Jian Jiang
Jian Jiang
Research Scientist, Shape Security
No verified email
Cited by
Cited by
When HTTPS meets CDN: A case of authentication in delegated service
J Liang, J Jiang, H Duan, K Li, T Wan, J Wu
2014 IEEE Symposium on Security and Privacy, 67-82, 2014
An empirical reexamination of global DNS behavior
H Gao, V Yegneswaran, Y Chen, P Porras, S Ghosh, J Jiang, H Duan
ACM SIGCOMM Computer Communication Review 43 (4), 267-278, 2013
Research on Botnet mechanisms and defenses
J Jiang, JW Zhuge, HX Duan, JP Wu
Ruanjian Xuebao/Journal of Software 23 (1), 82-96, 2012
Cookies Lack Integrity: Real-World Implications
X Zheng, J Jiang, J Liang, H Duan, S Chen, T Wan, N Weaver
24th USENIX Security Symposium (USENIX Security 15), 2015
Hold-On: Protecting Against On-Path DNS Poisoning
H Duan, N Weaver, Z Zhao, M Hu, J Liang, J Jiang, K Li, V Paxson
SATIN, 2012
Reexamining DNS From a Global Recursive Resolver Perspective
H Gao, V Yegneswaran, J Jiang, Y Chen, P Porras, S Ghosh, H Duan
IEEE/ACM Transactions on Networking, 2014
Composition kills: A case study of email sender authentication
J Chen, V Paxson, J Jiang
29th USENIX Security Symposium (USENIX Security 20), 2183-2199, 2020
Measuring Query Latency of Top Level DNS Servers
J Liang, J Jiang, H Duan, K Li, J Wu
Passive and Active Measurement, 145-154, 2013
Forwarding-Loop Attacks in Content Delivery Networks
J Chen, J Jiang, X Zheng, H Duan, J Liang, K Li, T Wan, V Paxson
NDSS, 2016
Ghost Domain Names: Revoked Yet Still Resolvable
J Jiang, J Liang, K Li, J Li, H Duan, J Wu
NDSS, 2012
Host of troubles: Multiple host ambiguities in http implementations
J Chen, J Jiang, H Duan, N Weaver, T Wan, V Paxson
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
We still {Don’t} have secure {Cross-Domain} requests: An empirical study of {CORS}
J Chen, J Jiang, H Duan, T Wan, S Chen, V Paxson, M Yang
27th USENIX Security Symposium (USENIX Security 18), 1079-1093, 2018
Abusing CDNs for fun and profit: Security issues in CDNs' origin validation
R Guo, J Chen, B Liu, J Zhang, C Zhang, H Duan, T Wan, J Jiang, S Hao, ...
2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS), 1-10, 2018
A federated identity management system with centralized trust and unified Single Sign-On
J Jiang, H Duan, T Lin, F Qin, H Zhang
2011 6th International ICST Conference on Communications and Networking in …, 2011
Analysis and measurement of zone dependency in the domain name system
J Jiang, J Zhang, H Duan, K Li, W Liu
2018 IEEE International Conference on Communications (ICC), 1-7, 2018
Path leaks of HTTPS Side-Channel by cookie injection
F Chen, H Duan, X Zheng, J Jiang, J Chen
Constructive Side-Channel Analysis and Secure Design: 9th International …, 2018
Enhancing IP anycast with location redirection for stateful communication
J Jiang
Computer, Intelligent Computing and Education Technology, 86-91, 2014
New Intrusion Detection Evasion Techniques with Signature Based Segmentation and Customized Overlap Patterns
D Li, H Duan, J Jiang
Proceedings of the 2013 International Conference on Business Computing and …, 2013
Finding the best answer: measuring the optimization of public and authoritative DNS.
J Zhang, HX Duan, J Jiang, J Liang, J Wu
Sci. China Inf. Sci. 62 (3), 39107:1-39107:3, 2019
The system can't perform the operation now. Try again later.
Articles 1–19