Follow
Lin-Shung Huang
Lin-Shung Huang
Security Engineer, Facebook
Verified email at fb.com - Homepage
Title
Cited by
Cited by
Year
Clickjacking: attacks and defenses
LS Huang, A Moshchuk, HJ Wang, S Schechter, C Jackson
Proceedings of the 21st USENIX Security Symposium, 2012
2042012
Analyzing Forged SSL Certificates in the Wild
LS Huang, A Rice, E Ellingsen, C Jackson
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 83-97, 2014
1912014
Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure
THJ Kim, LS Huang, A Perrig, C Jackson, V Gligor
Proceedings of the 22nd international conference on World Wide Web, 679-690, 2013
1682013
Towards Short-Lived Certificates
E Topalovic, B Saeta, LS Huang, C Jackson, D Boneh
Web 2.0 Security and Privacy, 2012
742012
Protecting browsers from cross-origin CSS attacks
LS Huang, Z Weinberg, C Evans, C Jackson
Proceedings of the 17th ACM conference on Computer and Communications …, 2010
622010
The case for prefetching and prevalidating TLS server certificates
E Stark, LS Huang, D Israni, C Jackson, D Boneh
Proceedings of the 19th Network and Distributed System Security Symposium, 2012
542012
An Experimental Study of TLS Forward Secrecy Deployments
LS Huang, S Adhikarla, D Boneh, C Jackson
Web 2.0 Security and Privacy, 2014
512014
Talking to yourself for fun and profit
LS Huang, EY Chen, A Barth, E Rescorla, C Jackson
Web 2.0 Security and Privacy, 2011
40*2011
Clickjacking attacks unresolved
LS Huang, C Jackson
Technical Report, 2011
232011
All Your Screens are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API
Y Tian, YC Liu, A Bhosale, LS Huang, P Tague, C Jackson
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 34-48, 2014
172014
A rate-distortion optimization model for SVC inter-layer encoding and bitstream extraction
WH Peng, JK Zao, HT Huang, TW Wang, LS Huang
Journal of Visual Communication and Image Representation 19 (8), 543-557, 2008
162008
Rate-distortion optimized SVC bitstream extraction for heterogeneous devices: A preliminary investigation
WH Peng, LS Huang, JK Zao, JS Lu, TW Wang, HT Huang, LC Kuo
Ninth IEEE International Symposium on Multimedia Workshops (ISMW 2007), 407-412, 2007
112007
Trickle: resilient real-time video multicasting for dynamic peers with limited or asymmetric network connectivity
YH Guo, JK Zao, WH Peng, LS Huang, FP Kuo, CM Lin
Eighth IEEE International Symposium on Multimedia (ISM'06), 391-398, 2006
112006
Transparent Key Integrity (TKI): A Proposal for a Public-Key Validation Infrastructure
THJ Kim, LS Huang, A Perrig, C Jackson, VD Gligor
Technical Report, 2012
82012
Transparent proxies: Threat or menace
LS Huang, EY Chen, A Barth, E Rescorla, C Jackson
Technical Report, 2010
6*2010
Darwin: a ground truth agnostic CAPTCHA generator using evolutionary algorithm
EY Chen, LS Huang, OJ Mengshoel, JD Lohn
Proceedings of the Companion Publication of the 2014 Annual Conference on …, 2014
42014
User Interface Security Directives for Content Security Policy. W3C Working Draft, W3C, March 2014. Work in progress
G Maone, DLS Huang, T Gondrom, B Hill
4*
Techniques for ranking character searches
KY Tseng, LS Huang, YH Chiang, CY Chen
US Patent 9,195,716, 2015
32015
Techniques for ranking character searches
KY Tseng, LS Huang, YH Chiang, CY Chen
US Patent 9,830,362, 2017
2017
Protecting Browsers from Network Intermediaries
LS Huang
Carnegie Mellon University, 2014
2014
The system can't perform the operation now. Try again later.
Articles 1–20