RAPTOR: Routing Attacks on Privacy in Tor Y Sun, A Edmundson, L Vanbever, J Rexford, M Chiang, P Mittal USENIX Security Symposium 2015, 271--286, 2015 | 302 | 2015 |
Bamboozling certificate authorities with {BGP} H Birge-Lee, Y Sun, A Edmundson, J Rexford, P Mittal USENIX Security Symposium, 833-849, 2018 | 118 | 2018 |
Counter-RAPTOR: Safeguarding Tor against active routing attacks Y Sun, A Edmundson, N Feamster, M Chiang, P Mittal 2017 IEEE Symposium on Security and Privacy (SP), 977-992, 2017 | 82 | 2017 |
Securing internet applications from routing attacks Y Sun, M Apostolaki, H Birge-Lee, L Vanbever, J Rexford, M Chiang, ... Communications of the ACM 64 (6), 86-96, 2021 | 33 | 2021 |
Tempest: Temporal dynamics in anonymity systems R Wails, Y Sun, A Johnson, M Chiang, P Mittal Privacy Enhancing Technologies Symposium (PETS) 2018, 2018 | 31 | 2018 |
DPSelect: a differential privacy based guard relay selection algorithm for Tor H Hanley, Y Sun, S Wagh, P Mittal Privacy Enhancing Technologies Symposium (PETS) 2019, 2019 | 23 | 2019 |
Using BGP to acquire bogus TLS certificates H Birge-Lee, Y Sun, A Edmundson, J Rexford, P Mittal Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2017 …, 2017 | 22 | 2017 |
Countering Malicious Processes with Process-DNS Association. S Sivakorn, K Jee, Y Sun, L Korts-Pärn, Z Li, C Lumezanu, Z Wu, LA Tang, ... NDSS, 2019 | 20 | 2019 |
Proof-of-Concept Study for a Roadway Reservation System P Su, BB Park, J Lee, Y Sun Transportation Research Record: Journal of the Transportation Research Board …, 2013 | 19* | 2013 |
Detecting Malware Injection with Program-DNS Behavior Y Sun, K Jee, S Sivakorn, Z Li, C Lumezanu, L Korts-Parn, Z Wu, J Rhee, ... IEEE European Symposium on Security and Privacy (EuroS&P), 2020 | 15 | 2020 |
RAPID: real-time alert investigation with context-aware prioritization for efficient threat discovery Y Liu, X Shu, Y Sun, J Jang, P Mittal Proceedings of the 38th Annual Computer Security Applications Conference …, 2022 | 13 | 2022 |
Host level detect mechanism for malicious DNS activities K Jee, LI Zhichun, G Jiang, L Korts-Parn, Z Wu, Y Sun, J Rhee US Patent 10,574,674, 2020 | 10 | 2020 |
Creating a Secure Underlay for the Internet H Birge-Lee, J Wanner, G Cimaszewski, J Kwon, L Wang, F Wirz, P Mittal, ... USENIX Security Symposium, 2022 | 7 | 2022 |
Exploring the Ecosystem of DNS HTTPS Resource Records: An End-to-End Perspective H Dong, Y Zhang, H Lee, S Huque, Y Sun Proceedings of the 2024 ACM on Internet Measurement Conference, 423-440, 2024 | 1 | 2024 |
Intercepting Bluetooth Traffic from Wearable Health Devices Q Liu, Y Zhang, Y Sun 2024 IEEE Security and Privacy Workshops (SPW), 267-273, 2024 | 1 | 2024 |
RPKI-Based Location-Unaware Tor Guard Relay Selection Algorithms Z Lu, S Sun, Y Sun arXiv preprint arXiv:2501.06010, 2025 | | 2025 |
Mutual TLS in Practice: A Deep Dive into Certificate Configurations and Privacy Issues H Dong, Y Zhang, H Lee, K Du, G Tu, Y Sun Proceedings of the 2024 ACM on Internet Measurement Conference, 214-229, 2024 | | 2024 |
Connected Vehicle Identification System for Cooperative Control of Connected Automated Vehicles BB Park, Z Mu, G Tu, A Shi, K Yang, Y Sun, C Shen Morgan State University. Sustainable Mobility and Accessibility Regional …, 2024 | | 2024 |
A Prototype Preceding Vehicle Identification System Development and Field Evaluation Z Mu, G Tu, A Shi, K Yang, Y Sun, C Shen, B Park SCITEPRESS-Science and Technology Publications, 2024 | | 2024 |
Global Analysis with Aggregation-based Beaconing Detection across Large Campus Networks Y Zhang, H Dong, A Nottingham, M Buchanan, DE Brown, Y Sun Proceedings of the 39th Annual Computer Security Applications Conference …, 2023 | | 2023 |