Helen J. Wang's Publications


2015

The Activity Platform
Helen J. Wang, Alexander Moshchuk, Michael Gamon, Mona Haraty, Shamsi Iqbal, Eli T. Brown, Ashish Kapoor, Chris Meek, Eric Chen, Yuan Tian, Jaime Teevan, Mary Czerwinski, and Susan Dumais 15th Workshop on Hot Topics in Operating Systems, May 2015.
[pdf]

SurroundWeb : Mitigating Privacy Concerns in a 3D Web Browser
John Vilk, David Molnar, Benjamin Livshits, Eyal Ofek, Chris Rossbach, Alexander Moshchuk, Helen J. Wang, and Ran Gal
IEEE - Institute of Electrical and Electronics Engineers (The Oakland Conference), 18 May 2015.
[link]


2014

World-Driven Access Control for Continuous Sensing
Franziska Roesner, David Molnar, Alexander Moshchuk, Tadayoshi Kohno, and Helen J. Wang.
21st ACM Conference on Computer and Communications Security (CCS), November 2014.
[pdf]


2013

Operating System Support for Augmented Reality Applications
Loris D'Antoni, Alan Dunn, Suman Jana, Tadayoshi Kohno, Benjamin Livshits, David Molnar, Alexander Moshchuk, Eyal Ofek, Franziska Roesner, Scott Saponas, Margus Veanes, and Helen J Wang
14th Workshop on Hot Topics in Operating Systems (HotOS), May 2013. [pdf]

Content-Based Isolation: Rethinking Isolation Policy Design on Client Systems
Alexander Moshchuk, Helen J. Wang, and Yunxin Liu
Proceedings of 20th ACM Conference on Computer and Communications Security, November, 2013, Berlin, Germany. [pdf]

Enabling Fine-Grained Permissions for Augmented Reality Applications With Recognizers
Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Livshits, Helen J. Wang, and Eyal Ofek
Proceedings of the 22nd USENIX Security Symposium, August 2013. [pdf]

Lightweight Server Support for Browser-Based CSRF Protection
Alexei Czeskis, Alexander Moshchuk, Tadayoshi Kohno, Helen J. Wang
Proceedings of the International World Wide Web Conference (WWW), May 2013. [pdf]


2012

Clickjacking: Attacks and Defenses
Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schechter, Collin Jackson
Usenix Security 2012, Bellevue, WA [pdf]

User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems
Franziska Roesner, Tadayoshi Kohno, Alexander Moshchuk, Bryan Parno, Helen J. Wang, Crispin Cowan
IEEE Symposium of Security and Privacy (The Oakland Conference) 2012, San Francisco, CA Best Practical Paper Award [pdf] [an older version]

Practical End-to-End Web Content Integrity
Kapil Singh, Helen J. Wang, Alexander Moshchuk, Collin Jackson, Wenke Lee, Proceedings of the 21st International World Wide Web Conference (WWW), 2012. [pdf]


2011

Permission Re-Delegation: Attacks and Defenses
Adrienne Porter Felt, Helen J. Wang, Alex Moshchuk, Steven Hanna, and Erika Chin
Usenix Security 2011 [pdf]

Enabling Security in Cloud Storage SLAs with CloudProof
Raluca Ada Popa, Jay Lorch, David Molnar, Helen J. Wang, and Li Zhuang
USENIX Annual Technical Conference 2011 [pdf] [longer]



2010

On the Incoherencies in Web Browser Access Control Policies
Kapil Singh, Alexander Moshchuk, Helen J. Wang, Wenke Lee
IEEE Symposium on Security and Privacy, Oakland, CA, May 17-20, 2010 [pdf]


Resource Management for Web Applications in ServiceOS
Alexander Moshchuk and Helen J. Wang
MSR-TR-2010-56, May 2010 [ pdf ]

SecondNet: A Data Center Network Virtualization Architecture with Bandwidth Guarantees
Chuanxiong Guo, Guohan Lu, Helen J. Wang, Shuang Yang, Chao Kong, Peng Sun, Wenfei Wu, Yongguang Zhang
ACM CoNEXT 2010 [ pdf ]


2009

Convergence of Desktop and Web Applications on a Multi-Service OS
Helen J. Wang, Alexander Moshchuk, Alan Bush
4th Usenix Workshop on Hot Topics in Security, August, 2009, Montreal, Canada. [pdf]


The Multi-Principal OS Construction of the Gazelle Web Browser
Helen J. Wang, Chris Grier, Alexander Moshchuk, Samuel T. King, Piali Choudhury, Herman Venter
18th Usenix Security Symposium, August, 2009, Montreal, Canada. [pdf]



2008

Tupni: Automatic Reverse Engineering of Input Formats
Weidong Cui, Marcus Peinado, Karl Chen, Helen J. Wang, Luis Irun-Briz
The 15th ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, October 27-31, 2008
[pdf]


Characterizing Botnets from Email Spam Records
Li Zhuang, John Dunagan, Daniel R. Simon, Helen J. Wang, Ivan Osipkov Geoff Hulten, J. D. Tygar
First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), San Francisco, CA
[pdf][html]


2007

Protection and Communication Abstractions for Web Browsers in MashupOS
Helen J. Wang, Xiaofeng Fan, Collin Jackson, and Jon Howell
21st ACM Symposium on Operating Systems Principles (SOSP), Stevenson, WA, October 2007 [pdf][pptx]

RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization
Xuxian Jiang, Helen J. Wang, Dongyan Xu, Yi-Min Wang
Proceedings of the 26th IEEE International Symposium on Reliable Distributed Systems (SRDS), Beijing, China, October 2007 [pdf]

Discoverer: Automatic Protocol Reverse Engineering from Network Traces
Weidong Cui, Jayanthkumar Kannan, Helen J. Wang
The 16th USENIX Security Symposium, Boston, MA, August 2007 [pdf][html]

Location Privacy in Wireless Networks
Tao Jiang, Helen J. Wang, and Yi-Chun Hu
The 5th International Conference on Mobile Systems, Applications, and Service (MobiSys
Puerto Rico, June 11-14, 2007 [pdf]

ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing
Weidong Cui, Marcus Peinado, Helen J. Wang, and Michael E. Locasto
IEEE Symposium on Security and Privacy
Oakland, CA, May 20-23, 2007 [pdf]

A Systematic Approach to Uncover Security Flaws in GUI Logic
Shuo Chen, Jose Meseguer, Ralf Sasse, Helen J. Wang, and Yi-Min Wang
IEEE Symposium on Security and Privacy
Oakland, CA, May 20-23, 2007 [pdf]

Subspace: Secure Cross-Domain Communication for Web Mashups
Collin Jackson and Helen J. Wang
16th International World Wide Web Conference (WWW)
Banff, Alberta, Canada, May 8-12, 2007 [pdf]

MashupOS: Operating System Abstractions for Client Mashups
Jon Howell, Collin Jackson, Helen J. Wang, and Xiaofeng Fan
11th Workshop on Hot Topics in Operating Systems (HotOS XI)
San Diego, CA, May 7-9, 2007 [pdf] [html]

Live Monitoring: Using Adaptive Instrumentation and Analysis to Debug and Maintain Web Applications
Emre Kiciman and Helen J. Wang
11th Workshop on Hot Topics in Operating Systems (HotOS XI)
San Diego, CA, May 7-9, 2007 [pdf]

A Generic Application-Level Protocol Analyzer and its Language
Nikita Borisov, David J. Brumley, Helen J. Wang, John Dunagan, Pallavi Joshi, and Chuanxiong Guo
The 14th Annual Network & Distributed System Security Symposium (NDSS)
San Diego, CA, Feb, 2007 [pdf]

2006

Finding Diversity in Remote Code Injection Exploits
Justin Ma, John Dunagan, Helen J. Wang, Stefan Savage, and Geoffrey M. Voelker
Internet Measurement Conference, Rio de Janeiro, Brazil October, 2006 pdf

BrowserShield: Vulnerability-Driven Filtering of Dynamic HTML
Charles Reis, John Dunagan, Helen J. Wang, Opher Dubrovsky, and Saher Esmeir
Usenix OSDI, Seattle, WA December 2006 pdf

SubVirt: Implementing malware with virtual machines
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, and Jacob R. Lorch
IEEE Symposium on Security and Privacy, Oakland, CA May 2006. [pdf]

Automatically Extracting Fields from Unknown Network Protocols Karthik Gopalratnam, Sumit Basu, John Dunagan, Helen J. Wang
Systems and Machine Learning Workshop (SysML), Saint-Malo, France
[pdf]

2005

Applications of Secure Electronic Voting to Automated Privacy-Preserving Troubleshooting
Qiang Huang, David Jao, Helen J. Wang
Proceedings of the 12th ACM CCS, Alexandria, VA, November 2005. [pdf]

Virtual Playgrounds for Worm Behavior Investigation
Xuxian Jiang, Dongyan Xu, Helen J. Wang , Eugene H. Spafford
Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection (RAID '05), Seattle, WA, September 2005. [pdf]

Location Privacy in Wireless Networks
Yih-Chun Hu and Helen J. Wang
Proceedings of the ACM SIGCOMM Asia Workshop 2005, ACM, Bejing, China, April 2005. [pdf]

Generic Application-Level Protocol Analyzer and its Language
Nikita Borisov, David J. Brumley, Helen J. Wang , and Chuanxiong Guo
Microsoft Technical Report MSR-TR-2005-133, Feburary, 2005 [pdf]

Privacy-Preserving Friends Troubleshooting Network
Qiang Huang, Helen J. Wang, and Nikita Borisov
ISOC NDSS 2005, Feb, San Diego, CA [pdf]

2004

Smart-Phone Attacks and Defenses
Chuanxiong Guo, Helen J. Wang, and Wenwu Zhu
HotNets III, November, 2004 San Diego, CA
[pdf][ps][talk]

Some Anti-Worm Efforts at Microsoft
Helen J. Wang Invited Talk at 2nd Workshop Of Rapid Malcode (WORM), Oct 29, 2004 [pdf]

Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits
Helen J. Wang, Chuanxiong Guo, Daniel R. Simon, and Alf Zugenmaier
ACM SIGCOMM, August, 2004 Portland, OR
[pdf][an older version] [talk]

Automatic Misconfiguration Troubleshooting with PeerPressure
Helen J. Wang, John C. Platt, Yu Chen, Ruyun Zhang, Yi-Min Wang
Usenix OSDI, December, 2004 San Francisco, CA
[pdf] [html]

PeerPressure for Automatic Troubleshooting
Helen J. Wang , John Platt, Yu Chen, Ruyun Zhang, and Yi-Min Wang
ACM SIGMETRICS 2004 Poster Paper, New York
[pdf][ long version]

Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting
Helen J. Wang, Yih-Chun Hu, Chun Yuan, Zheng Zhang, and Yi-Min Wang
The 3rd International Workshop on Peer-to-Peer Systems (IPTPS 2004), San Diego, CA; Feb 26-27, 2004
[pdf] [ps]

Supporting Heterogeneity and Congestion Control in Peer-to-Peer Multicast Streaming
Venkata N. Padmanabhan, Helen J. Wang, and Philip A. Chou
The 3rd International Workshop on Peer-to-Peer Systems (IPTPS 2004), San Diego, CA; Feb 26-27, 2004
[pdf]

2003

Resilient Peer-to-Peer Streaming
Venkata N. Padmanabhan, Helen J. Wang, and Philip A. Chou
11th IEEE International Conference on Network Protocols (ICNP), Atlanta, GA, November, 2003
[pdf] [ps]
[Presentation: pdf, ps]

STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support
Yi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan, and Zheng Zhang
USENIX LISA, October, 2003
[pdf]
Best Paper Award.

Layered Multiple Description Coding
Philip A. Chou, Helen J. Wang, and Venkata N. Padmanabhan
Packet Video Workshop, Nantes, France, April 2003.
[pdf]

Server-based Inference of Internet Link Lossiness
Venkata N. Padmanabhan, Lili Qiu, and Helen J. Wang
IEEE Infocom 2003, San Francisco, CA, April 2003
[pdf] [ps]

An Evaluation of Scalable Application-level Multicast Built Using Peer-to-peer Overlays.
Miguel Castro, Michael B. Jones, Anne-Marie Kermarrec, Antony Rowstron, Marvin Theimer, Helen J. Wang, and Alec Wolman.
Proceedings of IEEE Infocom 2003, San Francisco, CA, April 2003.
[pdf]

2002

Passive Network Tomography Using Bayesian Inference
Venkata N. Padmanabhan, Lili Qiu, and Helen J. Wang.
Internet Measurement Workshop, Marseille, France, November 2002.
[pdf]

Distributing Streaming Media Content using Cooperative Networking
Venkata N. Padmanabhan, Helen J. Wang, Philip A. Chou, and Kay Sripanidkulchai
[pdf] [ps]
The 12th International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV 2002), Miami Beach, FL.
An extended version (Microsoft Research Technical Report MSR-TR-2002-37): [pdf] [ps]




2001 and before

Mobility Support in Unified Communication Systems
Helen J. Wang and Randy H. Katz
ACM Workshop on Wireless Mobile Multimedia (WoWMoM) 2001, Rome, Italy.
[ ps][pdf]

A Personal Communication Service Creation Model for Internet-based Unified Communication Systems
Helen J. Wang, Ascan Morlang, and Randy H. Katz
IEEE International Conference on Communications, Helsinki, Finland. June 2001.
[ ps.gz ] [pdf ]

Internet-core Network Architecture for Integrated Communications
Helen J. Wang, Bhaskaran Raman, Chen-nee Chuah, Rahul Biswas, Ramakrishna Gummadi, Barbara Hohlt, Xia Hong, Emre Kiciman, Zhuoqing Mao, Jimmy S. Shih, Lakshminarayanan Subramanian, Ben Y. Zhao, Anthony D. Joseph, and Randy H. Katz
IEEE Personal Communications, August 2000: Special Issue on IP-based Mobile Telecommunication Networks.
[ ps.gz ] [ pdf ]

A Signaling System Using Lightweight Call Sessions
Helen J. Wang, Anthony D. Joseph, and Randy H. Katz
Proceedings of IEEE Infocom 2000, Tel-Aviv, Israel, March, 2000.
[ ps.gz ] [ pdf ]

The ICEBERG Project: Defining the IP and Telecom Intersection
Bhaskaran Raman, Helen J. Wang, Jimmy S. Shih, Anthony D. Joseph, and Randy H. Katz
IEEE IT Professional, Nov/Dec 1999.
[pdf]

Policy-Enabled Handoffs Across Heterogeneous Wireless Networks
Helen J. Wang, Jochen Giese, and Randy H. Katz
2nd IEEE Workshops on Mobile Computing and Applications (WMCSA 1999), New Orleans, LA, February 1999.
[ps.gz]

Online Aggregation
Joseph M. Hellerstein, Peter Haas, and Helen J. Wang
Proceedings of ACM-SIGMOD International Conference on Management of Data, Tucson, May 1997.
[ps.gz]

Evaluation of Existing Architectures in IRAM Systems
W. Bowman, N. Cardwell, C. Kozyrakis, C. Romer, Helen J. Wang
Workshop on "Mixing Logic and DRAM", the 24th Annual International Symposium on Computer Architecture, Denver, CO, June 1997.
[ps.gz]