Követés
Lin-Shung Huang
Lin-Shung Huang
Security Engineer, Facebook
E-mail megerősítve itt: fb.com - Kezdőlap
Cím
Hivatkozott rá
Hivatkozott rá
Év
Clickjacking: attacks and defenses
LS Huang, A Moshchuk, HJ Wang, S Schechter, C Jackson
Proceedings of the 21st USENIX Security Symposium, 2012
2362012
Analyzing Forged SSL Certificates in the Wild
LS Huang, A Rice, E Ellingsen, C Jackson
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 83-97, 2014
2122014
Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure
THJ Kim, LS Huang, A Perrig, C Jackson, V Gligor
Proceedings of the 22nd international conference on World Wide Web, 679-690, 2013
2002013
Towards Short-Lived Certificates
E Topalovic, B Saeta, LS Huang, C Jackson, D Boneh
Web 2.0 Security and Privacy, 2012
902012
Protecting browsers from cross-origin CSS attacks
LS Huang, Z Weinberg, C Evans, C Jackson
Proceedings of the 17th ACM conference on Computer and Communications …, 2010
672010
The case for prefetching and prevalidating TLS server certificates
E Stark, LS Huang, D Israni, C Jackson, D Boneh
Proceedings of the 19th Network and Distributed System Security Symposium, 2012
582012
An Experimental Study of TLS Forward Secrecy Deployments
LS Huang, S Adhikarla, D Boneh, C Jackson
Web 2.0 Security and Privacy, 2014
562014
Talking to yourself for fun and profit
LS Huang, EY Chen, A Barth, E Rescorla, C Jackson
Web 2.0 Security and Privacy, 2011
45*2011
Clickjacking attacks unresolved
LS Huang, C Jackson
Technical Report, 2011
232011
All Your Screens are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API
Y Tian, YC Liu, A Bhosale, LS Huang, P Tague, C Jackson
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 34-48, 2014
202014
A rate-distortion optimization model for SVC inter-layer encoding and bitstream extraction
WH Peng, JK Zao, HT Huang, TW Wang, LS Huang
Journal of Visual Communication and Image Representation 19 (8), 543-557, 2008
182008
Trickle: resilient real-time video multicasting for dynamic peers with limited or asymmetric network connectivity
YH Guo, JK Zao, WH Peng, LS Huang, FP Kuo, CM Lin
Eighth IEEE International Symposium on Multimedia (ISM'06), 391-398, 2006
152006
Rate-distortion optimized SVC bitstream extraction for heterogeneous devices: A preliminary investigation
WH Peng, LS Huang, JK Zao, JS Lu, TW Wang, HT Huang, LC Kuo
Ninth IEEE International Symposium on Multimedia Workshops (ISMW 2007), 407-412, 2007
122007
Transparent Key Integrity (TKI): A Proposal for a Public-Key Validation Infrastructure
THJ Kim, LS Huang, A Perrig, C Jackson, VD Gligor
Technical Report, 2012
82012
Transparent proxies: Threat or menace
LS Huang, EY Chen, A Barth, E Rescorla, C Jackson
Technical Report, 2010
6*2010
User Interface Security Directives for Content Security Policy. W3C Working Draft, W3C, March 2014. Work in progress
G Maone, DLS Huang, T Gondrom, B Hill
5*
Darwin: a ground truth agnostic CAPTCHA generator using evolutionary algorithm
EY Chen, LS Huang, OJ Mengshoel, JD Lohn
Proceedings of the Companion Publication of the 2014 Annual Conference on …, 2014
42014
Techniques for ranking character searches
KY Tseng, LS Huang, YH Chiang, CY Chen
US Patent 9,195,716, 2015
32015
Techniques for ranking character searches
KY Tseng, LS Huang, YH Chiang, CY Chen
US Patent 9,830,362, 2017
2017
Protecting Browsers from Network Intermediaries
LS Huang
Carnegie Mellon University, 2014
2014
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20