Baojun Liu / (刘保君)
Baojun Liu / (刘保君)
Postdoctoral Researcher, Tsinghua University
Verified email at - Homepage
Cited by
Cited by
An end-to-end, large-scale measurement of dns-over-encryption: How far have we come?
C Lu, B Liu, Z Li, S Hao, H Duan, M Zhang, C Leng, Y Liu, Z Zhang, J Wu
Proceedings of the Internet Measurement Conference, 22-35, 2019
Don't let one rotten apple spoil the whole barrel: Towards automated detection of shadowed domains
D Liu, Z Li, K Du, H Wang, B Liu, H Duan
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
A Reexamination of Internationalized Domain Names: The Good, the Bad and the Ugly.
B Liu, C Lu, Z Li, Y Liu, HX Duan, S Hao, Z Zhang
DSN, 654-665, 2018
Resident evil: Understanding residential IP proxy as a dark service
X Mi, X Feng, X Liao, B Liu, XF Wang, F Qian, Z Li, S Alrwais, L Sun, Y Liu
2019 IEEE symposium on security and privacy (SP), 1185-1201, 2019
Who Is Answering My Queries: Understanding and Characterizing Hidden Interception of the DNS Resolution Path
B Liu, C Lu, H Duan, Y Liu, Z Li, S Hao, M Yang
Cracking wall of confinement: Understanding and analyzing malicious domain takedowns
E Alowaisheq
The Network and Distributed System Security Symposium (NDSS), 2019
Abusing CDNs for fun and profit: Security issues in CDNs' origin validation
R Guo, J Chen, B Liu, J Zhang, C Zhang, H Duan, T Wan, J Jiang, S Hao, ...
2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS), 1-10, 2018
Poison over troubled forwarders: A cache poisoning attack targeting {DNS} forwarding devices
X Zheng, C Lu, J Peng, Q Yang, D Zhou, B Liu, K Man, S Hao, H Duan, ...
29th {USENIX} Security Symposium ({USENIX} Security 20), 577-593, 2020
CDN Judo: Breaking the CDN DoS Protection with Itself.
R Guo, W Li, B Liu, S Hao, J Zhang, H Duan, K Sheng, J Chen, Y Liu
NDSS, 2020
TL; DR hazard: A comprehensive study of levelsquatting scams
K Du, H Yang, Z Li, H Duan, S Hao, B Liu, Y Ye, M Liu, X Su, G Liu, ...
International Conference on Security and Privacy in Communication Systems, 3-25, 2019
From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR
C Lu, B Liu, Y Zhang, Z Li, F Zhang, H Duan, Y Liu, JQ Chen, J Liang, ...
Mar, 2021
Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks
M Zhang, X Zheng, K Shen, Z Kong, C Lu, Y Wang, H Duan, S Hao, B Liu, ...
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
CDN Backfired: Amplification Attacks Based on HTTP Range Requests
W Li, K Shen, R Guo, B Liu, J Zhang, H Duan, S Hao, X Chen, Y Wang
2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020
TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-scale DNS Analysis
B Liu, Z Li, P Zong, C Lu, H Duan, Y Liu, S Alrwais, X Wang, S Hao, Y Jia, ...
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 560-575, 2019
Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks
K Shen, C Wang, M Guo, X Zheng, C Lu, B Liu, Y Zhao, S Hao, H Duan, ...
30th {USENIX} Security Symposium ({USENIX} Security 21), 2021
Lies in the Air: Characterizing Fake-base-station Spam Ecosystem in China
Y Zhang, B Liu, C Lu, Z Li, H Duan, S Hao, M Liu, Y Liu, D Wang, Q Li
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
Measuring BGP AS path looping (BAPL) and private AS number leaking (PANL)
S Zhang, Y Liu, D Pei, B Liu
Tsinghua Science and Technology 23 (1), 22-34, 2018
DNSWeight: Quantifying Country-Wise Importance of Domain Name System
D Chang, S Hao, Z Li, B Liu, X Li
IEEE Access 9, 133240-133257, 2021
Fast IPv6 Network Periphery Discovery and Security Implications
X Li, B Liu, X Zheng, H Duan, Q Li, Y Huang
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
Rusted Anchors: A National Client-Side View of Hidden Root CAs in the Web PKI Ecosystem
Y Zhang, B Liu, C Lu, Z Li, H Duan, J Li, Z Zhang
The system can't perform the operation now. Try again later.
Articles 1–20