default search action
Guofei Gu
Person information
- affiliation: Texas A&M University, SUCCESS Lab, College Station, TX, USA
- affiliation (PhD 2008): Georgia Institute of Technology, College of Computing, Atlanta, GA, USA
- affiliation: Fudan University, Shanghai, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Jinwoo Kim, Minjae Seo, Seungsoo Lee, Jaehyun Nam, Vinod Yegneswaran, Phillip A. Porras, Guofei Gu, Seungwon Shin:
Enhancing security in SDN: Systematizing attacks and defenses from a penetration perspective. Comput. Networks 241: 110203 (2024) - [c111]Suraj Shamsundar Jain, Huancheng Zhou, Guofei Gu:
WIRE: Web3 Integrated Reputation Engine. ICDCS 2024: 1388-1399 - [c110]Huancheng Zhou, Guofei Gu:
Cerberus: Enabling Efficient and Effective In-Network Monitoring on Programmable Switches. SP 2024: 4424-4439 - [c109]Xuanbo Huang, Kaiping Xue, Lutong Chen, Mingrui Ai, Huancheng Zhou, Bo Luo, Guofei Gu, Qibin Sun:
You Can Obfuscate, but You Cannot Hide: CrossPoint Attacks against Network Topology Obfuscation. USENIX Security Symposium 2024 - [c108]Yuxuan Zhou, Jiaqi Chen, Yibo Wang, Yuzhe Tang, Guofei Gu:
Towards Understanding Crypto-Asset Risks on Ethereum Caused by Key Leakage on the Internet. WWW (Companion Volume) 2024: 875-878 - 2023
- [j28]Menghao Zhang, Guanyu Li, Xiao Kong, Chang Liu, Mingwei Xu, Guofei Gu, Jianping Wu:
NetHCF: Filtering Spoofed IP Traffic With Programmable Switches. IEEE Trans. Dependable Secur. Comput. 20(2): 1641-1655 (2023) - [j27]Ala Altaweel, Radu Stoleru, Guofei Gu, Arnab Kumar Maity, Suman Bhunia:
On Detecting Route Hijacking Attack in Opportunistic Mobile Networks. IEEE Trans. Dependable Secur. Comput. 20(3): 2516-2532 (2023) - [j26]Sungmin Hong, Lei Xu, Jianwei Huang, Hongda Li, Hongxin Hu, Guofei Gu:
SysFlow: Toward a Programmable Zero Trust Framework for System Security. IEEE Trans. Inf. Forensics Secur. 18: 2794-2809 (2023) - [c107]Raj Vardhan, Alok Chandrawal, Phakpoom Chinprutthiwong, Yangyong Zhang, Guofei Gu:
#DM-Me: Susceptibility to Direct Messaging-Based Scams. AsiaCCS 2023: 494-508 - [c106]Yangyong Zhang, Raj Vardhan, Phakpoom Chinprutthiwong, Guofei Gu:
Do Users Really Know Alexa? Understanding Alexa Skill Security Indicators. AsiaCCS 2023: 870-883 - [c105]Lei Xu, Yangyong Zhang, Phakpoom Chinprutthiwong, Guofei Gu:
Automatic Synthesis of Network Security Services: A First Step. ICCCN 2023: 1-10 - [c104]Huancheng Zhou, Sungmin Hong, Yangyang Liu, Xiapu Luo, Weichao Li, Guofei Gu:
Mew: Enabling Large-Scale and Dynamic Link-Flooding Defenses on Programmable Switches. SP 2023: 3178-3192 - 2022
- [j25]Renjie Xie, Jiahao Cao, Qi Li, Kun Sun, Guofei Gu, Mingwei Xu, Yuan Yang:
Disrupting the SDN Control Channel via Shared Links: Attacks and Countermeasures. IEEE/ACM Trans. Netw. 30(5): 2158-2172 (2022) - [c103]Hongda Li, Qiqing Huang, Fei Ding, Hongxin Hu, Long Cheng, Guofei Gu, Ziming Zhao:
Understanding and Detecting Remote Infection on Linux-based IoT Devices. AsiaCCS 2022: 873-887 - [c102]Lei Xue, Yangyang Liu, Tianqi Li, Kaifa Zhao, Jianfeng Li, Le Yu, Xiapu Luo, Yajin Zhou, Guofei Gu:
SAID: State-aware Defense Against Injection Attacks on In-vehicle Network. USENIX Security Symposium 2022: 1921-1938 - [c101]Le Yu, Yangyang Liu, Pengfei Jing, Xiapu Luo, Lei Xue, Kaifa Zhao, Yajin Zhou, Ting Wang, Guofei Gu, Sen Nie, Shi Wu:
Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols. USENIX Security Symposium 2022: 1939-1956 - [c100]Phakpoom Chinprutthiwong, Jianwei Huang, Guofei Gu:
SWAPP: A New Programmable Playground for Web Application Security. USENIX Security Symposium 2022: 2029-2046 - [c99]Payton Walker, Nathan McClaran, Zihao Zheng, Nitesh Saxena, Guofei Gu:
BiasHacker: Voice Command Disruption by Exploiting Speaker Biases in Automatic Speech Recognition. WISEC 2022: 119-124 - 2021
- [j24]Menghao Zhang, Guanyu Li, Lei Xu, Jiasong Bai, Mingwei Xu, Guofei Gu, Jianping Wu:
Control Plane Reflection Attacks and Defenses in Software-Defined Networks. IEEE/ACM Trans. Netw. 29(2): 623-636 (2021) - [j23]Guanyu Li, Menghao Zhang, Shicheng Wang, Chang Liu, Mingwei Xu, Ang Chen, Hongxin Hu, Guofei Gu, Qi Li, Jianping Wu:
Enabling Performant, Flexible and Cost-Efficient DDoS Defense With Programmable Switches. IEEE/ACM Trans. Netw. 29(4): 1509-1526 (2021) - [c98]Guofei Gu:
Programmable Security in the Age of Software-Defined Infrastructure. CCSW 2021: 1 - [c97]Yangyong Zhang, Sunpreet S. Arora, Maliheh Shirvanian, Jianwei Huang, Guofei Gu:
Practical Speech Re-use Prevention in Voice-driven Services. RAID 2021: 282-295 - [c96]Phakpoom Chinprutthiwong, Raj Vardhan, Guangliang Yang, Yangyong Zhang, Guofei Gu:
The Service Worker Hiding in Your Browser: The Next Web Attack Target? RAID 2021: 312-323 - [c95]Lei Xue, Hao Zhou, Xiapu Luo, Yajin Zhou, Yang Shi, Guofei Gu, Fengwei Zhang, Man Ho Au:
Happer: Unpacking Android Apps via a Hardware-Assisted Approach. SP 2021: 1641-1658 - [c94]Feng Xiao, Jianwei Huang, Yichang Xiong, Guangliang Yang, Hong Hu, Guofei Gu, Wenke Lee:
Abusing Hidden Properties to Attack the Node.js Ecosystem. USENIX Security Symposium 2021: 2951-2968 - [i4]Yangyong Zhang, Maliheh Shirvanian, Sunpreet S. Arora, Jianwei Huang, Guofei Gu:
Practical Speech Re-use Prevention in Voice-driven Services. CoRR abs/2101.04773 (2021) - [i3]Raj Vardhan, Ninghao Liu, Phakpoom Chinprutthiwong, Weijie Fu, Zhenyu Hu, Xia Ben Hu, Guofei Gu:
ExAD: An Ensemble Approach for Explanation-based Adversarial Detection. CoRR abs/2103.11526 (2021) - 2020
- [c93]Phakpoom Chinprutthiwong, Raj Vardhan, Guangliang Yang, Guofei Gu:
Security Study of Service Worker Cross-Site Scripting. ACSAC 2020: 643-654 - [c92]Guofei Gu:
Your Cybersecurity Is Now Programmable: Experiments on Networking and Blockchain Systems. SBC@AsiaCCS 2020: 2 - [c91]Benyu Zhang, Matei Zaharia, Shouling Ji, Raluca Ada Popa, Guofei Gu:
PPMLP 2020: Workshop on Privacy-Preserving Machine Learning In Practice. CCS 2020: 2139-2140 - [c90]Guorui Yu, Guangliang Yang, Tongxin Li, Xinhui Han, Shijie Guan, Jialong Zhang, Guofei Gu:
MinerGate: A Novel Generic and Accurate Defense Solution Against Web Based Cryptocurrency Mining Attacks. CNCERT 2020: 50-70 - [c89]Ting Chen, Rong Cao, Ting Li, Xiapu Luo, Guofei Gu, Yufei Zhang, Zhou Liao, Hang Zhu, Gang Chen, Zheyuan He, Yuxing Tang, Xiaodong Lin, Xiaosong Zhang:
SODA: A Generic Online Detection Framework for Smart Contracts. NDSS 2020 - [c88]Jiahao Cao, Renjie Xie, Kun Sun, Qi Li, Guofei Gu, Mingwei Xu:
When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN. NDSS 2020 - [c87]Menghao Zhang, Guanyu Li, Shicheng Wang, Chang Liu, Ang Chen, Hongxin Hu, Guofei Gu, Qi Li, Mingwei Xu, Jianping Wu:
Poseidon: Mitigating Volumetric DDoS Attacks with Programmable Switches. NDSS 2020 - [c86]Feng Xiao, Jinquan Zhang, Jianwei Huang, Guofei Gu, Dinghao Wu, Peng Liu:
Unexpected Data Dependency Creation and Chaining: A New Attack to SDN. SP 2020: 1512-1526 - [e6]Hung-Min Sun, Shiuh-Pyng Shieh, Guofei Gu, Giuseppe Ateniese:
ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020. ACM 2020, ISBN 978-1-4503-6750-9 [contents] - [e5]Benyu Zhang, Raluca Ada Popa, Matei Zaharia, Guofei Gu, Shouling Ji:
PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, Virtual Event, USA, November, 2020. ACM 2020, ISBN 978-1-4503-8088-1 [contents] - [i2]Jianwei Huang, Vinod Yegneswaran, Phillip A. Porras, Guofei Gu:
On the Privacy and Integrity Risks of Contact-Tracing Applications. CoRR abs/2012.03283 (2020)
2010 – 2019
- 2019
- [j22]Lei Chen, Guofei Gu, Wenjia Li, Rami J. Haddad:
Editorial: special issue on "The security, privacy, and digital forensics of mobile networks and mobile cloud". Digit. Commun. Networks 5(4): 203-204 (2019) - [j21]Gail-Joon Ahn, Guofei Gu, Hongxin Hu, Seungwon Shin:
Guest Editors' Introduction: Special Section on Security in Emerging Networking Technologies. IEEE Trans. Dependable Secur. Comput. 16(6): 913-914 (2019) - [c85]Ala Altaweel, Radu Stoleru, Guofei Gu, Arnab Kumar Maity:
CollusiveHijack: A New Route Hijacking Attack and Countermeasures in Opportunistic Networks. CNS 2019: 73-81 - [c84]Guanyu Li, Menghao Zhang, Chang Liu, Xiao Kong, Ang Chen, Guofei Gu, Haixin Duan:
NETHCF: Enabling Line-rate and Adaptive Spoofed IP Traffic Filtering. ICNP 2019: 1-12 - [c83]Yangyong Zhang, Lei Xu, Abner Mendoza, Guangliang Yang, Phakpoom Chinprutthiwong, Guofei Gu:
Life after Speech Recognition: Fuzzing Semantic Misinterpretation for Voice Assistant Applications. NDSS 2019 - [c82]Jiahao Cao, Qi Li, Renjie Xie, Kun Sun, Guofei Gu, Mingwei Xu, Yuan Yang:
The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links. USENIX Security Symposium 2019: 19-36 - [c81]Guangliang Yang, Jeff Huang, Guofei Gu:
Iframes/Popups Are Dangerous in Mobile WebView: Studying and Mitigating Differential Context Vulnerabilities. USENIX Security Symposium 2019: 977-994 - [e4]Gail-Joon Ahn, Guofei Gu, Hongxin Hu, Seungwon Shin:
SDN-NFV@CODASPY 2019 - roceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, Richardson, TX, USA, March 27, 2019. ACM 2019, ISBN 978-1-4503-6179-8 [contents] - 2018
- [j20]David Hausheer, Oliver Hohlfeld, Stefan Schmid, Guofei Gu:
Security and performance of software-defined networks and functions virtualization. Comput. Networks 138: 15-17 (2018) - [j19]Weili Han, Zhigong Li, Minyue Ni, Guofei Gu, Wenyuan Xu:
Shadow Attacks Based on Password Reuses: A Quantitative Empirical Analysis. IEEE Trans. Dependable Secur. Comput. 15(2): 309-320 (2018) - [j18]Jing Zheng, Qi Li, Guofei Gu, Jiahao Cao, David K. Y. Yau, Jianping Wu:
Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis. IEEE Trans. Inf. Forensics Secur. 13(7): 1838-1853 (2018) - [j17]Lei Xue, Xiaobo Ma, Xiapu Luo, Edmond W. W. Chan, TungNgai Miu, Guofei Gu:
LinkScope: Toward Detecting Target Link Flooding Attacks. IEEE Trans. Inf. Forensics Secur. 13(10): 2423-2438 (2018) - [c80]Haopei Wang, Guangliang Yang, Phakpoom Chinprutthiwong, Lei Xu, Yangyong Zhang, Guofei Gu:
Towards Fine-grained Network Security Forensics and Diagnosis in the SDN Era. CCS 2018: 3-16 - [c79]Hongda Li, Hongxin Hu, Guofei Gu, Gail-Joon Ahn, Fuqiang Zhang:
vNIDS: Towards Elastic Security with Safe and Efficient Virtualization of Network Intrusion Detection Systems. CCS 2018: 17-34 - [c78]Richard Skowyra, Lei Xu, Guofei Gu, Veer Dedhia, Thomas Hobson, Hamed Okhravi, James Landry:
Effective Topology Tampering Attacks and Defenses in Software-Defined Networks. DSN 2018: 374-385 - [c77]Seungwon Shin, Zhaoyan Xu, Yeonkeun Kim, Guofei Gu:
CloudRand: Building Heterogeneous and Moving-Target Network Interfaces. ICCCN 2018: 1-11 - [c76]Guangliang Yang, Jeff Huang, Guofei Gu:
Automated Generation of Event-Oriented Exploits in Android Hybrid Apps. NDSS 2018 - [c75]Menghao Zhang, Guanyu Li, Lei Xu, Jun Bi, Guofei Gu, Jiasong Bai:
Control Plane Reflection Attacks in SDNs: New Attacks and Countermeasures. RAID 2018: 161-183 - [c74]Jialong Zhang, Jiyong Jang, Guofei Gu, Marc Ph. Stoecklin, Xin Hu:
Error-Sensor: Mining Information from HTTP Error Traffic for Malware Intelligence. RAID 2018: 467-489 - [c73]Guangliang Yang, Jeff Huang, Guofei Gu, Abner Mendoza:
Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage Enabled Mobile Applications. IEEE Symposium on Security and Privacy 2018: 742-755 - [c72]Abner Mendoza, Guofei Gu:
Mobile Application Web API Reconnaissance: Web-to-Mobile Inconsistencies & Vulnerabilities. IEEE Symposium on Security and Privacy 2018: 756-769 - [c71]Abner Mendoza, Phakpoom Chinprutthiwong, Guofei Gu:
Uncovering HTTP Header Inconsistencies and the Impact on Desktop/Mobile Websites. WWW 2018: 247-256 - [e3]Gail-Joon Ahn, Guofei Gu, Hongxin Hu, Seungwon Shin:
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, SDN-NFVSec@CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018. ACM 2018 [contents] - 2017
- [j16]Yuhong Nan, Zhemin Yang, Min Yang, Shunfan Zhou, Yuan Zhang, Guofei Gu, Xiaofeng Wang, Limin Sun:
Identifying User-Input Privacy in Mobile Applications at a Large Scale. IEEE Trans. Inf. Forensics Secur. 12(3): 647-661 (2017) - [j15]Changhoon Yoon, Seungsoo Lee, Heedo Kang, Taejune Park, Seungwon Shin, Vinod Yegneswaran, Phillip A. Porras, Guofei Gu:
Flow Wars: Systemizing the Attack Surface and Defenses in Software-Defined Networks. IEEE/ACM Trans. Netw. 25(6): 3514-3530 (2017) - [c70]Guofei Gu, Hongxin Hu, Eric Keller, Zhiqiang Lin, Donald E. Porter:
Building a Security OS With Software Defined Infrastructure. APSys 2017: 4:1-4:8 - [c69]Ala Altaweel, Radu Stoleru, Guofei Gu:
EvilDirect: A New Wi-Fi Direct Hijacking Attack and Countermeasures. ICCCN 2017: 1-11 - [c68]Chao Yang, Jialong Zhang, Guofei Gu:
Understanding the Market-Level and Network-Level Behaviors of the Android Malware Ecosystem. ICDCS 2017: 2452-2457 - [c67]Haopei Wang, Abhinav Srivastava, Lei Xu, Sungmin Hong, Guofei Gu:
Bring your own controller: Enabling tenant-defined SDN apps in IaaS clouds. INFOCOM 2017: 1-9 - [c66]Guangliang Yang, Abner Mendoza, Jialong Zhang, Guofei Gu:
Precisely and Scalably Vetting JavaScript Bridge in Android Hybrid Apps. RAID 2017: 143-166 - [c65]Lei Xue, Yajin Zhou, Ting Chen, Xiapu Luo, Guofei Gu:
Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART. USENIX Security Symposium 2017: 289-306 - [c64]Lei Xu, Jeff Huang, Sungmin Hong, Jialong Zhang, Guofei Gu:
Attacking the Brain: Races in the SDN Control Plane. USENIX Security Symposium 2017: 451-468 - [e2]Gail-Joon Ahn, Guofei Gu, Hongxin Hu, Seungwon Shin:
Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, SDN-NFVSec@CODASPY 2017, Scottsdale, Arizona, USA, March 24, 2017. ACM 2017, ISBN 978-1-4503-4908-6 [contents] - 2016
- [j14]Amin Hassanzadeh, Zhaoyan Xu, Radu Stoleru, Guofei Gu, Michalis Polychronakis:
PRIDE: A practical intrusion detection system for resource constrained wireless mesh networks. Comput. Secur. 62: 114-132 (2016) - [j13]Yuan Zhang, Min Yang, Guofei Gu, Hao Chen:
Rethinking Permission Enforcement Mechanism on Mobile Systems. IEEE Trans. Inf. Forensics Secur. 11(10): 2227-2240 (2016) - [c63]Seungwon Shin, Lei Xu, Sungmin Hong, Guofei Gu:
Enhancing Network Security through Software Defined Networking (SDN). ICCCN 2016: 1-9 - [c62]Jialong Zhang, Xin Hu, Jiyong Jang, Ting Wang, Guofei Gu, Marc Ph. Stoecklin:
Hunting for invisibility: Characterizing and detecting malicious web infrastructures through server visibility analysis. INFOCOM 2016: 1-9 - [c61]Sungmin Hong, Robert Baykov, Lei Xu, Srinath Nadimpalli, Guofei Gu:
Towards SDN-Defined Programmable BYOD (Bring Your Own Device) Security. NDSS 2016 - [e1]Gail-Joon Ahn, Guofei Gu, Hongxin Hu, Seungwon Shin:
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, SDN-NFV@CODASPY 2016, New Orleans, LA, USA, March 11, 2016. ACM 2016, ISBN 978-1-4503-4078-6 [contents] - 2015
- [j12]Chenxiong Qian, Xiapu Luo, Le Yu, Guofei Gu:
VulHunter: Toward Discovering Vulnerabilities in Android Applications. IEEE Micro 35(1): 44-53 (2015) - [j11]Seungwon Shin, Haopei Wang, Guofei Gu:
A First Step Toward Network Security Virtualization: From Concept To Prototype. IEEE Trans. Inf. Forensics Secur. 10(10): 2236-2249 (2015) - [j10]Shui Yu, Guofei Gu, Ahmed Barnawi, Song Guo, Ivan Stojmenovic:
Malware Propagation in Large-Scale Networks. IEEE Trans. Knowl. Data Eng. 27(1): 170-179 (2015) - [c60]Haopei Wang, Lei Xu, Guofei Gu:
FloodGuard: A DoS Attack Prevention Extension in Software-Defined Networks. DSN 2015: 239-250 - [c59]Jialong Zhang, Sabyasachi Saha, Guofei Gu, Sung-Ju Lee, Marco Mellia:
Systematic Mining of Associated Server Herds for Malware Campaign Discovery. ICDCS 2015: 630-641 - [c58]Abner Mendoza, Kapil Singh, Guofei Gu:
What is wrecking your data plan? A measurement study of mobile web overhead. INFOCOM 2015: 2740-2748 - [c57]Sungmin Hong, Lei Xu, Haopei Wang, Guofei Gu:
Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures. NDSS 2015 - [c56]Yuan Zhang, Min Yang, Guofei Gu, Hao Chen:
FineDroid: Enforcing Permissions with System-Wide Application Execution Context. SecureComm 2015: 3-22 - [c55]Chao Yang, Guangliang Yang, Ashish Gehani, Vinod Yegneswaran, Dawood Tariq, Guofei Gu:
Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps. SecureComm 2015: 58-77 - [c54]Yuhong Nan, Min Yang, Zhemin Yang, Shunfan Zhou, Guofei Gu, Xiaofeng Wang:
UIPicker: User-Input Privacy Identification in Mobile Applications. USENIX Security Symposium 2015: 993-1008 - 2014
- [j9]Yuan Zhang, Min Yang, Zhemin Yang, Guofei Gu, Peng Ning, Binyu Zang:
Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps. IEEE Trans. Inf. Forensics Secur. 9(11): 1828-1842 (2014) - [c53]Chao Yang, Jialong Zhang, Guofei Gu:
A taste of tweets: reverse engineering Twitter spammers. ACSAC 2014: 86-95 - [c52]Zhaoyan Xu, Antonio Nappa, Robert Baykov, Guangliang Yang, Juan Caballero, Guofei Gu:
AUTOPROBE: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis. CCS 2014: 179-190 - [c51]Chao Yang, Zhaoyan Xu, Guofei Gu, Vinod Yegneswaran, Phillip A. Porras:
DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications. ESORICS (1) 2014: 163-182 - [c50]Yong Wang, Zhaoyan Xu, Jialong Zhang, Lei Xu, Haopei Wang, Guofei Gu:
SRID: State Relation Based Intrusion Detection for False Data Injection Attacks in SCADA. ESORICS (2) 2014: 401-418 - [c49]Antonio Nappa, Zhaoyan Xu, M. Zubair Rafique, Juan Caballero, Guofei Gu:
CyberProbe: Towards Internet-Scale Active Detection of Malicious Servers. NDSS 2014 - [c48]Zhaoyan Xu, Jialong Zhang, Guofei Gu, Zhiqiang Lin:
GoldenEye: Efficiently and Effectively Unveiling Malware's Targeted Environment. RAID 2014: 22-45 - [c47]Yinzhi Cao, Chao Yang, Vaibhav Rastogi, Yan Chen, Guofei Gu:
Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-On Cross Site Scripting Attacks. SecureComm (1) 2014: 582-601 - [c46]Jialong Zhang, Jayant Notani, Guofei Gu:
Characterizing Google Hacking: A First Large-Scale Quantitative Study. SecureComm (1) 2014: 602-622 - 2013
- [j8]Ronaldo M. Salles, Guofei Gu, Morton Swimmer:
Editorial for Computer Networks special issue on ''Botnet Activity: Analysis, Detection and Shutdown''. Comput. Networks 57(2): 375-377 (2013) - [j7]Seungwon Shin, Zhaoyan Xu, Guofei Gu:
EFFORT: A new host-network cooperated framework for efficient and effective bot malware detection. Comput. Networks 57(13): 2628-2642 (2013) - [j6]Chao Yang, Robert Chandler Harkreader, Guofei Gu:
Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers. IEEE Trans. Inf. Forensics Secur. 8(8): 1280-1293 (2013) - [c45]Seungwon Shin, Vinod Yegneswaran, Phillip A. Porras, Guofei Gu:
AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks. CCS 2013: 413-424 - [c44]Yuan Zhang, Min Yang, Bingquan Xu, Zhemin Yang, Guofei Gu, Peng Ning, Xiaoyang Sean Wang, Binyu Zang:
Vetting undesirable behaviors in android apps with permission use analysis. CCS 2013: 611-622 - [c43]Zhemin Yang, Min Yang, Yuan Zhang, Guofei Gu, Peng Ning, Xiaoyang Sean Wang:
AppIntent: analyzing sensitive data transmission in android for privacy leakage detection. CCS 2013: 1043-1054 - [c42]Shardul Vikram, Chao Yang, Guofei Gu:
NOMAD: Towards non-intrusive moving-target defense against web bots. CNS 2013: 55-63 - [c41]Amit A. Amleshwaram, A. L. Narasimha Reddy, Sandeep Yadav, Guofei Gu, Chao Yang:
CATS: Characterizing automation of Twitter spammers. COMSNETS 2013: 1-10 - [c40]Sooel Son, Seungwon Shin, Vinod Yegneswaran, Phillip A. Porras, Guofei Gu:
Model checking invariant security properties in OpenFlow. ICC 2013: 1974-1979 - [c39]Zhaoyan Xu, Jialong Zhang, Guofei Gu, Zhiqiang Lin:
AUTOVAC: Automatically Extracting System Resource Constraints and Generating Vaccines for Malware Immunization. ICDCS 2013: 112-123 - [c38]Amin Hassanzadeh, Zhaoyan Xu, Radu Stoleru, Guofei Gu, Michalis Polychronakis:
PRIDE: Practical Intrusion Detection in Resource Constrained Wireless Mesh Networks. ICICS 2013: 213-228 - [c37]Seungwon Shin, Phillip A. Porras, Vinod Yegneswaran, Martin W. Fong, Guofei Gu, Mabry Tyson:
FRESCO: Modular Composable Security Services for Software-Defined Networks. NDSS 2013 - [c36]Jialong Zhang, Guofei Gu:
NEIGHBORWATCHER: A Content-Agnostic Comment Spam Inference System. NDSS 2013 - [c35]Seungwon Shin, Guofei Gu:
Attacking software-defined networks: a first feasibility study. HotSDN 2013: 165-166 - 2012
- [j5]Scott Hand, Zhiqiang Lin, Guofei Gu, Bhavani Thuraisingham:
Bin-Carver: Automatic recovery of binary executable files. Digit. Investig. 9(Supplement): S108-S117 (2012) - [j4]Seungwon Shin, Guofei Gu, A. L. Narasimha Reddy, Christopher P. Lee:
A Large-Scale Empirical Study of Conficker. IEEE Trans. Inf. Forensics Secur. 7(2): 676-690 (2012) - [j3]Chao Yang, Yimin Song, Guofei Gu:
Active User-Side Evil Twin Access Point Detection Using Statistical Techniques. IEEE Trans. Inf. Forensics Secur. 7(5): 1638-1651 (2012) - [j2]Weiqin Ma, Pu Duan, Sanmin Liu, Guofei Gu, Jyh-Charn Liu:
Shadow attacks: automatically evading system-call-behavior based malware detection. J. Comput. Virol. 8(1-2): 1-13 (2012) - [c34]Guofei Gu:
Machine learning meets social networking security: detecting and analyzing malicious social networks for fun and profit. AISec 2012: 1-2 - [c33]Cong Zheng, Shixiong Zhu, Shuaifu Dai, Guofei Gu, Xiaorui Gong, Xinhui Han, Wei Zou:
SmartDroid: an automatic system for revealing UI-based trigger conditions in android applications. SPSM@CCS 2012: 93-104 - [c32]Zhaoyan Xu, Lingfeng Chen, Guofei Gu, Christopher Kruegel:
PeerPress: utilizing enemies' P2P strength against them. CCS 2012: 581-592 - [c31]Chao Yang, Vinod Yegneswaran, Phillip A. Porras, Guofei Gu:
Detecting money-stealing apps in alternative Android markets. CCS 2012: 1034-1036 - [c30]Zhaoyan Xu, Jialong Zhang, Guofei Gu, Zhiqiang Lin:
Automatic generation of vaccines for malware immunization. CCS 2012: 1037-1039 - [c29]Seungwon Shin, Guofei Gu:
CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?). ICNP 2012: 1-6 - [c28]Seungwon Shin, Zhaoyan Xu, Guofei Gu:
EFFORT: Efficient and effective bot malware detection. INFOCOM 2012: 2846-2850 - [c27]Jialong Zhang, Chao Yang, Zhaoyan Xu, Guofei Gu:
PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks. RAID 2012: 230-253 - [c26]Phillip A. Porras, Seungwon Shin, Vinod Yegneswaran, Martin W. Fong, Mabry Tyson, Guofei Gu:
A security enforcement kernel for OpenFlow networks. HotSDN@SIGCOMM 2012: 121-126 - [c25]Chao Yang, Robert Chandler Harkreader, Jialong Zhang, Seungwon Shin, Guofei Gu:
Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. WWW 2012: 71-80 - 2011
- [j1]Tielei Wang, Tao Wei, Guofei Gu, Wei Zou:
Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic Execution. ACM Trans. Inf. Syst. Secur. 14(2): 15:1-15:28 (2011) - [c24]Shardul Vikram, Yinan Fan, Guofei Gu:
SEMAGE: a new image-based two-factor CAPTCHA. ACSAC 2011: 237-246 - [c23]Junjie Zhang, Xiapu Luo, Roberto Perdisci, Guofei Gu, Wenke Lee, Nick Feamster:
Boosting the scalability of botnet detection using adaptive traffic sampling. AsiaCCS 2011: 124-134 - [c22]Kevin Zhijie Chen, Guofei Gu, Jianwei Zhuge, Jose Nazario, Xinhui Han:
WebPatrol: automated collection and replay of web-based malware scenarios. AsiaCCS 2011: 186-195 - [c21]Seungwon Shin, Raymond Lin, Guofei Gu:
Cross-Analysis of Botnet Victims: New Insights and Implications. RAID 2011: 242-261 - [c20]Chao Yang, Robert Chandler Harkreader, Guofei Gu:
Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers. RAID 2011: 318-337 - [r1]Guofei Gu:
Botnet Detection in Enterprise Networks. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 166-168 - 2010
- [c19]Seungwon Shin, Guofei Gu:
Conficker and beyond: a large-scale empirical study. ACSAC 2010: 151-160 - [c18]Yimin Song, Chao Yang, Guofei Gu:
Who is peeping at your passwords at Starbucks? - To catch an evil twin access point. DSN 2010: 323-332 - [c17]Tielei Wang, Tao Wei, Guofei Gu, Wei Zou:
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection. IEEE Symposium on Security and Privacy 2010: 497-512 - [i1]Pu Duan, Sanmin Liu, Weiqin Ma, Guofei Gu, Jyh-Charn Liu:
Privacy-Preserving Matching Protocols for Attributes and Strings. IACR Cryptol. ePrint Arch. 2010: 61 (2010)
2000 – 2009
- 2009
- [c16]Guofei Gu, Vinod Yegneswaran, Phillip A. Porras, Jennifer Stoll, Wenke Lee:
Active Botnet Probing to Identify Obscure Command and Control Channels. ACSAC 2009: 241-253 - 2008
- [b1]Guofei Gu:
Correlation-based Botnet Detection in Enterprise Networks. Georgia Institute of Technology, Atlanta, GA, USA, 2008 - [c15]Guofei Gu, Alvaro A. Cárdenas, Wenke Lee:
Principled reasoning and practical applications of alert fusion in intrusion detection systems. AsiaCCS 2008: 136-147 - [c14]Guofei Gu, Junjie Zhang, Wenke Lee:
BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic. NDSS 2008 - [c13]Guofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee:
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. USENIX Security Symposium 2008: 139-154 - [p1]David Dagon, Guofei Gu, Christopher P. Lee:
A Taxonomy of Botnet Structures. Botnet Detection 2008: 143-164 - 2007
- [c12]David Dagon, Guofei Gu, Christopher P. Lee, Wenke Lee:
A Taxonomy of Botnet Structures. ACSAC 2007: 325-339 - [c11]Guofei Gu, Zesheng Chen, Phillip A. Porras, Wenke Lee:
Misleading and defeating importance-scanning malware propagation. SecureComm 2007: 250-259 - [c10]Guofei Gu, Phillip A. Porras, Vinod Yegneswaran, Martin W. Fong, Wenke Lee:
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation. USENIX Security Symposium 2007 - 2006
- [c9]Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Blough:
DSO: Dependable Signing Overlay. ACNS 2006: 33-49 - [c8]Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric:
Measuring intrusion detection capability: an information-theoretic approach. AsiaCCS 2006: 90-101 - [c7]Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric:
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. ESORICS 2006: 527-546 - [c6]Weidong Shi, Joshua B. Fryman, Guofei Gu, Hsien-Hsin S. Lee, Youtao Zhang, Jun Yang:
InfoShield: a security architecture for protecting information usage in memory. HPCA 2006: 222-231 - [c5]Roberto Perdisci, Guofei Gu, Wenke Lee:
Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems. ICDM 2006: 488-498 - 2005
- [c4]Weidong Shi, Hsien-Hsin S. Lee, Guofei Gu, Laura Falk, Trevor N. Mudge, Mrinmoy Ghosh:
An Intrusion-Tolerant and Self-Recoverable Network Service System Using A Security Enhanced Chip Multiprocessor. ICAC 2005: 263-273 - 2004
- [c3]Guofei Gu, Monirul Islam Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley:
Worm Detection, Early Warning and Response Based on Local Victim Information. ACSAC 2004: 136-145 - [c2]David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian B. Grizzard, John G. Levine, Henry L. Owen:
HoneyStat: Local Worm Detection Using Honeypots. RAID 2004: 39-58 - 2003
- [c1]Guofei Gu, Bin B. Zhu, Shipeng Li, Shiyong Zhang:
PLI: A New Framework to Protect Digital Content for P2P Networks. ACNS 2003: 206-216
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint