1

Enabling Privacy-Preserving Cyber Threat Detection with Federated Learning

SpamDam: Towards Privacy-Preserving and Adversary-Resistant SMS Spam Detection

An Empirical Study of Storj DCS: Ecosystem, Performance, and Security

In the age of pervasive computing, traditionally centralized cloud storage (CCS) services may not fit in well due to their centralized architecture, limited worldwide availability, high expense, and security and privacy concerns. To address these …

An Extensive Study of Residential Proxies in China

We carry out the first in-depth characterization of residential proxies (RESIPs) in China, for which little is studied in previous works.Our study is made possible through a semantic-based classifier to automatically capture RESIP services. In …

Clues in Tweets: Twitter-Guided Discovery and Analysis of SMS Spam

In this research project, up-to-date SMS spam campaigns are harvested by means of a continous and intelligent pipeline. An extensive measurement is also conducted with insightful security observations distilled.

Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks

detect and understand how mobile devices are recruited to serve as web proxies

Understanding iOS-based Crowdturfing Through Hidden UI Analysis

Detect and measure hidden crowdturfing UIs in IOS apps.

Resident Evil: Understanding Residential IP Proxy as a Dark Service

How can millions of residential IPs serve as traffic exits in commercial web proxy networks?

Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems

3rd-party skills on voice assistant platforms incur new seurity threats to users.

Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs

Take-down operations aim to disrupt cybercrime involving malicious domains. In the past decade, many successful take-down operations have been reported, including those against the Conficker worm, and most recently, against VPNFilter. Although it …