Xiang Li | 李想
Xiang Li | 李想
Home
Publications
Projects
Activities
Misc
Contact
Links
Light
Dark
Automatic
English
中文 (简体)
1
Poster: ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing
在本文中,我们提出了一个全新的工具
ResolverFuzz
用来模糊测试解析器。
Qifan Zhang
,
Xuesong Bai
,
Xiang Li
,
Haixin Duan
,
Qi Li
,
Zhou Li
PDF
Cite
Code
Project
Poster: ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing
In this paper, we propose
ResolverFuzz
to fuzz the resolver.
Qifan Zhang
,
Xuesong Bai
,
Xiang Li
,
Haixin Duan
,
Qi Li
,
Zhou Li
Feb 26, 2024
DNS
PDF
Cite
Code
Project
ReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies with Differential Fuzzing
This paper proposes a new automated fuzzing tool “ReqsMiner” to discover CDN forwarding request inconsistencies.
Linkai Zheng
,
Xiang Li
,
Chuhan Wang
,
Run Guo
,
Haixin Duan
,
Jianjun Chen
,
Chao Zhang
,
Kaiwen Shen
PDF
Cite
ReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies with Differential Fuzzing
该文提出一种新的自动化模糊测试工具“ReqsMiner”来发现CDN转发请求的不一致。
Linkai Zheng
,
Xiang Li
,
Chuhan Wang
,
Run Guo
,
Haixin Duan
,
Jianjun Chen
,
Chao Zhang
,
Kaiwen Shen
Feb 26, 2024
CDN
PDF
Cite
Understanding the Implementation and Security Implications of Protective DNS Services
This paper analyzes the ecosystem of protective DNS and its security issues.
Mingxuan Liu
,
Yiming Zhang
,
Xiang Li
,
Chaoyi Lu
,
Baojun Liu
,
Haixin Duan
,
Xiaofeng Zheng
PDF
Cite
Code
Project
Understanding the Implementation and Security Implications of Protective DNS Services
本文分析了Protective DNS的生态系统及其安全问题。
Mingxuan Liu
,
Yiming Zhang
,
Xiang Li
,
Chaoyi Lu
,
Baojun Liu
,
Haixin Duan
,
Xiaofeng Zheng
Feb 26, 2024
DNS
PDF
Cite
Code
Project
TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers
In this paper, we present the
TsuKing
attack.
Wei Xu
,
Xiang Li
,
Chaoyi Lu
,
Baojun Liu
,
Jia Zhang
,
Jianjun Chen
,
Tao Wan
,
Haixin Duan
PDF
Cite
Code
Project
TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers
In this paper, we present the
TsuKing
attack.
Wei Xu
,
Xiang Li
,
Chaoyi Lu
,
Baojun Liu
,
Jia Zhang
,
Jianjun Chen
,
Tao Wan
,
Haixin Duan
Nov 26, 2023
DNS
PDF
Cite
Code
Project
Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild
In this paper, we present a stealthy mining pool detection system.
Zhenrui Zhang
,
Geng Hong
,
Xiang Li
,
Zhuoqun Fu
,
Jia Zhang
,
Mingxuan Liu
,
Chuhan Wang
,
Jianjun Chen
,
Baojun Liu
,
Haixin Duan
,
Chao Zhang
,
Min Yang
PDF
Cite
Code
Project
Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild
In this paper, we present a stealthy mining pool detection system.
Zhenrui Zhang
,
Geng Hong
,
Xiang Li
,
Zhuoqun Fu
,
Jia Zhang
,
Mingxuan Liu
,
Chuhan Wang
,
Jianjun Chen
,
Baojun Liu
,
Haixin Duan
,
Chao Zhang
,
Min Yang
Nov 26, 2023
Underground Economy
PDF
Cite
Code
Project
«
»
Cite
×