp
SCION: Scalability, Control, and Isolation on Next-Generation Networks.
Xin Zhang
Hsu-Chun Hsiao
Geoffrey Hasker
Haowen Chan
Adrian Perrig
David G. Andersen
2011
conf/wisec
Efficient and secure threshold-based event validation for VANETs.
Hsu-Chun Hsiao
Ahren Studer
Rituik Dubey
Elaine Shi
Adrian Perrig
2009
conf/acsac
A Study of User-Friendly Hash Comparison Schemes.
Hsu-Chun Hsiao
Yue-Hsun Lin
Ahren Studer
Cassandra Studer
King-Hang Wang
Hiroaki Kikuchi
Adrian Perrig
Hung-Min Sun
Bo-Yin Yang
Coauthors
Adrian Perrig
(9)
Ahren Studer
(2)
Ai-Chun Pang
(1)
Akira Yamada
(1)
Alessandro Sorniotti
(1)
Alessio Buraggina
(1)
An-Jie Li
(1)
Andrew Zhang
(1)
Ann Tene Low
(1)
Ayumu Kubota
(1)
Bo-Yin Yang
(1)
Cassandra Studer
(1)
Chia-Chien Wu
(2)
Chia-Mu Yu
(1)
Chih-Wei Chen
(1)
Christian Cachin
(1)
Chun-Chia Huang
(1)
Cristina Basescu
(1)
Daniele Enrico Asoni
(1)
Darion Cassel
(1)
David G. Andersen
(1)
Elaine Shi
(1)
Geoffrey Hasker
(1)
H. Colleen Stuart
(1)
Hao Wu
(1)
Hao-Cheng Yang
(2)
Haowen Chan
(1)
Hiroaki Kikuchi
(1)
Hsu-Chun Hsiao
(25)
Hsun Lee
(2)
Hung-Min Sun
(1)
Jia-Rung Yeh
(1)
Jing-Jie Wang
(2)
Jonathan Weiping Li
(1)
Jumpei Urakawa
(1)
Kai-Hsiang Chou
(2)
Kai-Hsiang Hsu
(1)
King-Hang Wang
(1)
Kristiyan Haralambiev
(1)
Laura Dabbish
(1)
Leon Zhang
(1)
Li-Hsun Hsieh
(1)
Limin Jia
(1)
Lujo Bauer
(1)
Marco Gruteser
(1)
Min Suk Kang
(1)
Muoi Tran
(1)
Patrick Tague
(1)
Pawel Szalachowski
(1)
Ping-Lun Wang
(2)
Raphael M. Reischuk
(1)
Rituik Dubey
(1)
Samuel C. Nelson
(1)
Sangjae Yoo
(1)
Sara B. Kiesler
(1)
Shao-Chuan Lee
(1)
Shih-Hong Wang
(1)
Shou-Ching Hsiao
(1)
Shu-Po Tung
(1)
Simon Scherrer
(1)
Soo Bum Lee
(1)
Su-Chin Lin
(1)
Tatsuya Mori
(1)
Tiffany Hyun-Jin Kim
(7)
Timothy Libert
(1)
Ting-Guang Yu
(1)
Ting-Yu Fang
(1)
Tzu-Wei Chao
(1)
Virgil D. Gligor
(1)
Vyas Sekar
(1)
Wei Meng
(1)
Wei-Hsuan Chiang
(1)
Wen-Yi Chu
(1)
William Wang
(1)
Xin Zhang
(3)
Yao Zhang
(1)
Yi-An Wang
(1)
Yi-Min Lin
(1)
Yih-Chun Hu
(2)
Yu-Chuan Liang
(1)
Yu-Heng Chen
(1)
Yu-Hsi Chiang
(2)
Yu-Kai Lin
(1)
Yu-Ming Ke
(1)
Yu-Su Wang
(1)
Yuan Chang
(1)
Yue-Hsun Lin
(2)
Yuming Hsu
(1)
Zongwei Zhou
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to