Home Publications Media Teaching

Conference Papers

  1. CCS'17 DIFUZE: Interface Aware Fuzzing for Kernel Drivers
    Jake Corina, Aravind Machiry, Christopher Salls, Yan Shoshitaishvili, Shuang Hao, Christopher Kruegel, and Giovanni Vigna
    24th ACM Conference on Computer and Communications Security,
    Dallas, TX, October 2017. To appear.
  2. ASIACCS'17 Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions
    Cheng Huang, Shuang Hao, Luca Invernizzi, Jiayong Liu, Yong Fang, Christopher Kruegel, and Giovanni Vigna
    ACM Asia Conference on Computer and Communications Security,
    Abu Dhabi, UAE, April 2017. PDF
  3. PAM'17 Something From Nothing (There): Collecting Global IPv6 Datasets From DNS
    Tobias Fiebig, Kevin Borgolte, Shuang Hao, Christopher Kruegel, and Giovanni Vigna
    Passive and Active Measurement Conference,
    Sydney, Australia, March 2017. PDF
  4. PETS'17 On the Privacy and Security of the Ultrasound Ecosystem
    Vasilios Mavroudis, Shuang Hao, Yanick Fratantonio, Federico Maggi, Giovanni Vigna, and Christopher Kruegel
    17th Privacy Enhancing Technologies Symposium,
    Minneapolis, MN, July 2017. PDF
  5. Black Hat EU'16 Talking Behind Your Back: Attacks and Countermeasures of Ultrasonic Cross-device Tracking
    Vasilios Mavroudis, Shuang Hao, Yanick Fratantonio, Federico Maggi, Giovanni Vigna, and Christopher Kruegel
    Black Hat Europe,
    London, UK, November 2016.
    Media coverage WIRED, Fortune, Slashdot, New Scientist, Digital Trends, and International Business Times.
  6. CCS'16 PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration
    Shuang Hao, Alex Kantchelian, Brad Miller, Vern Paxson, and Nick Feamster
    23rd ACM Conference on Computer and Communications Security,
    Vienna, Austria, October 2016. PDF
    Media coverage The Wall Street Journal, Dark Reading, and Daily Mail.
  7. CCS'16 Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service
    Xiaojing Liao, Sumayah Alrwais, Kan Yuan, Luyi Xing, XiaoFeng Wang, Shuang Hao, and Raheem Beyah
    23rd ACM Conference on Computer and Communications Security,
    Vienna, Austria, October 2016. PDF
    Media coverage SC Magazine and Daily Mail.
  8. WWW'16 Characterizing Long-tail SEO Spam on Cloud Web Hosting Services
    Xiaojing Liao, Chang Liu, Damon McCoy, Elaine Shi, Shuang Hao, and Raheem Beyah
    25th International World Wide Web Conference,
    Montreal, Canada, April 2016. PDF
  9. CCS'15 Drops for Stuff: An Analysis of Reshipping Mule Scams
    Shuang Hao, Kevin Borgolte, Nick Nikiforakis, Gianluca Stringhini, Manuel Egele, Michael Eubanks, Brian Krebs, and Giovanni Vigna
    22nd ACM Conference on Computer and Communications Security,
    Denver, CO, October 2015. PDF Slides
    Media coverage Krebs on Security, Schneier on Security, and Slashdot.
  10. IMC'13 Understanding the Domain Registration Behavior of Spammers
    Shuang Hao, Matthew Thomas, Vern Paxson, Nick Feamster, Christian Kreibich, Chris Grier, and Scott Hollenbeck
    ACM Internet Measurement Conference,
    Barcelona, Spain, October 2013. PDF Slides
  11. IMC'11 Monitoring the Initial DNS Behavior of Malicious Domains
    Shuang Hao, Nick Feamster, and Ramakant Pandrangi
    ACM Internet Measurement Conference,
    Berlin, Germany, November 2011. PDF Slides
  12. USENIX Security'09 Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine
    Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, and Sven Krasser
    18th USENIX Security Symposium,
    Montreal, Canada, August 2009. PDF Slides
    Media coverage MIT Technology Review, Slashdot, and MetaFilter.
  13. WLN'06 Sensor Networks Routing via Bayesian Exploration (poster paper)
    Shuang Hao and Ting Wang
    6th International Workshop on Wireless Local Networks,
    Tampa, FL, November 2006. PDF
  14. ICCCN'06 Efficient and Density-Aware Routing for Wireless Sensor Networks
    Ting Wang, Shuang Hao, Ping Wang, and Gang Peng
    15th International Conference on Computer Communications and Networks,
    Arlington, VA, October 2006. PDF
  15. CTS'05 A Queue Model to Detect DDos Attacks
    Shuang Hao, Hua Song, Wenbao Jiang, and Yiqi Dai
    International Symposium on Collaborative Technologies and Systems,
    Saint Louis, MO, May 2005. PDF
  16. ISPEC'05 Using Trust for Restricted Delegation in Grid Environments
    Wenbao Jiang, Chen Li, Shuang Hao, and Yiqi Dai
    1st Information Security Practice and Experience Conference,
    Singapore, April 2005. PDF

Technical Reports

  1. An Internet-Wide View into DNS Lookup Patterns
    Shuang Hao, Nick Feamster, and Ramakant Pandrangi
    White Paper, Verisign Labs, Georiga Tech, 2010. PDF