Publications in total: 17
Publications at top-tier security venues (12): S&P (‘24a, ‘24b), NDSS (‘23, ‘24a, ‘24b, ‘24c), USENIX Security (‘23a, ‘23b, ‘24a, ‘24b), CCS (‘23a, ‘23b)
Publications at other computer science venues (5): DSN (‘21), VehicleSec (‘23), SIGMETRICS (‘23), IMC (‘23), NDSS Poster (‘24)
Publications as the 1st author (6): S&P (‘24a, ‘24b), NDSS (‘23), USENIX Security (‘23), CCS (‘23), DSN (‘21)
Publications as the corresponding author (1): USENIX Security (‘24)
Publications as the 2nd author (3): SIGMETRICS (‘23), CCS (‘23), NDSS (‘24)
Projects and Codes
Academic Conferences: DSN (‘21), CCS (‘22), VehicleSec (‘23), NDSS (‘23), USENIX Security (‘23), AEGIS (‘23), IEEE S&P (‘24a, ‘24b)
Industrial Conferences: ICANN DNS Symposium (IDS ‘21, ‘22), DNS-OARC (39, 40, 41, 42a, 42b), Black Hat (Asia ‘23, USA ‘23, Europe ‘23, USA ‘24), GeekCon (‘23, ‘24.Intl.), Kanxue SDC (‘23)
In GeekCon International 2024, Prof. Duan and me presented the TuDoor attack and showed a live demo. We got the Extraordinary Hacker honor.
In 45th IEEE Symposium on Security and Privacy 2024, Fenglu presented our novel DNSBomb attack on behalf of me cause I couldn’t make it there.
In 45th IEEE Symposium on Security and Privacy 2024, Fenglu presented our novel TuDoor attack on behalf of me cause I couldn’t make it there.
In Black Hat Europe 2023, Professor Haixin Duan presented our work: “TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers”.
In GeekCon 2023, I presented our 0-day vulnerability to conduct pulsing DoS attack with Dashuai. We got the 2nd prize of GeekCon 2023 DAF (Defense & Attack Force) Contest.
In Kanxue SDC 2023, Professor Haixin Duan presented our work: “The Maginot Line: Attacking the Boundary of DNS Caching Protection”.
In OARC 41 & ICANN DNS Symposium 2023 (hybrid in-person and online workshop), Fenglu presented our novel TsuKing attack on behalf of me cause I couldn’t make it there.
In the 2nd AEGIS Workshop (online workshop), I presented a novel Ghost Domain attack named Phoenix Domain to the audiences.
In the 2023 32nd USENIX Security Symposium, I presented one paper “The Maginot Line: Attacking the Boundary of DNS Caching Protection” to the audiences. I met many old friends and made many new friends.
In Black Hat USA 2023, Professor Zhou Li presented our work: “The Maginot Line: Attacking the Boundary of DNS Caching Protection”.
In Black Hat Asia 2023, I presented our work: “Phoenix Domain Attack: Vulnerable Links in Domain Name Delegation and Revocation”.
In the 2023 30th Annual Network and Distributed System Security Symposium, I presented one paper “Ghost Domain Reloaded: Vulnerable Links in Domain Name Delegation and Revocation” and one demo/poster “Demo: Ransom Vehicle through Charging Pile” to the audiences. I met old friend Yue Qin in our group and made many new friends. I also attended the award ceremony and accepted the 1/2 distinguished paper award for our colleagues and friends from Professor Jiahai Yang’s team.
In OARC 40 & NANOG 87 Workshop (hybrid in-person and online workshop), I presented a novel hosting-based domain takeover detection framework DareShark to the audiences.
In the 5th ICANN DNS Symposium (IDS 2022), I presented my NDSS ‘23 paper Phoenix Domain to the audiences. Discussed with so many enthusiastic question askers.
In OARC 39 & 47th CENTR Technical Workshop (hybrid in-person and online workshop), I presented a novel Ghost Domain attack named Phoenix Domain to the audiences.
In @Pentester Academy TV, I presented the IPv6 network scanner XMap with @DamianGoh13. Watch the video at here. New features are coming.
In the 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2021, virtually), I presented paper “Fast IPv6 Network Periphery Discovery and Security Implications” to the audiences.
In the 4th ICANN DNS Symposium (IDS 2021, virtually), I presented a novel DNS cache poisoning attack (introduced by Xiaofeng Zheng from our lab) to the audiences.
For you