Conference Publications

I Can SE Clearly Now: Investigating the Effectiveness of GUI-based Symbolic Execution for Software Vulnerability Discovery
Yi Jou Li, Zeming Yu, James A Mattei, Ananta Soneji, Zhibo Sun, Ruoyu "Fish" Wang, Jaron Mink, Daniel Votipka, Tiffany Bao
CHI 2026 PDF
Easy As Child's Play: An Empirical Study on Age Verification of Adult-Oriented Android Apps
Yifan Yao, Shawn McCollum, Zhibo Sun, Yue Zhang
USENIX Security 2025 PDF BibTeX
From Victims to Defenders: An Exploration of the Phishing Attack Reporting Ecosystem
Zhibo Sun, Faris Bugra Kokulu, Penghui Zhang, Adam Oest, Gianluca Stringhini, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn
RAID 2024 PDF BibTeX
Nothing Personal: Understanding the Theft, Spread, and Use of Personally Identifiable Information in the Financial Ecosystem
Mehrnoosh Zaeifi, Faezeh Kalantari, Adam Oest, Zhibo Sun, Gail-Joon Ahn, Yan Shoshitaishvili, Tiffany Bao, Ruoyu Wang, Adam Doupé
CODASPY 2024 PDF BibTeX
I'm Spartacus, No, I'm Spartacus: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior
Penghui Zhang, Zhibo Sun, Sukwha Kyung, Hans Behrens, Zion Leonahenahe Basque, Haehyun Cho, Adam Oest, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Gail-Joon Ahn, and Adam Doupé
CCS 2022 PDF BibTeX
Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service
Zhibo Sun, Adam Oest, Penghui Zhang, Carlos Rubio-Medrano, Tiffany Bao, Ruoyu Wang, Ziming Zhao, Yan Shoshitaishvili, Adam Doupé, and Gail-Joon Ahn
USENIX Security 2021 PDF BibTeX
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing
Penghui Zhang, Adam Oest, Haehyun Cho, Zhibo Sun, RC Johnson, Brad Wardman, Shaown Sarker, Alexandros Kapravelos, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, and Gail-Joon Ahn
Oakland 2021 Best Student Paper PDF BibTeX
Scam Pandemic: How Attackers Exploit Public Fear through Phishing
Marzieh Bitaab, Haehyun Cho, Adam Oest, Penghui Zhang, Zhibo Sun, Rana Pourmohamad, Doowon Kim, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, and Gail-Joon Ahn
eCrime 2020 PDF BibTeX
Understanding and Detecting Private Interactions in Underground Forums
Zhibo Sun, Carlos E. Rubio-Medrano, Ziming Zhao, Tiffany Bao, Adam Doupé, and Gail-Joon Ahn
CODASPY 2019 PDF BibTeX
Towards Automated Threat Intelligence Fusion
Ajay Modi, Zhibo Sun, Anupam Panwar, Tejas Khairnar, Ziming Zhao, Adam Doupé, Gail-Joon Ahn, and Paul Black
CIC 2016 PDF BibTeX
Migrating GIS Big Data Computing from Hadoop to Spark: An Exemplary Study Using Twitter
Zhibo Sun, Hong Zhang, Zixia Liu, Chen Xu, and Liqiang Wang
IEEE Cloud 2016 PDF BibTeX
DART: A Geographic Information System on Hadoop
Hong Zhang, Zhibo Sun, Zixia Liu, Chen Xu, and Liqiang Wang
IEEE Cloud 2015 PDF BibTeX
Effects on Performance of Analytical Tools for Visually Demanding Tasks through Direct and Indirect Touch Interaction in an Immersive Visualization
Zhibo Sun, Ashish Dhital, Nattaya Areejitkasem, Neera Pradhan, and Amy Banic
ICVRV 2014 PDF BibTeX

Journal Publications

A Survey on Large Language Model (LLM) Security and Privacy: The Good, the Bad, and the Ugly
Yifan Yao, Jinhao Duan, Kaidi Xu, Yuanfang Cai, Zhibo Sun, Yue Zhang
HCCOM 2024 PDF BibTeX
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing
Penghui Zhang, Zhibo Sun, Sukwha Kyung, Hans Behrens, Zion Leonahenahe Basque, Haehyun Cho, Adam Oest, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Gail-Joon Ahn, and Adam Doupé
IEEE S&P Magazine 2022 BibTeX

© 2026 Zhibo (Eric) Sun. All rights reserved.