​
Login / Signup
Shuo Chen
Publication Activity (10 Years)
Years Active: 2001-2023
Publications (10 Years): 13
Top Topics
Online Services
Adverse Selection
Execution Model
Distributed Storage
Top Venues
CoRR
CCS
NDSS
IEEE Symposium on Security and Privacy
</>
Publications
</>
Zihao Jin
,
Shuo Chen
,
Yang Chen
,
Haixin Duan
,
Jianjun Chen
,
Jianping Wu
A Security Study about Electron Applications and a Programming Methodology to Tame DOM Functionalities.
NDSS
(2023)
Peichen Xie
,
Zihan Zheng
,
Xian Zhang
,
Shuo Chen
Decentralized Verifiable Mail-in Ballot Counting for Postal Voting.
CoRR
(2022)
Zihao Jin
,
Ziqiao Kong
,
Shuo Chen
,
Haixin Duan
Timing-Based Browsing Privacy Vulnerabilities Via Site Isolation.
IEEE Symposium on Security and Privacy
(2022)
Yang Chen
,
Zhongxin Guo
,
Runhuai Li
,
Shuo Chen
,
Lidong Zhou
,
Yajin Zhou
,
Xian Zhang
Forerunner: Constraint-based Speculative Transaction Execution for Ethereum.
SOSP
(2021)
Liyi Zeng
,
Yang Chen
,
Shuo Chen
,
Xian Zhang
,
Zhongxin Guo
,
Wei Xu
,
Thomas Moscibroda
Characterizing Ethereum's Mining Power Decentralization at a Deeper Level.
INFOCOM
(2021)
Xian Zhang
,
Xiaobing Guo
,
Zixuan Zeng
,
Wenyan Liu
,
Zhongxin Guo
,
Yang Chen
,
Shuo Chen
,
Qiufeng Yin
,
Mao Yang
,
Lidong Zhou
Argus: A Fully Transparent Incentive System for Anti-Piracy Campaigns (Extended Version).
CoRR
(2021)
Zihan Zheng
,
Peichen Xie
,
Xian Zhang
,
Shuo Chen
,
Yang Chen
,
Xiaobing Guo
,
Guangzhong Sun
,
Guangyu Sun
,
Lidong Zhou
Agatha: Smart Contract for DNN Computation.
CoRR
(2021)
Xian Zhang
,
Xiaobing Guo
,
Zixuan Zeng
,
Wenyan Liu
,
Zhongxin Guo
,
Yang Chen
,
Shuo Chen
,
Qiufeng Yin
,
Mao Yang
Argus: A Fully Transparent Incentive System for Anti-Piracy Campaigns.
SRDS
(2021)
Shuo Chen
,
Matt McCutchen
,
Phuong Cao
,
Shaz Qadeer
,
Ravishankar K. Iyer
SVAuth - A Single-Sign-On Integration Solution with Runtime Verification.
RV
(2017)
Yuan Tian
,
Eric Y. Chen
,
Xiaojun Ma
,
Shuo Chen
,
Xiao Wang
,
Patrick Tague
Swords and shields: a study of mobile game hacks and existing defenses.
ACSAC
(2016)
Yaoqi Jia
,
Zheng Leong Chua
,
Hong Hu
,
Shuo Chen
,
Prateek Saxena
,
Zhenkai Liang
"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing.
CCS
(2016)
Matt McCutchen
,
Daniel Song
,
Shuo Chen
,
Shaz Qadeer
Self-Verifying Execution (Position Paper).
SecDev
(2016)
Pantazis Deligiannis
,
Matt McCutchen
,
Paul Thomson
,
Shuo Chen
,
Alastair F. Donaldson
,
John Erickson
,
Cheng Huang
,
Akash Lal
,
Rashmi Mudduluru
,
Shaz Qadeer
,
Wolfram Schulte
Uncovering Bugs in Distributed Storage Systems during Testing (Not in Production!).
FAST
(2016)
Shuo Chen
Enlightening Ph.D. Students with the Elegance of Logic - My Personal Memory About Prof. José Meseguer.
Logic, Rewriting, and Concurrency
(2015)
Eric Y. Chen
,
Shuo Chen
,
Shaz Qadeer
,
Rui Wang
Securing Multiparty Online Services Via Certification of Symbolic Transactions.
IEEE Symposium on Security and Privacy
(2015)
Ravi Bhoraskar
,
Seungyeop Han
,
Jinseong Jeon
,
Tanzirul Azim
,
Shuo Chen
,
Jaeyeon Jung
,
Suman Nath
,
Rui Wang
,
David Wetherall
Brahmastra: Driving Apps to Test the Security of Third-Party Components.
USENIX Security Symposium
(2014)
Eric Y. Chen
,
Yutong Pei
,
Shuo Chen
,
Yuan Tian
,
Robert Kotcher
,
Patrick Tague
OAuth Demystified for Mobile Application Developers.
CCS
(2014)
Fan Zhang
,
Wenbo He
,
Yangyi Chen
,
Zhou Li
,
XiaoFeng Wang
,
Shuo Chen
,
Xue Liu
Thwarting Wi-Fi Side-Channel Analysis through Traffic Demultiplexing.
IEEE Trans. Wirel. Commun.
13 (1) (2014)
Rui Wang
,
Luyi Xing
,
XiaoFeng Wang
,
Shuo Chen
Unauthorized origin crossing on mobile platforms: threats and mitigation.
CCS
(2013)
Luyi Xing
,
Yangyi Chen
,
XiaoFeng Wang
,
Shuo Chen
InteGuard: Toward Automatic Protection of Third-Party Web Service Integrations.
NDSS
(2013)
Rui Wang
,
Yuchen Zhou
,
Shuo Chen
,
Shaz Qadeer
,
David Evans
,
Yuri Gurevich
Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization.
USENIX Security Symposium
(2013)
Rui Wang
,
Shuo Chen
,
XiaoFeng Wang
Signing Me onto Your Accounts through Facebook and Google: A Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services.
IEEE Symposium on Security and Privacy
(2012)
Rui Wang
,
Shuo Chen
,
XiaoFeng Wang
,
Shaz Qadeer
How to Shop for Free Online - Security Analysis of Cashier-as-a-Service Based Web Stores.
IEEE Symposium on Security and Privacy
(2011)
Kehuan Zhang
,
Zhou Li
,
Rui Wang
,
XiaoFeng Wang
,
Shuo Chen
Sidebuster: automated detection and quantification of side-channel leaks in web application development.
CCS
(2010)
Shuo Chen
,
Rui Wang
,
XiaoFeng Wang
,
Kehuan Zhang
Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow.
IEEE Symposium on Security and Privacy
(2010)
George Danezis
,
Tuomas Aura
,
Shuo Chen
,
Emre Kiciman
How to Share Your Favourite Search Results while Preserving Privacy and Quality.
Privacy Enhancing Technologies
(2010)
Karthik Pattabiraman
,
Shuo Chen
,
Zbigniew Kalbarczyk
Workshop on compiler and architectural techniques for application reliability and security (CATARS).
DSN
(2008)
Shuo Chen
,
Jun Xu
,
Zbigniew T. Kalbarczyk
,
Ravishankar K. Iyer
Security Vulnerabilities: From Analysis to Detection and Masking Techniques.
Proc. IEEE
94 (2) (2006)
Shuo Chen
,
Jun Xu
,
Nithin Nakka
,
Zbigniew Kalbarczyk
,
Ravishankar K. Iyer
Defeating Memory Corruption Attacks via Pointer Taintedness Detection.
DSN
(2005)
Shuo Chen
,
Jun Xu
,
Emre Can Sezer
Non-Control-Data Attacks Are Realistic Threats.
USENIX Security Symposium
(2005)
Shuo Chen
,
Jun Xu
,
Zbigniew Kalbarczyk
,
Ravishankar K. Iyer
,
Keith Whisnant
Modeling and evaluating the security threats of transient errors in firewall software.
Perform. Evaluation
56 (1-4) (2004)
Shuo Chen
,
Karthik Pattabiraman
,
Zbigniew Kalbarczyk
,
Ravishankar K. Iyer
Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities by Pointer Taintedness Semantics.
SEC
(2004)
Ravishankar K. Iyer
,
Shuo Chen
,
Jun Xu
,
Zbigniew Kalbarczyk
Security Vulnerabilities - From Data Analysis to Protection Mechanisms.
WORDS Fall
(2003)
Shuo Chen
,
Zbigniew Kalbarczyk
,
Jun Xu
,
Ravishankar K. Iyer
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities.
DSN
(2003)
Shuo Chen
,
Jun Xu
,
Ravishankar K. Iyer
,
Keith Whisnant
Evaluating the Security Threat of Firewall Data Corruption Caused by Transient Errors.
DSN
(2002)
Jun Xu
,
Shuo Chen
,
Zbigniew Kalbarczyk
,
Ravishankar K. Iyer
An Experimental Study of Security Vulnerabilities Caused by Errors.
DSN
(2001)