default search action
Shuo Chen 0001
Person information
- affiliation: Microsoft Research, Redmond, WA, USA
- affiliation (former): University of Illinois, Urbana-Champaign, IL, USA
Other persons with the same name
- Shuo Chen — disambiguation page
- Shuo Chen 0002 — Beijing University of Posts and Telecommunications, School of Information and Communication Engineering, Beijing Key Laboratory of Network System Architecture and Convergence, China
- Shuo Chen 0003 — RIKEN, Center for Advanced Intelligence Project (AIP), Tokyo, Japan (and 1 more)
- Shuo Chen 0004 — National University of Defense Technology, School of Electronic Science, Changsha, China
- Shuo Chen 0005 — Northeastern University, Sino-Dutch Biomedical and Information Engineering School, Shenyang, China
- Shuo Chen 0006 — Nanyang Technological University, School of Computer Science and Engineering, Singapore
- Shuo Chen 0007 — New Jersey Institute of Technology, Department of Computer Science, Newark, NJ, USA (and 1 more)
- Shuo Chen 0008 — Cornell University, Department of Computer Science, Ithaca, NY, USA (and 1 more)
- Shuo Chen 0009 — Tsinghua University, Department of Automation, Tsinghua National Laboratory for Information Science and Technology, Research Institute of Information Technology, Beijing, China
- Shuo Chen 0010 — TikTok, Singapore (and 1 more)
- Shuo Chen 0011 — Xiamen University, Department of Cognitive Science, China
- Shuo Chen 0012 — Shenzhen University, College of Computer Science and Software Engineering, China
- Shuo Chen 0013 — Harbin Institute of Technology, School of Astronautics, China
- Shuo Chen 0014 — LMU Munich, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i4]Pengcheng Xia, Zhou Yu, Kailong Wang, Kai Ma, Shuo Chen, Xiapu Luo, Yajin Zhou, Lei Wu, Guangdong Bai, Haoyu Wang:
The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web. CoRR abs/2401.04662 (2024) - 2023
- [c32]Zihao Jin, Shuo Chen, Yang Chen, Haixin Duan, Jianjun Chen, Jianping Wu:
A Security Study about Electron Applications and a Programming Methodology to Tame DOM Functionalities. NDSS 2023 - 2022
- [c31]Zihao Jin, Ziqiao Kong, Shuo Chen, Haixin Duan:
Timing-Based Browsing Privacy Vulnerabilities Via Site Isolation. SP 2022: 1525-1539 - [i3]Peichen Xie, Zihan Zheng, Xian Zhang, Shuo Chen:
Decentralized Verifiable Mail-in Ballot Counting for Postal Voting. CoRR abs/2202.09122 (2022) - 2021
- [c30]Liyi Zeng, Yang Chen, Shuo Chen, Xian Zhang, Zhongxin Guo, Wei Xu, Thomas Moscibroda:
Characterizing Ethereum's Mining Power Decentralization at a Deeper Level. INFOCOM 2021: 1-10 - [c29]Yang Chen, Zhongxin Guo, Runhuai Li, Shuo Chen, Lidong Zhou, Yajin Zhou, Xian Zhang:
Forerunner: Constraint-based Speculative Transaction Execution for Ethereum. SOSP 2021: 570-587 - [c28]Xian Zhang, Xiaobing Guo, Zixuan Zeng, Wenyan Liu, Zhongxin Guo, Yang Chen, Shuo Chen, Qiufeng Yin, Mao Yang:
Argus: A Fully Transparent Incentive System for Anti-Piracy Campaigns. SRDS 2021: 143-153 - [i2]Zihan Zheng, Peichen Xie, Xian Zhang, Shuo Chen, Yang Chen, Xiaobing Guo, Guangzhong Sun, Guangyu Sun, Lidong Zhou:
Agatha: Smart Contract for DNN Computation. CoRR abs/2105.04919 (2021) - [i1]Xian Zhang, Xiaobing Guo, Zixuan Zeng, Wenyan Liu, Zhongxin Guo, Yang Chen, Shuo Chen, Qiufeng Yin, Mao Yang, Lidong Zhou:
Argus: A Fully Transparent Incentive System for Anti-Piracy Campaigns (Extended Version). CoRR abs/2107.06049 (2021)
2010 – 2019
- 2018
- [c27]Jianjun Chen, Jian Jiang, Hai-Xin Duan, Tao Wan, Shuo Chen, Vern Paxson, Min Yang:
We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS. USENIX Security Symposium 2018: 1079-1093 - 2017
- [c26]Shuo Chen, Matt McCutchen, Phuong Cao, Shaz Qadeer, Ravishankar K. Iyer:
SVAuth - A Single-Sign-On Integration Solution with Runtime Verification. RV 2017: 349-358 - 2016
- [c25]Yuan Tian, Eric Yawei Chen, Xiaojun Ma, Shuo Chen, Xiao Wang, Patrick Tague:
Swords and shields: a study of mobile game hacks and existing defenses. ACSAC 2016: 386-397 - [c24]Yaoqi Jia, Zheng Leong Chua, Hong Hu, Shuo Chen, Prateek Saxena, Zhenkai Liang:
"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing. CCS 2016: 791-804 - [c23]Pantazis Deligiannis, Matt McCutchen, Paul Thomson, Shuo Chen, Alastair F. Donaldson, John Erickson, Cheng Huang, Akash Lal, Rashmi Mudduluru, Shaz Qadeer, Wolfram Schulte:
Uncovering Bugs in Distributed Storage Systems during Testing (Not in Production!). FAST 2016: 249-262 - [c22]Matt McCutchen, Daniel Song, Shuo Chen, Shaz Qadeer:
Self-Verifying Execution (Position Paper). SecDev 2016: 117-123 - 2015
- [c21]Shuo Chen:
Enlightening Ph.D. Students with the Elegance of Logic - My Personal Memory About Prof. José Meseguer. Logic, Rewriting, and Concurrency 2015: 228-231 - [c20]Eric Yawei Chen, Shuo Chen, Shaz Qadeer, Rui Wang:
Securing Multiparty Online Services Via Certification of Symbolic Transactions. IEEE Symposium on Security and Privacy 2015: 833-849 - [c19]Xiaofeng Zheng, Jian Jiang, Jinjin Liang, Hai-Xin Duan, Shuo Chen, Tao Wan, Nicholas Weaver:
Cookies Lack Integrity: Real-World Implications. USENIX Security Symposium 2015: 707-721 - 2014
- [j3]Fan Zhang, Wenbo He, Yangyi Chen, Zhou Li, XiaoFeng Wang, Shuo Chen, Xue Liu:
Thwarting Wi-Fi Side-Channel Analysis through Traffic Demultiplexing. IEEE Trans. Wirel. Commun. 13(1): 86-98 (2014) - [c18]Eric Yawei Chen, Yutong Pei, Shuo Chen, Yuan Tian, Robert Kotcher, Patrick Tague:
OAuth Demystified for Mobile Application Developers. CCS 2014: 892-903 - [c17]Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman Nath, Rui Wang, David Wetherall:
Brahmastra: Driving Apps to Test the Security of Third-Party Components. USENIX Security Symposium 2014: 1021-1036 - 2013
- [c16]Rui Wang, Luyi Xing, XiaoFeng Wang, Shuo Chen:
Unauthorized origin crossing on mobile platforms: threats and mitigation. CCS 2013: 635-646 - [c15]Luyi Xing, Yangyi Chen, XiaoFeng Wang, Shuo Chen:
InteGuard: Toward Automatic Protection of Third-Party Web Service Integrations. NDSS 2013 - [c14]Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri Gurevich:
Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization. USENIX Security Symposium 2013: 399-314 - 2012
- [c13]Rui Wang, Shuo Chen, XiaoFeng Wang:
Signing Me onto Your Accounts through Facebook and Google: A Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services. IEEE Symposium on Security and Privacy 2012: 365-379 - 2011
- [c12]Rui Wang, Shuo Chen, XiaoFeng Wang, Shaz Qadeer:
How to Shop for Free Online - Security Analysis of Cashier-as-a-Service Based Web Stores. IEEE Symposium on Security and Privacy 2011: 465-480 - 2010
- [c11]Kehuan Zhang, Zhou Li, Rui Wang, XiaoFeng Wang, Shuo Chen:
Sidebuster: automated detection and quantification of side-channel leaks in web application development. CCS 2010: 595-606 - [c10]George Danezis, Tuomas Aura, Shuo Chen, Emre Kiciman:
How to Share Your Favourite Search Results while Preserving Privacy and Quality. Privacy Enhancing Technologies 2010: 273-290 - [c9]Shuo Chen, Rui Wang, XiaoFeng Wang, Kehuan Zhang:
Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow. IEEE Symposium on Security and Privacy 2010: 191-206
2000 – 2009
- 2008
- [c8]Karthik Pattabiraman, Shuo Chen, Zbigniew Kalbarczyk:
Workshop on compiler and architectural techniques for application reliability and security (CATARS). DSN 2008: 544-545 - 2006
- [j2]Shuo Chen, Jun Xu, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer:
Security Vulnerabilities: From Analysis to Detection and Masking Techniques. Proc. IEEE 94(2): 407-418 (2006) - 2005
- [b1]Shuo Chen:
Design for Security: Measurement, Analysis and Mitigation Techniques. University of Illinois Urbana-Champaign, USA, 2005 - [c7]Shuo Chen, Jun Xu, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Defeating Memory Corruption Attacks via Pointer Taintedness Detection. DSN 2005: 378-387 - [c6]Shuo Chen, Jun Xu, Emre Can Sezer:
Non-Control-Data Attacks Are Realistic Threats. USENIX Security Symposium 2005 - 2004
- [j1]Shuo Chen, Jun Xu, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Keith Whisnant:
Modeling and evaluating the security threats of transient errors in firewall software. Perform. Evaluation 56(1-4): 53-72 (2004) - [c5]Shuo Chen, Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities by Pointer Taintedness Semantics. SEC 2004: 83-100 - 2003
- [c4]Shuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishankar K. Iyer:
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities. DSN 2003: 605-614 - [c3]Ravishankar K. Iyer, Shuo Chen, Jun Xu, Zbigniew Kalbarczyk:
Security Vulnerabilities - From Data Analysis to Protection Mechanisms. WORDS Fall 2003: 331-338 - 2002
- [c2]Shuo Chen, Jun Xu, Ravishankar K. Iyer, Keith Whisnant:
Evaluating the Security Threat of Firewall Data Corruption Caused by Transient Errors. DSN 2002: 495-504 - 2001
- [c1]Jun Xu, Shuo Chen, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
An Experimental Study of Security Vulnerabilities Caused by Errors. DSN 2001: 421-432
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 20:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint