2024 2024 ISSTA 24 DeFort: Automatic Detection and Analysis of Price Manipulation Attacks in DeFi Applications Maoyi Xie, Ming Hu, Ziqiao Kong, Cen Zhang, Yebo Feng, Haijun Wang, Yue Xue, Hao Zhang, Ye Liu, and Yang Liu In Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), Sep 2024 Bib @inproceedings{xie2024defort, author = {Xie, Maoyi and Hu, Ming and Kong, Ziqiao and Zhang, Cen and Feng, Yebo and Wang, Haijun and Xue, Yue and Zhang, Hao and Liu, Ye and Liu, Yang}, booktitle = {Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA)}, title = {DeFort: Automatic Detection and Analysis of Price Manipulation Attacks in DeFi Applications}, month = sep, year = {2024} } ASIACCS 24 SecPLF: Secure Protocols for Loanable Funds against Oracle Manipulation Attacks Sanidhay Arora, Yingjiu Li, Yebo Feng, and Jiahua Xu In Proceedings of the 19th ACM Asia Conference on Computer and Communications Security (ASIACCS 2024), Jul 2024 Bib @inproceedings{arora2024secplf, author = {Arora, Sanidhay and Li, Yingjiu and Feng, Yebo and Xu, Jiahua}, booktitle = {Proceedings of the 19th ACM Asia Conference on Computer and Communications Security (ASIACCS 2024)}, title = {SecPLF: Secure Protocols for Loanable Funds against Oracle Manipulation Attacks}, month = jul, year = {2024} } arXiv Teaching Code LLMs to Use Autocompletion Tools in Repository-Level Code Generation Chong Wang, Jian Zhang, Yebo Feng, Tianlin Li, Weisong Sun, Yang Liu, and Xin Peng Jan 2024 Bib HTML PDF @misc{wang2024teaching, doi = {10.48550/arXiv.2401.06391}, url = {https://arxiv.org/abs/2401.06391}, title = {Teaching Code LLMs to Use Autocompletion Tools in Repository-Level Code Generation}, author = {Wang, Chong and Zhang, Jian and Feng, Yebo and Li, Tianlin and Sun, Weisong and Liu, Yang and Peng, Xin}, year = {2024}, month = jan, eprint = {2401.06391}, archiveprefix = {arXiv}, primaryclass = {cs.SE} } 2023 2023 arXiv Automated Market Maker on the XRP Ledger Firas Dahi, Walter Hernandez, Yebo Feng, Jiahua Xu, Aanchal Malhotra, and Paolo Tasca Dec 2023 Bib HTML PDF @misc{dahi2023automated, doi = {10.48550/arXiv.2312.13749}, url = {https://arxiv.org/abs/2312.13749}, title = {Automated Market Maker on the XRP Ledger}, author = {Dahi, Firas and Hernandez, Walter and Feng, Yebo and Xu, Jiahua and Malhotra, Aanchal and Tasca, Paolo}, year = {2023}, month = dec, eprint = {2312.13749}, archiveprefix = {arXiv}, primaryclass = {cs.CE} } SCIS CToMP: A Cycle-task-oriented Memory Protection Scheme for Unmanned Systems Chengyan Ma, Ning Xi, Di Lu, Yebo Feng, and Jianfeng Ma SCIENCE CHINA Information Sciences (SCIS), Dec 2023 Bib HTML PDF @article{ma2023ctomp, title = {CToMP: A Cycle-task-oriented Memory Protection Scheme for Unmanned Systems}, author = {Ma, Chengyan and Xi, Ning and Lu, Di and Feng, Yebo and Ma, Jianfeng}, journal = {SCIENCE CHINA Information Sciences (SCIS)}, year = {2023}, doi = {10.1007/s11432-023-3865-0} } CNS 23 Toward Adaptive DDoS-Filtering Rule Generation Jun Li, Devkishen Sisodia, Yebo Feng, Lumin Shi, Mingwei Zhang, Christopher Early, and Peter Reiher In 2023 IEEE Conference on Communications and Network Security (CNS), Oct 2023 Bib HTML PDF @inproceedings{li2023drawbridge, author = {Li, Jun and Sisodia, Devkishen and Feng, Yebo and Shi, Lumin and Zhang, Mingwei and Early, Christopher and Reiher, Peter}, booktitle = {2023 IEEE Conference on Communications and Network Security (CNS)}, title = {Toward Adaptive DDoS-Filtering Rule Generation}, month = oct, year = {2023}, volume = {}, number = {}, pages = {1-9}, doi = {10.1109/CNS59707.2023.10288699} } TDSC On Explainable and Adaptable Detection of Distributed Denial-of-Service Traffic Yebo Feng, Jun Li, Devkishen Sisodia, and Peter Reiher IEEE Transactions on Dependable and Secure Computing (TDSC), Oct 2023 Bib HTML PDF @article{feng2023ddosdetection, author = {Feng, Yebo and Li, Jun and Sisodia, Devkishen and Reiher, Peter}, journal = {IEEE Transactions on Dependable and Secure Computing (TDSC)}, title = {On Explainable and Adaptable Detection of Distributed Denial-of-Service Traffic}, pages = {1-16}, year = {2023}, doi = {10.1109/TDSC.2023.3301293} } arXiv SoK: Design, Vulnerabilities, and Security Measures of Cryptocurrency Wallets Yimika Erinle, Yathin Kethepalli, Yebo Feng, and Jiahua Xu Aug 2023 Bib HTML PDF @misc{erinle2023sok, doi = {10.48550/arXiv.2307.12874}, url = {https://arxiv.org/abs/2307.12874}, title = {SoK: Design, Vulnerabilities, and Security Measures of Cryptocurrency Wallets}, author = {Erinle, Yimika and Kethepalli, Yathin and Feng, Yebo and Xu, Jiahua}, year = {2023}, month = aug, publisher = {arXiv}, eprint = {2307.12874} } PhD Dissertation Fine-Grained, Content-Agnostic Network Traffic Analysis for Malicious Activity Detection Yebo Feng University of Oregon, Jun 2023 PhD Dissertation Bib HTML PDF @phdthesis{feng2023fine, title = {Fine-Grained, Content-Agnostic Network Traffic Analysis for Malicious Activity Detection}, author = {Feng, Yebo}, year = {2023}, month = jun, school = {University of Oregon}, note = {PhD Dissertation} } RG Preprints Unmasking the Internet: A Survey of Fine-Grained Network Traffic Analysis Yebo Feng, Jun Li, and Jelena Mirkovic Mar 2023 Bib HTML PDF @misc{feng2023fgta, doi = {10.13140/RG.2.2.36632.88325}, url = {http://dx.doi.org/10.13140/RG.2.2.36632.88325}, author = {Feng, Yebo and Li, Jun and Mirkovic, Jelena}, title = {Unmasking the Internet: A Survey of Fine-Grained Network Traffic Analysis}, publisher = {ResearchGate Preprints}, month = mar, year = {2023} } TNSM Reap the Harvest on Blockchain: A Survey of Yield Farming Protocols Jiahua Xu, and Yebo Feng IEEE Transactions on Network and Service Management, Mar 2023 Bib HTML PDF @article{yield2022xu, author = {Xu, Jiahua and Feng, Yebo}, journal = {IEEE Transactions on Network and Service Management}, title = {Reap the Harvest on Blockchain: A Survey of Yield Farming Protocols}, year = {2023}, volume = {20}, number = {1}, pages = {858-869}, doi = {10.1109/TNSM.2022.3222815} } CSUR SoK: Decentralized Exchanges (DEX) with Automated Market Maker (AMM) Protocols Jiahua Xu, Krzysztof Paruch, Simon Cousaert, and Yebo Feng ACM Computing Surveys, Feb 2023 Bib HTML PDF @article{xu2023ammsok, author = {Xu, Jiahua and Paruch, Krzysztof and Cousaert, Simon and Feng, Yebo}, title = {SoK: Decentralized Exchanges (DEX) with Automated Market Maker (AMM) Protocols}, year = {2023}, issue_date = {November 2023}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, volume = {55}, number = {11}, issn = {0360-0300}, url = {https://doi.org/10.1145/3570639}, doi = {10.1145/3570639}, journal = {ACM Computing Surveys}, month = feb, articleno = {238}, numpages = {50} } arXiv Auto.gov: Learning-based On-chain Governance for Decentralized Finance (DeFi) Jiahua Xu, Daniel Perez, Yebo Feng, and Benjamin Livshits Feb 2023 Bib HTML PDF @misc{xu2023autogov, doi = {10.48550/ARXIV.2302.09551}, url = {https://arxiv.org/abs/2302.09551}, author = {Xu, Jiahua and Perez, Daniel and Feng, Yebo and Livshits, Benjamin}, title = {Auto.gov: Learning-based On-chain Governance for Decentralized Finance (DeFi)}, publisher = {arXiv}, month = feb, year = {2023}, copyright = {arXiv.org perpetual, non-exclusive license} } 2022 2022 RAID 22 CJ-Sniffer: Measurement and Content-Agnostic Detection of Cryptojacking Traffic Yebo Feng, Jun Li, and Devkishen Sisodia In Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Oct 2022 Bib HTML PDF @inproceedings{10.1145/3545948.3545973, author = {Feng, Yebo and Li, Jun and Sisodia, Devkishen}, title = {CJ-Sniffer: Measurement and Content-Agnostic Detection of Cryptojacking Traffic}, year = {2022}, isbn = {9781450397049}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, url = {https://doi.org/10.1145/3545948.3545973}, doi = {10.1145/3545948.3545973}, booktitle = {Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)}, pages = {482–494}, numpages = {13}, keywords = {anomaly detection, cryptocurrency, cryptojacking, cryptomining, network traffic analysis}, location = {Limassol, Cyprus}, series = {RAID '22}, month = oct } GLOBECOM 22 I Can Still Observe You: Flow-level Behavior Fingerprinting for Online Social Network Yebo Feng, Jianzhen Luo, Chengyan Ma, Teng Li, and Liang Hui In 2022 IEEE Global Communications Conference, Dec 2022 Bib HTML PDF @inproceedings{feng2022osnfp, author = {Feng, Yebo and Luo, Jianzhen and Ma, Chengyan and Li, Teng and Hui, Liang}, booktitle = {2022 IEEE Global Communications Conference}, title = {I Can Still Observe You: Flow-level Behavior Fingerprinting for Online Social Network}, year = {2022}, month = dec, volume = {}, number = {}, pages = {6427-6432}, doi = {10.1109/GLOBECOM48099.2022.10001510} } Potentials University Blockchain Research Initiative (UBRI): Boosting blockchain education and research Yebo Feng, Jiahua Xu, and Lauren Weymouth IEEE Potentials, Dec 2022 Bib HTML PDF @article{feng2022ubri, author = {Feng, Yebo and Xu, Jiahua and Weymouth, Lauren}, journal = {IEEE Potentials}, title = {University Blockchain Research Initiative (UBRI): Boosting blockchain education and research}, year = {2022}, volume = {41}, number = {6}, pages = {19-25}, doi = {10.1109/MPOT.2022.3198929} } JSAC CoAvoid: Secure, Privacy-Preserved Tracing of Contacts for Infectious Diseases Teng Li, Siwei Yin, Runze Yu, Yebo Feng, Lei Jiao, Yulong Shen, and Jianfeng Ma IEEE Journal on Selected Areas in Communications, Dec 2022 Bib HTML PDF @article{9908579, author = {Li, Teng and Yin, Siwei and Yu, Runze and Feng, Yebo and Jiao, Lei and Shen, Yulong and Ma, Jianfeng}, journal = {IEEE Journal on Selected Areas in Communications}, title = {{CoAvoid}: Secure, Privacy-Preserved Tracing of Contacts for Infectious Diseases}, year = {2022}, volume = {40}, number = {11}, pages = {3191-3206}, doi = {10.1109/JSAC.2022.3211547} } arXiv Measuring Changes in Regional Network Traffic Due to COVID-19 Stay-at-Home Measures Jelena Mirkovic, Yebo Feng, and Jun Li Mar 2022 Bib HTML PDF @misc{mirkovic2022measuring, doi = {10.48550/ARXIV.2203.00742}, url = {https://arxiv.org/abs/2203.00742}, author = {Mirkovic, Jelena and Feng, Yebo and Li, Jun}, keywords = {Networking and Internet Architecture (cs.NI), Computers and Society (cs.CY), FOS: Computer and information sciences, FOS: Computer and information sciences}, title = {Measuring Changes in Regional Network Traffic Due to COVID-19 Stay-at-Home Measures}, publisher = {arXiv}, year = {2022}, month = mar, copyright = {arXiv.org perpetual, non-exclusive license} } UO CS Report Toward Finer Granularity Analysis of Network Traffic Yebo Feng Mar 2022 Available at \urlhttps://www.cs.uoregon.edu/Reports/AREA-202203-Feng.pdf Bib HTML PDF @techreport{AREA-202203-Feng, type = {Area Exam}, author = {Feng, Yebo}, title = {Toward Finer Granularity Analysis of Network Traffic}, school = {College of Arts and Sciences, University of Oregon}, month = mar, year = {2022}, note = {Available at \url{https://www.cs.uoregon.edu/Reports/AREA-202203-Feng.pdf}} } 2021 2021 TDSC Towards Learning-Based, Content-Agnostic Detection of Social Bot Traffic Yebo Feng, Jun Li, Lei Jiao, and Xintao Wu IEEE Transactions on Dependable and Secure Computing (TDSC), Mar 2021 Bib HTML PDF @article{feng2021botflowmon, author = {Feng, Yebo and Li, Jun and Jiao, Lei and Wu, Xintao}, journal = {IEEE Transactions on Dependable and Secure Computing (TDSC)}, title = {Towards Learning-Based, Content-Agnostic Detection of Social Bot Traffic}, year = {2021}, volume = {18}, number = {5}, pages = {2149-2163}, doi = {10.1109/TDSC.2020.3047399} } 2020 2020 IWQoS 20 Application-Layer DDoS Defense with Reinforcement Learning Yebo Feng, Jun Li, and Thanh Nguyen In 2020 IEEE/ACM 28th International Symposium on Quality of Service (IWQoS), Jun 2020 Bib HTML PDF @inproceedings{feng2020appddos, author = {Feng, Yebo and Li, Jun and Nguyen, Thanh}, booktitle = {2020 IEEE/ACM 28th International Symposium on Quality of Service (IWQoS)}, title = {Application-Layer {DDoS} Defense with Reinforcement Learning}, year = {2020}, pages = {1-10}, doi = {10.1109/IWQoS49365.2020.9213026}, issn = {1548-615X}, month = jun, keywords = {application-layer DDoS;distributed denial of service (DDoS);reinforcement learning;anomaly detection} } KDD MLHat 20 Toward Explainable and Adaptable Detection and Classification of Distributed Denial-of-Service Attacks Yebo Feng, and Jun Li In 2020 KDD MLHat: The First International Workshop on Deployable Machine Learning for Security Defense, Jun 2020 Bib HTML PDF @inproceedings{10.1007/978-3-030-59621-7_6, author = {Feng, Yebo and Li, Jun}, title = {Toward Explainable and Adaptable Detection and Classification of Distributed Denial-of-Service Attacks}, booktitle = {2020 KDD MLHat: The First International Workshop on Deployable Machine Learning for Security Defense}, year = {2020}, publisher = {Springer International Publishing}, address = {Cham}, pages = {105--121}, isbn = {978-3-030-59621-7} } ASIACCS 20 POSTER: Content-Agnostic Identification of Cryptojacking in Network Traffic Yebo Feng, Devkishen Sisodia, and Jun Li In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIACCS 2020) - poster paper, Jun 2020 Bib HTML PDF @inproceedings{feng2020crypto, author = {Feng, Yebo and Sisodia, Devkishen and Li, Jun}, title = {POSTER: Content-Agnostic Identification of Cryptojacking in Network Traffic}, year = {2020}, isbn = {9781450367509}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, url = {https://doi.org/10.1145/3320269.3405440}, doi = {10.1145/3320269.3405440}, booktitle = {Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIACCS 2020) - poster paper}, pages = {907–909}, numpages = {3}, keywords = {anomaly detection, network traffic classification, cryptojacking}, location = {Taipei, Taiwan}, series = {ASIA CCS '20} } PAM 20 Towards Explicable and Adaptive DDoS Traffic Classification Yebo Feng, and Jun Li The 21st Passive and Active Measurement Conference (PAM) - poster paper, Mar 2020 Bib HTML PDF @article{feng2020pam, author = {Feng, Yebo and Li, Jun}, title = {Towards Explicable and Adaptive {DDoS} Traffic Classification}, journal = {The 21st Passive and Active Measurement Conference (PAM) - poster paper}, year = {2020}, month = mar } 2019 2019 UO CS Report Towards Intelligent Defense against Application-Layer DDoS with Reinforcement Learning Yebo Feng Dec 2019 Directed Research Project Bib HTML PDF @misc{DRP-201912-Feng, author = {Feng, Yebo}, title = {Towards Intelligent Defense against Application-Layer {DDoS} with Reinforcement Learning}, note = {Directed Research Project}, publisher = {University of Oregon, Computer and Information Sciences Department}, address = {Eugene OR}, month = dec, year = {2019}, howpublished = {Available at \url{http://www.cs.uoregon.edu/Reports/DRP-201912-Feng.pdf} (2020/02/25)} } CNS 19 BestPaper BotFlowMon: Learning-based, Content-Agnostic Identification of Social Bot Traffic Flows Yebo Feng, Jun Li, Lei Jiao, and Xintao Wu In 2019 IEEE Conference on Communications and Network Security (CNS), Jun 2019 Bib HTML PDF @inproceedings{feng2019botflowmon, author = {Feng, Yebo and Li, Jun and Jiao, Lei and Wu, Xintao}, booktitle = {2019 IEEE Conference on Communications and Network Security (CNS)}, title = {{BotFlowMon}: Learning-based, Content-Agnostic Identification of Social Bot Traffic Flows}, year = {2019}, pages = {169-177}, keywords = {online social network (OSN);OSN security;social bot;NetFlow data;OSN bot traffic;machine learning}, doi = {10.1109/CNS.2019.8802706}, month = jun } 2018 2018 Master Thesis BotFlowMon: Identify Social Bot Traffic With NetFlow and Machine Learning Yebo Feng Jun 2018 Bib HTML PDF @article{feng2018botflowmon, title = {{BotFlowMon}: Identify Social Bot Traffic With {NetFlow} and Machine Learning}, author = {Feng, Yebo}, year = {2018}, month = jun, publisher = {University of Oregon}, url = {http://hdl.handle.net/1794/23799} }