Follow
Hang Hu
Hang Hu
Verified email at vt.edu - Homepage
Title
Cited by
Cited by
Year
Needle in a haystack: Tracking down elite phishing domains in the wild
K Tian, STK Jan, H Hu, D Yao, G Wang
Proceedings of the Internet Measurement Conference 2018, 429-442, 2018
1352018
Understanding the reproducibility of crowd-reported security vulnerabilities
D Mu, A Cuevas, L Yang, H Hu, X Xing, B Mao, G Wang
27th USENIX Security Symposium (USENIX Security 18), 919-936, 2018
1112018
{End-to-End} measurements of email spoofing attacks
H Hu, G Wang
27th USENIX Security Symposium (USENIX Security 18), 1095-1112, 2018
952018
The Next Domino to Fall: Empirical Analysis of User Passwords across Online Services
C Wang, STK Jan, H Hu, D Bossart, G Wang
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
862018
What happens after you leak your password: Understanding credential sharing on phishing sites
P Peng, C Xu, L Quinn, H Hu, B Viswanath, G Wang
Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019
512019
Towards understanding the adoption of anti-spoofing protocols in email systems
H Hu, P Peng, G Wang
2018 IEEE Cybersecurity Development (SecDev), 94-101, 2018
332018
Characterizing pixel tracking through the lens of disposable email services
H Hu, P Peng, G Wang
2019 IEEE Symposium on Security and Privacy (SP), 365-379, 2019
272019
Read between the lines: An empirical measurement of sensitive applications of voice personal assistant systems
FH Shezan, H Hu, J Wang, G Wang, Y Tian
Proceedings of the Web Conference 2020, 1006-1017, 2020
262020
Assessing Browser-level Defense against {IDN-based} Phishing
H Hu, STK Jan, Y Wang, G Wang
30th USENIX Security Symposium (USENIX Security 21), 3739-3756, 2021
242021
Revisiting email spoofing attacks
H Hu, G Wang
arXiv preprint arXiv:1801.00853, 2018
232018
Verhealth: Vetting medical voice applications through policy enforcement
FH Shezan, H Hu, G Wang, Y Tian
Proceedings of the ACM on interactive, mobile, wearable and ubiquitous …, 2020
152020
A case study of the security vetting process of smart-home assistant applications
H Hu, L Yang, S Lin, G Wang
2020 IEEE Security and Privacy Workshops (SPW), 76-81, 2020
102020
Security vetting process of smart-home assistant applications: A first look and case studies
H Hu, L Yang, S Lin, G Wang
arXiv preprint arXiv:2001.04520, 2020
102020
Empirical analysis of password reuse and modification across online service
C Wang, STK Jan, H Hu, G Wang
arXiv preprint arXiv:1706.01939, 2017
72017
Towards understanding the adoption of anti-spoofing protocols in email systems. In 2018 IEEE Cybersecurity Development (SecDev)
H Hu, P Peng, G Wang
IEEE, 2018
52018
Towards the adoption of anti-spoofing protocols
H Hu, P Peng, G Wang
arXiv preprint arXiv:1711.06654, 2017
32017
Characterizing and Detecting Online Deception via Data-Driven Methods
H Hu
Virginia Tech, 2020
12020
What Happens After You Leak Your Password
P Peng, C Xu, L Quinn, H Hu, B Viswanath, G Wang
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
2019
Towards the Adoption of Anti-spoofing Protocols for Email Systems.
H Hu, P Peng, G Wang
arXiv preprint arXiv:1711.06654, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–19