Zobrazeno 1 - 10
of 53
pro vyhledávání: '"Yaoqi Jia"'
Publikováno v:
Sensors, Vol 17, Iss 3, p 464 (2017)
Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in
Externí odkaz:
https://doaj.org/article/7738eb3c84724d789c1c3549b9a14c06
Publikováno v:
ICDCS
Peer-to-peer (P2P) systems such as BitTorrent and Bitcoin are susceptible to serious attacks from byzantine nodes that join as peers. Due to well-known impossibility results for designing P2P primitives in unrestricted byzantine settings, research ha
Autor:
Sumayah Alrwais, Yiming Zhang, Ying Liu, Haixin Duan, Shuang Hao, Kai Chen, XiaoFeng Wang, Peiyuan Zong, Zhou Liu, Yaoqi Jia, Baojun Liu, Chaoyi Lu, Zaifeng Zhang
Publikováno v:
EuroS&P
Illicit traffic monetization is a type of Internet fraud that hijacks users' web requests and reroutes them to a traffic network (e.g., advertising network), in order to unethically gain monetary rewards. Despite its popularity among Internet fraudst
Autor:
PR Newswire
Publikováno v:
PR Newswire US. 11/28/2019.
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2016, Iss 4, Pp 294-314 (2016)
The peer-assisted CDN is a new content distribution paradigm supported by CDNs (e.g., Akamai), which enables clients to cache and distribute web content on behalf of a website. Peer-assisted CDNs bring significant bandwidth savings to website operato
Publikováno v:
Journal of High Speed Networks. 22:15-34
HTML5-based mobile applications (or apps) are built by using standard web technologies such as HTML5, JavaScript and CSS. Due to their cross-platform support, HTML5-based mobile apps are getting more and more popular. However, similar to traditional
Publikováno v:
Journal of High Speed Networks. 22:55-64
The application permission system is one of the key components of Android security. Developers often use it incorrectly and claim more permissions than necessary, due to limitations of developers' knowledge and development tools. When application's v
Autor:
Yaoqi Jia, Baojun Liu, Jianjun Chen, Jia Zhang, Tao Wan, Chao Zhang, Haixin Duan, Jian Jiang, Run Guo, Shuang Hao
Publikováno v:
SRDS
Content Delivery Networks (CDNs) are critical Internet infrastructure. Besides high availability and high performance, CDNs also provide security services such as anti-DoS and Web Application Firewalls to CDN-powered websites. However, the massive re
Publikováno v:
ICC
The similarity of the user interfaces (UIs) among Android apps is an important factor to indicate abnormal behaviors in Android apps. For example, phishing apps use UIs similar to those of their target apps to lure users to input sensitive informatio
Publikováno v:
Computers & Security. 55:62-80
In this paper, we present a systematic study of browser cache poisoning (BCP) attacks, wherein a network attacker performs a one-time Man-In-The-Middle (MITM) attack on a user's HTTPS session, and substitutes cached resources with malicious ones. We