Follow
Chuhan Wang
Chuhan Wang
Verified email at mails.tsinghua.edu.cn
Title
Cited by
Cited by
Year
Weak links in authentication chains: A large-scale analysis of email sender spoofing attacks
K Shen, C Wang, M Guo, X Zheng, C Lu, B Liu, Y Zhao, S Hao, H Duan, ...
30th USENIX Security Symposium (USENIX Security 21), 3201-3217, 2021
372021
A large-scale and longitudinal measurement study of {DKIM} deployment
C Wang, K Shen, M Guo, Y Zhao, M Zhang, J Chen, B Liu, X Zheng, ...
31st USENIX Security Symposium (USENIX Security 22), 1185-1201, 2022
202022
TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets
X Li, W Xu, B Liu, M Zhang, Z Li, J Zhang, D Chang, X Zheng, C Wang, ...
2024 IEEE Symposium on Security and Privacy (Oakland S&P '24), 2024
52024
Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab) use in the Wild
Z Zhang, G Hong, X Li, Z Fu, J Zhang, M Liu, C Wang, J Chen, B Liu, ...
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
12023
BreakSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet
C Wang, Y Kuranaga, Y Wang, M Zhang, L Zheng, X Li, J Chen, H Duan, ...
2024 31st Annual Network and Distributed System Security Symposium (NDSS '24), 2024
2024
ReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies with Differential Fuzzing
L Zheng, X Li, C Wang, R Guo, H Duan, J Chen, C Zhang, K Shen
2024 31st Annual Network and Distributed System Security Symposium (NDSS '24), 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–6