MashupOS: operating system abstractions for client mashups

Helen J. Wang , Jon Howell , Xiaofeng Fan , Collin Jackson
HOTOS'07 Proceedings of the 11th USENIX workshop on Hot topics in operating systems 16

74
2007
Clickjacking: attacks and defenses

Lin-Shung Huang , Alex Moshchuk , Helen J Wang , Stuart Schecter
usenix security symposium 22 -22

125
2012
Operating system support for augmented reality applications

Margus Veanes , Eyal Ofek , Alexander Moshchuk , David Molnar
hot topics in operating systems 21 -21

29
2013
Permission re-delegation: attacks and defenses

Alexander Moshchuk , Adrienne Porter Felt , Helen J. Wang , Erika Chin
usenix security symposium 22 -22

736
2011
Online ad serving

Rajesh S. Batheja , John D. Dunagan , Helen J. Wang , Xiaofeng Fan

69
2009
2007 Test-of-time Award “Online Aggregation”

Peter J. Haas , Helen J. Wang , Joseph M. Hellerstein
international conference on management of data 1

1
2007
Mining the Web for IP Address Geolocations

Yunxin Liu , Helen J. Wang , Yongguang Zhang , Chuanxiong Guo

2
2007
Enabling fine-grained permissions for augmented reality applications with recognizers

Eyal Ofek , Alexander Moshchuk , David Molnar , Helen J. Wang
usenix security symposium 415 -430

64
2013
A Service Creation Model for Integrated Communication Systems on the Internet

Anthony D. Joseph , Helen J. Wang , Randy H. Katz , Ascan Morlang

2001
Convergence of desktop and web applications on a multi-service OS

Alexander Moshchuk , Helen J. Wang , Alan Bush
usenix conference on hot topics in security 11 -11

19
2009
Lightweight server support for browser-based CSRF protection

Alexei Czeskis , Alexander Moshchuk , Tadayoshi Kohno , Helen J. Wang
Proceedings of the 22nd international conference on World Wide Web - WWW '13 273 -284

54
2013
Scalable Telemetry Classification for Automated Malware Detection

Jack W. Stokes , John C. Platt , Helen J. Wang , Joe Faulhaber
Computer Security – ESORICS 2012 788 -805

6
2012
Content-based isolation: rethinking isolation policy design on client systems

Alexander Moshchuk , Helen J. Wang , Yunxin Liu
computer and communications security 1167 -1180

10
2013
Passive network tomography using Bayesian inference

Venkata N. Padmanabhan , Lili Qiu , Helen J. Wang
acm special interest group on data communication 93 -94

32
2002
Protection and communication abstractions for web browsers in MashupOS

Helen J. Wang , Xiaofeng Fan , Jon Howell , Collin Jackson
ACM SIGOPS Operating Systems Review 41 ( 6) 1 -16

5
2007
Practical end-to-end web content integrity

Kapil Singh , Helen J. Wang , Alexander Moshchuk , Collin Jackson
the web conference 659 -668

16
2012
Finding diversity in remote code injection exploits

Justin Ma , John Dunagan , Helen J. Wang , Stefan Savage
internet measurement conference 53 -64

49
2006
SecondNet: a data center network virtualization architecture with bandwidth guarantees

Chuanxiong Guo , Guohan Lu , Helen J. Wang , Shuang Yang
conference on emerging network experiment and technology 15

812
2010
Applications of secure electronic voting to automated privacy-preserving troubleshooting

Qiang Huang , David Jao , Helen J. Wang
Proceedings of the 12th ACM conference on Computer and communications security - CCS '05 68 -80

19
2005
Strider: a black-box, state-based approach to change and configuration management and support

Yi-Min Wang , Chad Verbowski , John Dunagan , Yu Chen
Science of Computer Programming 53 ( 2) 143 -164

47
2004