Xinshu Dong
Xinshu Dong
Unknown affiliation
No verified email
Cited by
Cited by
Software-defined networking for smart grid resilience: Opportunities and challenges
X Dong, H Lin, R Tan, RK Iyer, Z Kalbarczyk
Proceedings of the 1st ACM workshop on cyber-physical system security, 61-68, 2015
Optimal false data injection attack against automatic generation control in power grids
R Tan, HH Nguyen, EYS Foo, X Dong, DKY Yau, Z Kalbarczyk, RK Iyer, ...
2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS …, 2016
Security analysis of urban railway systems: the need for a cyber-physical perspective
B Chen, C Schmittner, Z Ma, WG Temple, X Dong, DL Jones, WH Sanders
Computer Safety, Reliability, and Security: SAFECOMP 2015 Workshops, ASSURE …, 2015
AdSentry: comprehensive and flexible confinement of JavaScript-based advertisements
X Dong, M Tran, Z Liang, X Jiang
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning
Y Jia, Y Chen, X Dong, P Saxena, J Mao, Z Liang
computers & security 55, 62-80, 2015
I Know Where You’ve Been: Geo-Inference Attacks via the Browser Cache
Y Jia, X Dong, Z Liang, P Saxena
Proceedings of the Web 2.0 Security & Privacy Workshop (W2SP 2014), 2014
Model-based cybersecurity assessment with nescor smart grid failure scenarios
S Jauhar, B Chen, WG Temple, X Dong, Z Kalbarczyk, WH Sanders, ...
2015 IEEE 21st Pacific Rim international symposium on dependable computing …, 2015
Towards fine-grained access control in javascript contexts
K Patil, X Dong, X Li, Z Liang, X Jiang
2011 31st International Conference on Distributed Computing Systems, 720-729, 2011
Tracking the trackers: Fast and scalable dynamic analysis of web content for privacy violations
M Tran, X Dong, Z Liang, X Jiang
Applied Cryptography and Network Security: 10th International Conference …, 2012
An empirical study of dangerous behaviors in firefox extensions
J Wang, X Li, X Liu, X Dong, J Wang, Z Liang, Z Feng
Information Security: 15th International Conference, ISC 2012, Passau …, 2012
Secure and efficient software-based attestation for industrial control devices with arm processors
B Chen, X Dong, G Bai, S Jauhar, Y Cheng
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
Protecting sensitive web content from client-side vulnerabilities with CRYPTONS
X Dong, Z Chen, H Siadati, S Tople, P Saxena, Z Liang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
A simulation study on smart grid resilience under software-defined networking controller failures
U Ghosh, X Dong, R Tan, Z Kalbarczyk, DKY Yau, RK Iyer
Proceedings of the 2nd ACM International Workshop on Cyber-Physical System …, 2016
A Comprehensive Client-side Behavior Model for Diagnosing Attacks in Ajax Applications
X Dong, K Patil, J Mao, Z Liang
Proceedings of the 18th International Conference on Engineering of Complex …, 2013
A Quantitative Evaluation of Privilege Separation in Web Browser Designs
X Dong, H Hu, Z Liang, P Saxena
Proceedings of the 18th European Symposium on Research in Computer Security …, 2013
You can’t be me: Enabling trusted paths and user sub-origins in web browsers
E Budianto, Y Jia, X Dong, P Saxena, Z Liang
Research in Attacks, Intrusions and Defenses: 17th International Symposium …, 2014
The right tool for the job: A case for common input scenarios for security assessment
X Dong, S Jauhar, WG Temple, B Chen, Z Kalbarczyk, WH Sanders, ...
Graphical Models for Security: Third International Workshop, GraMSec 2016 …, 2016
Establishing common input scenarios for security assessment
X Dong, S Jauhar, WG Temple, B Chen, Z Kalbarczyk, WH Sanders, ...
Adv. Digit. Sci. Center, Singapore, Tech. Rep, 2023
Swapguard: A software-only solution for attesting hot-swappable devices in power grids
X Dong, S Jauhar, B Chen
2016 IEEE International Conference on Smart Grid Communications …, 2016
A usage-pattern perspective for privacy ranking of Android apps
X Li, X Dong, Z Liang
Information Systems Security: 10th International Conference, ICISS 2014 …, 2014
The system can't perform the operation now. Try again later.
Articles 1–20