38. Android Malware Clustering through Malicious Payload Mining
Yuping Li, Jiyong Jang, Xin Hu, and Xinming Ou.
Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses, (RAID'17), 2017.
37. Password Correlation: Quantification, Evaluation and Application
Shouling Ji, Shukun Yang, Anupam Das, Xin Hu, and Raheem Beyah.
Proceedings of the IEEE International Conference on Computer Communications (IEEE INFOCOM'17) 2017.
36. BotMeter: Charting DGA-Botnet Landscapes in Large Networks
Ting Wang, Xin Hu, Jiyong Jang, Shouling Ji, Marc Ph. Stoecklin, and Teryl Taylor.
Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS), 2016.
35. BAYWATCH: Robust Beaconing Detection to Identify Infected Hosts in Large-Scale Enterprise Networks
Xin Hu, Jiyong Jang, Marc Ph. Stoecklin, Ting Wang, Douglas L. Schales, Dhilung Kirat, and Josyula R. Rao.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2016.
34. Detecting Malicious Exploit Kits using Tree-based Similarity Searches
Teryl Taylor, Xin Hu, Ting Wang, Jiyong Jang, Marc Ph. Stoecklin, Fabian Monrose, and Reiner Sailer.
Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY), 2016.
33. Hunting for Invisibility: Characterizing and Detecting Malicious Web Infrastructures through Server Visibility Analysis
Jialong Zhang, Xin Hu, Jiyong Jang, Ting Wang, Guofei Gu, and Marc Ph. Stoecklin.
Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), 2016.
32. FCCE: Highly Scalable Distributed Feature Collection and Correlation Engine for Low Latency Big Data Analytics
Douglas Schales, Xin Hu, Jiyong Jang, Reiner Sailer, Marc Stoecklin, Ting Wang.
Proceedings of the 31 st IEEE International Conference on Data Engineering (ICDE’15), 2015
31. SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization
Shouling Ji, Weiqing Li, Prateek Mittal, Xin Hu, Raheem Beyah.
Proceedings of the 24th USENIX Security Symposium (USENIX Security'15), 2015
30. Rateless Error Correction for Network Coding
Wentao Huang, Ting Wang, Xin Hu, Jiyong Jang, Theodoros Salonidis.
Proceedings of the IEEE International Symposium on Information Theory, (ISIT’15), 2015
29. Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords
Shouling Ji, Shukun Yang, Xin Hu, Weili Han, Zhigong Li, and Raheem Beyah
IEEE Transactions on Dependable and Secure Computing (TDSC). 2015.
28. Effectiveness and Soundness of Commercial Password Strength Meters
Shukun Yang, Shouling Ji, Xin Hu, and Raheem Beyah.
Proceedings of Annual Network and Distributed System Security Symposium (NDSS'15), San Diego, CA, February 2015.
27. Experimental Study of Fuzzy Hashing in Malware Clustering Analysis.
Yuping Li, Sathya Chandran Sundaramurthy, Alexandru G. Bardas, Xinming Ou, and Doina Caragea, Xin Hu and Jiyong Jang
Proceedings of 8th Workshop on Cyber Security Experimentation and Test, 2015
26. MUSE: Asset Risk Scoring in Enterprise Network with Mutually Reinforced Reputation Propagation.
Xin Hu, Ting Wang, Marc Ph. Stoecklin, Douglas Lee Schales, Jiyong Jang, Reiner Sailer
EURASIP Journal of Information Security 2014: 17 (2014)
25. Lightweight Authentication of Freshness in Outsourced Key-Value Stores
Yuzhe Tang, Ting Wang, Ling Liu, Xin Hu, Jiyong Jang.
Proceedings of the Annual Computer Security Applications Conference (ACSAC'30), 2014
24. Stream Computing for Large-Scale, Multi-Channel Cyber Threat Analytics
Douglas Schales, Mihai Christodorescu, Xin Hu, Jiyong Jang, Josyula Rao, Reiner Sailer, Marc Stoecklin, Wietse Venema and Ting Wang
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration (IEEE IRI’14), 2014
23. Rebuilding the Tower of Babel: Towards Cross-System Malware Information Sharing
Ting Wang, Shicong Meng, Wei Gao, and Xin Hu.
Proceedings of the 23rd ACM International Conference on Information and Knowledge Management (CIKM'14), 2014
22. Asset Risk Scoring in Enterprise Network with Mutually Reinforced Reputation Propagation
Xin Hu, Ting Wang, Marc Stoecklin, Doug Schales, Jiyong Jang and Reiner Sailer
Proceedings of International Workshop on Cyber Crime (IWCC’14), co-located with IEEE Oakland, 2014 (Invited to EURASIP Journal of Information Security)
21. Reconciling Malware Labeling Discrepancy via Consensus Learning
Ting Wang, Xin Hu, Shicong Meng, Reiner Sailer
Proceedings of the 10th International Workshop on Information Integration on the Web (IIWeb 2014), co-located with ICDE, 2014
20. DUET: Integration of Dynamic and Static Analyses for Malware Clustering with Cluster Ensembles
Xin Hu and Kang G. shin
Proceedings of the 2013 Annual Computer Security Applications Conference (ACSAC’29), 2013 (Acceptance ratio: 19.88% = 34/171)
19. MutantX-S: Scalable Malware Clustering Based on Static Features
Xin Hu, Sandeep Bhatkar, Kent Griffin, Kang G. shin
Proceedings of the 2013 USENIX Annual Technical Conference (USENIX ATC'13), 2013 (Acceptance ratio:14.16% = 33/233)
18. LISA: Location Information ScrAmbler for Privacy Protection on Smartphones
Zhigang Chen, Xin Hu, Xiaoen Ju, Kang G. shin
Proceedings of the First IEEE Conference on Communications and Network Security (IEEE CNS'13), 2013
17. Can Open WiFi Networks Be Lethal Weapons for Botnets?
Matthew Knysz, Xin Hu, Yuanyuan Zeng and Kang G. Shin
Proceedings of 31th IEEE International Conference on Computer Communications, Mini-Conference (IEEE INFOCOM 2012), 2012
16. Design of SMS Commanded-and-Controlled and P2P-Structured Mobile Botnets
Yuanyuan Zeng, Kang G. Shin and Xin Hu
Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks, (ACM WiSec' 12), 2012
15. Privacy Protection for Users of Location-Based Services
Kang G. Shin, Xiaoen Ju, Zhigang Chen, and Xin Hu
IEEE Wireless Communications Magazine, Volume 19, Issue 1, Pages: 30-39, February, 2012
14. Measurement and Analysis of Global IP-Usage Patterns of Fast-Flux Botnets
Xin Hu, Matthew Knysz, Kang G. shin
Proceedings of 30th IEEE International Conference on Computer Communications (IEEE INFOCOM 2011), Shanghai, China, April 2011 (Acceptance ratio: 15.96% = 291/1823)
13. Good Guys vs. Bot Guise: Mimicry Attacks Against Fast-Flux Detection Systems
Matthew Knysz, Xin Hu, Kang G. shin
Proceedings of 30th IEEE International Conference on Computer Communications (IEEE INFOCOM 011), Shanghai, China, April 2011 (Acceptance ratio: 15.96% = 291/1823)
12. Secure Cooperative Sensing in IEEE 802.22 WRANs using Shadow Fading Correlation
Alexander W. Min, Kang G. Shin and Xin Hu,
IEEE Transactions on Mobile Computing (TMC), Volume 10, Issue 10, Pages 1434-1447, 2011
11. Detection of Botnets Using Combined Host- and Network-Level Information
Yuanyuan Zeng, Xin Hu, Kang G. Shin
Proceedings of the 40th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (IEEE/IEIF DSN 2010), June 2010 (Acceptance ratio: 23.2% = 39/168)
10. A Study on Latent Vulnerabilities
Beng Heng Ng, Xin Hu, Atul Prakash
1st International Workshop on Resilience Assessment of COmplex Systems (RACOS 2010), Delhi, India, November 2010
9. Large-Scale Malware Indexing Using Function-Call Graphs
Xin Hu, Tzi-cker Chiueh, Kang G. Shin
Proceedings of the 16th ACM Conference on Computer and Communications Security (ACM CCS 2009), Chicago, IL, November 2009 (Acceptance ratio: 18.4% = 58/315) 2nd Place AT&T Award for Best Applied Security Research Paper
8. RB-Seeker: Automatic Detection of Redirection Botnets
Xin Hu, Matthew Knysz, Kang G. Shin
Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS 2009), San Diego, CA, February 2009 (Acceptance ratio:11.7% = 20/171)
7. Attack-Tolerant Distributed Sensing for Dynamic Spectrum Access Networks
Alexander W. Min, Kang G. Shin and Xin Hu
Proceedings of the 17th IEEE International Conference on Network Protocols (IEEE ICNP 2009), Princeton, NJ, October 2009 (Acceptance ratio: 18.3% = 36/197)
6. Automatic Generation of String Signatures for Malware Detection
Kent Griffin, Scott Schneider, Xin Hu, Tzi-cker Chiueh
Proceedings of the 12th Symposium on Recent Advances in Intrusion Detection (RAID 2009), Brittany, France, September 2009 (Acceptance ratio: 28.8% = 17/59)
5. Behavioral Detection of Malware on Mobile Handsets
Abhijit Bose, Xin Hu, Kang G. Shin,Taejoon Park
Proceedings of the 6th Annual International Conference on Mobile Systems (ACM/Usenix Mobisys 2008), Breckenridge, CO, June 2008 (Acceptance ratio: 17.9% = 22/123)
4. Attack-Tolerant Time-Synchronization in Wireless Sensor Networks
Xin Hu, Taejoon Park, Kang G. Shin
Proceedings of the 27th IEEE International Conference on Computer Communications (IEEE INFOCOM 2008), Phoenix, AZ, April 2008 (Acceptance ratio: 20.5% = 236/1152)
3. Wide-Area IP Network Mobility
Xin Hu, Li Li, Z. Morley Mao, Yang Richard Yang
Proceedings of the 27th IEEE International Conference on Computer Communications (IEEE INFOCOM 2008), Phoenix, AZ, April 2008 (Acceptance ratio: 20.5% = 236/1152)
2. Containment of Network Worms by Per-Process Rate-Limiting
Yuanyuan Zeng, Xin Hu, Abhijit Bose, Haixiong Wang, Kang G. Shin
Proceedings of the 4th International Conference on Security and Privacy in Communication Networks (SecureCom 2008), İstanbul, Turkey, September, 2008 (Acceptance ratio: 21.1% = 26/123)
1. Accurate Real-time Identification of IP Prefix Hijacking
Xin Hu and Z. Morley Mao
Proceedings of IEEE Symposium on Security and Privacy (IEEE Oakland 2007), Oakland, CA, May 2007 (Acceptance ratio: 8.1% = 20/246)