Z
Zhou Li
Researcher at University of California, Irvine
Publications - 103
Citations - 2649
Zhou Li is an academic researcher from University of California, Irvine. The author has contributed to research in topics: Computer science & Android (operating system). The author has an hindex of 22, co-authored 78 publications receiving 1868 citations. Previous affiliations of Zhou Li include Baidu & EMC Corporation.
Papers
More filters
Proceedings ArticleDOI
Knowing your enemy: understanding and detecting malicious web advertising
TL;DR: A large-scale study through analyzing ad-related Web traces crawled over a three-month period reveals the rampancy of malvertising: hundreds of top ranking Web sites fell victims and leading ad networks such as DoubleClick were infiltrated.
Proceedings ArticleDOI
Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence
TL;DR: By correlating the IOCs mined from the articles published over a 13-year span, this study sheds new light on the links across hundreds of seemingly unrelated attack instances, particularly their shared infrastructure resources, as well as the impacts of such open-source threat intelligence on security protection and evolution of attack strategies.
Proceedings ArticleDOI
When Good Becomes Evil: Keystroke Inference with Smartwatch
TL;DR: A new and practical side-channel attack to infer user inputs on keyboards by exploiting sensors in smartwatch is presented and a significant accuracy improvement is achieved compared to the previous works, especially of the success rate of finding the correct word in the top 10 candidates.
Proceedings ArticleDOI
Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data
TL;DR: This work proposes a new framework based on belief propagation inspired from graph theory that achieves high accuracy on two months of DNS logs released by Los Alamos National Lab (LANL), which include APT infection attacks simulated by LANL domain experts.
Proceedings ArticleDOI
Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures
TL;DR: This study reveals the existence of a set of topologically dedicated malicious hosts that play orchestrating roles in malicious activities and develops a graph-based approach that relies on a small set of known malicious hosts as seeds to detect dedicate malicious hosts in a large scale.