Hang Hu
Hang Hu
Verified email at vt.edu - Homepage
Title
Cited by
Cited by
Year
Needle in a haystack: Tracking down elite phishing domains in the wild
K Tian, STK Jan, H Hu, D Yao, G Wang
Proceedings of the Internet Measurement Conference 2018, 429-442, 2018
522018
The Next Domino to Fall: Empirical Analysis of User Passwords across Online Services
C Wang, STK Jan, H Hu, D Bossart, G Wang
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
422018
End-to-end measurements of email spoofing attacks
H Hu, G Wang
27th {USENIX} Security Symposium ({USENIX} Security 18), 1095-1112, 2018
372018
Understanding the reproducibility of crowd-reported security vulnerabilities
D Mu, A Cuevas, L Yang, H Hu, X Xing, B Mao, G Wang
27th {USENIX} Security Symposium ({USENIX} Security 18), 919-936, 2018
292018
What happens after you leak your password: Understanding credential sharing on phishing sites
P Peng, C Xu, L Quinn, H Hu, B Viswanath, G Wang
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
122019
Towards understanding the adoption of anti-spoofing protocols in email systems
H Hu, P Peng, G Wang
2018 IEEE Cybersecurity Development (SecDev), 94-101, 2018
112018
Revisiting email spoofing attacks
H Hu, G Wang
arXiv preprint arXiv:1801.00853, 2018
102018
Empirical analysis of password reuse and modification across online service
C Wang, STK Jan, H Hu, G Wang
arXiv preprint arXiv:1706.01939, 2017
52017
Read between the lines: An empirical measurement of sensitive applications of voice personal assistant systems
FH Shezan, H Hu, J Wang, G Wang, Y Tian
Proceedings of The Web Conference 2020, 1006-1017, 2020
42020
Characterizing pixel tracking through the lens of disposable email services
H Hu, P Peng, G Wang
2019 IEEE Symposium on Security and Privacy (SP), 365-379, 2019
42019
Towards the adoption of anti-spoofing protocols
H Hu, P Peng, G Wang
arXiv preprint arXiv:1711.06654, 2017
32017
Security Vetting Process of Smart-home Assistant Applications: A First Look and Case Studies
H Hu, L Yang, S Lin, G Wang
arXiv preprint arXiv:2001.04520, 2020
22020
Characterizing and Detecting Online Deception via Data-Driven Methods
H Hu
Virginia Tech, 2020
12020
A case study of the security vetting process of smart-home assistant applications
H Hu, L Yang, S Lin, G Wang
2020 IEEE Security and Privacy Workshops (SPW), 76-81, 2020
12020
VerHealth: Vetting Medical Voice Applications through Policy Enforcement
FH Shezan, H Hu, G Wang, Y Tian
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2020
2020
Towards the Adoption of Anti-spoofing Protocols for Email Systems
H Hu, P Peng, G Wang
arXiv preprint arXiv:1711.06654, 2017
2017
Assessing Browser-level Defense against IDN-based Phishing
H Hu, STK Jan, Y Wang, G Wang
The system can't perform the operation now. Try again later.
Articles 1–17