-
Academic Info
-
Contact Info
Office: 421 BOYD GSRC
Phone: (706) 583 0395
-
Post Mail Address:
415 Boyd GSRC,
Dept. of Computer Science
Athens, Georgia, 30602
USA
"
pbSE: Phase-based Symbolic Execution
"
Qixue Xiao, Yu Chen, Chenggang Wu, Kang Li, Junjie Mao, Shize Guo, and Yuanchun Shi, to appear in DSN 2017
"
Detecting Virtualization Specific Vulnerabilities in Cloud Computing Environment
"
Guodong Zhu, Yue Yin, Ruoyan Cai, and Kang Li, to appear in Proceedings of IEEE Cloud 2017.
"
Forwarding-Loop Attacks in Content Delivery Networks
"
Jianjun Chen, Jian Jiang, Xiaofeng Zheng, Haixin Duan, Jinjin Liang, Kang Li, Tao Wan, and Vern Paxson, in
Proceedings of Network and Distributed System Security Symposium (NDSS) 2016.
(Best Paper Award of NDSS 2016)
"
WebCapsule: Towards a Lightweight Forensic Engine for Web Browsers
"
Christopher Neasbitt, Bo Li, Roberto Perdisci, Long Lu, Kapil Singh, Kang Li, in
Proceedings of ACM CCS 2015.
Toward Automatically Deducing Key Device States for the Live Migration of Virtual Machines
Guodong Zhu, Kang Li, and Yibin Liao, in Proceedings of IEEE Cloud 2015.
"
ClickMiner: Towards Forensic Reconstruction of User-Browser Interactions from Network Traces
"
Christopher Neasbitt, Roberto Perdisci, Kang Li, and Terry Nelms, in
Proceedings of ACM CCS 2014.
"
Defeating the Transparency Features of Dynamic Binary Instrumentation
"
Xiaoning Li, and Kang Li, presentation at Blackhat USA, August 2014.
"
When HTTPS Meets CDN: A Case of Authentication in Delegated Service
"
Jinjin Liang, Jian Jiang, Haixin Duan, Kang Li, Tao Wan, and Jianping Wu, in
Proceedings of IEEE Symposium on Security and Privacy 2014.
"
Comprehensive Virtual Appliance Detection
"
Kang Li, and Xiaoning Li, presentation at Blackhat Asia, March 2014.
"
Arms Race: The Story of (In)-Secure Bootloaders
"
Lee Harrison, and Kang Li, presentation at Shmoocon, Jan 2014.
"
unROP: A Tool for In-Memory ROP Exploitation Detection and Traceback
"
Kang Li, Xiaoning Li and Lee Harrison, presentation at Shmoocon, Jan 2014.
"Measuring and Detecting Malware Downloads in Live Network Traffic
"
Phani Vadrevu, Babak Rahbarinia, Roberto Perdisci, Kang Li, and Manos Antonakakis, in proceedings of ESORICS 2013, September, 2013.
"
Detecting Vulnerabilities in Virtual Devices Using Conformance Testing
"
Kang Li, and Michael Contreras, presentation at Blackhat USA, August 2013.
"
PeerRush: Mining the Unwanted P2P Traffic"
Babak Rahbarinia, Roberto Perdisci, Andrea Lanzi, and Kang Li, in proceedings of 10th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2013), July, 2013. Best Paper Award of DIMVA 2013.
"
Ghost Domain Names: Revoked Yet Still Resolvable
"
Jian Jiang, Jinjin Liang, Kang Li, Jun Li, Haixin Duan and Jianping Wu, in Proceedings of
NDSS 2012.
"
Measuring the Lifecycles of Malicious Domains
"
Kevin Warrick, Roberto Perdisci, and Kang Li, in the Poster Session of IEEE Symposium on Security and Privacy 2012.
"
Hold-On: Protecting against DNS Packet Injection
"
Haixin Duan, Nicholas Weaver, Zongxu Zhao, Meng Hu, Jian Jiang, Jinjin Liang, Kang Li and Vern Paxson, in proceedings of the workshop of Securing and Trusting Internet Names (SATIN 2012), March, 2012.
"
Modeling Unintended Personal Information Leakage from Multiple Online Social Networks. "
Danesh Irani, Steve Webb, Kang Li and Calton Pu,
In IEEE Internet Computing special issue on Security and Privacy in Social Networks. 2011.
"
Speed up Statistical Spam Filters by Approximation
"
Zhenyu Zhong and Kang Li, in IEEE Transactions on Computers, Vol. 60, No. 1, pp. 120-134, January 2011.
" A Link Obfuscation Service to Detect Webbots " Douglas Brewer, Kang Li, Laksmish Ramaswamy, and Calton Pu, in proceedings of the 2010 IEEE International Conference on Services Computing, pp. 433-440, July 2010.
"
Large Online Social Footprints - An Emerging Threat
"
Danesh Irani, Steve Webb, Kang Li and Calton Pu,
in SecureCom 2009.
"
Privacy-Aware Collaborative Spam Filtering
"
Kang Li, Zhenyu Zhong, and Lakshmish Ramaswamy,
in IEEE Transactions on Parallel and Distributed systems, Vol. 20, No.5, May 2009
"
A Study of URL Redirection Indicating Spam
"
Krishna Vangapandu, Douglas Brewer and Kang Li,
in CEAS 2009.
"
ALPACAS: A Large-scale Privacy-Aware Collaborative Anti-spam System
"
Zhenyu Zhong, Lakshmish Ramaswamy, and Kang Li,
in IEEE Infocom 2008, Phoenix, AZ
"
Fast Statistical Spam Filter by Approximate Classifications
"
Kang Li, Zhenyu Zhong,
in Proc. of ACM SIGMETRICS 2006/IFIP Performance 2006, St. Malo, France, June 2006.
"
Client-Centered, Energy-Efficient Wireless Communication on IEEE 802.11b Network
"
Haijin Yan, David Lowenthal, Kang Li, Rupa Krishnan, and Larry Peterson.
in IEEE Transaction on Mobile Computing, vol 5, No 11, November 2006.
"
Throttling Outgoing SPAM for Webmail Services.
"
Zhenyu Zhong, Kun Huang, and Kang Li. In the second Conference on Emai
l and Anti-Spam (CEAS 2005), Mountain View, CA.
"
ACE: An Active, Client-Directed Technique for Reducing WNIC Energy During Web Browsing."
Haijin Yan, David Lowenthal, and Kang Li. In Nossdav 2005, Skamania, Washington.
"
TCP-RC: A Receiver-Centered TCP Protocol for Delay-Sensitive Applications."
Doug McCreary, Kang Li, Scott A. Watterson, and David K. Lowenthal. In the ACM/SPIE
Multimedia Computing and Networking Conference (MMCN 2005), San Jose, CA.
"
New Methods for Passive Estimation of RTT Using TCP Timestamps.
"
Bryan Veal, Kang Li, and David K. Lowenthal. In the 6th
Workshop on Passive and Active Measurement
(PAM 2005), Boston, MA.
"
Resisting SPAM Delivery by TCP Damping"
Kang Li, Calton Pu, and Mustaque Ahamad. In the first Conference on Email and Anti-Spam
(CEAS 2004), Mountain View, CA.
"
Shall We Stop All Unsolicited Emails"
Rui Dai, and Kang Li. In the first Conference on Email and Anti-Spam (CEAS 2004), Mountain View, CA.
"
Analysis of State Exposure Control to Prevent Cheating in Online Games
"
Kang Li, Shanshan Ding, Doug McCreary, and Steve Webb. In ACM Nossdav 2004, Kinsale, County Cork, Ireland.
"
Client-Centered Energy*Delay Reduction for TCP Downloads
"
Haijin Yan, Rupa Krishnan, Scott A. Watterson, David K. Lowenthal,
Kang Li, and Larry L. Peterson.
In IWQoS 2004, Montreal, Canada.
"
Efficient Packet Classification with Digest Caches"
Francis Chang,
Wu-chang Feng, Wu-chi Feng, and Kang Li. In proceedings of Workshop on Network
Processors and Application (NP3), Madrid, Spain.
"Architecture for Packet Classification Caching"
Kang Li, Francis Chang, Damien Burger, and Wu-chang Feng.
In proceedings of IEEE ICON 2003, Sydney Australia.
"Approximate Caches for Packet Classification"
Francis Chang, Kang Li, and Wu-chang Feng. In proceedings of IEEE Infocom 2004, Hongkong.