Xinshu Dong
Xinshu Dong
Unknown affiliation
No verified email
Title
Cited by
Cited by
Year
Software-defined networking for smart grid resilience: Opportunities and challenges
X Dong, H Lin, R Tan, RK Iyer, Z Kalbarczyk
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 61-68, 2015
1252015
AdSentry: comprehensive and flexible confinement of JavaScript-based advertisements
X Dong, M Tran, Z Liang, X Jiang
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
472011
Towards fine-grained access control in javascript contexts
K Patil, X Dong, X Li, Z Liang, X Jiang
2011 31st International Conference on Distributed Computing Systems, 720-729, 2011
452011
Optimal false data injection attack against automatic generation control in power grids
R Tan, HH Nguyen, EYS Foo, X Dong, DKY Yau, Z Kalbarczyk, RK Iyer, ...
2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS …, 2016
442016
Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning
Y Jia, Y Chen, X Dong, P Saxena, J Mao, Z Liang
computers & security 55, 62-80, 2015
402015
I Know Where You’ve Been: Geo-Inference Attacks via the Browser Cache
Y Jia, X Dong, Z Liang, P Saxena
Proceedings of the Web 2.0 Security & Privacy Workshop (W2SP 2014), 2014
392014
Security analysis of urban railway systems: the need for a cyber-physical perspective
B Chen, C Schmittner, Z Ma, WG Temple, X Dong, DL Jones, WH Sanders
International Conference on Computer Safety, Reliability, and Security, 277-290, 2014
362014
Tracking the trackers: Fast and scalable dynamic analysis of web content for privacy violations
M Tran, X Dong, Z Liang, X Jiang
International Conference on Applied Cryptography and Network Security, 418-435, 2012
312012
An empirical study of dangerous behaviors in firefox extensions
J Wang, X Li, X Liu, X Dong, J Wang, Z Liang, Z Feng
International Conference on Information Security, 188-203, 2012
282012
Protecting sensitive web content from client-side vulnerabilities with CRYPTONS
X Dong, Z Chen, H Siadati, S Tople, P Saxena, Z Liang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
222013
A Comprehensive Client-side Behavior Model for Diagnosing Attacks in Ajax Applications
X Dong, K Patil, J Mao, Z Liang
Proceedings of the 18th International Conference on Engineering of Complex …, 2013
202013
Model-based cybersecurity assessment with nescor smart grid failure scenarios
S Jauhar, B Chen, WG Temple, X Dong, Z Kalbarczyk, WH Sanders, ...
2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing …, 2015
182015
You can’t be me: Enabling trusted paths and user sub-origins in web browsers
E Budianto, Y Jia, X Dong, P Saxena, Z Liang
International Workshop on Recent Advances in Intrusion Detection, 150-171, 2014
122014
A simulation study on smart grid resilience under software-defined networking controller failures
U Ghosh, X Dong, R Tan, Z Kalbarczyk, DKY Yau, RK Iyer
Proceedings of the 2nd ACM International Workshop on Cyber-Physical System …, 2016
112016
A Quantitative Evaluation of Privilege Separation in Web Browser Designs
X Dong, H Hu, Z Liang, P Saxena
Proceedings of the 18th European Symposium on Research in Computer Security …, 2013
112013
Secure and efficient software-based attestation for industrial control devices with arm processors
B Chen, X Dong, G Bai, S Jauhar, Y Cheng
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
82017
Swapguard: A software-only solution for attesting hot-swappable devices in power grids
X Dong, S Jauhar, B Chen
2016 IEEE International Conference on Smart Grid Communications …, 2016
12016
A usage-pattern perspective for privacy ranking of Android apps
X Li, X Dong, Z Liang
International Conference on Information Systems Security, 245-256, 2014
12014
Rating web pages using page-transition evidence
J Mao, X Dong, P Li, T Wei, Z Liang
International Conference on Information and Communications Security, 49-58, 2013
12013
The Right Tool for the Job: A Case for Common Input Scenarios for Security Assessment
X Dong, S Jauhar, WG Temple, B Chen, Z Kalbarczyk, WH Sanders, ...
International Workshop on Graphical Models for Security, 39-61, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–20