default search action
Dongyan Xu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c146]Hyungsub Kim, Rwitam Bandyopadhyay, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Yongdae Kim, Dongyan Xu:
A Systematic Study of Physical Sensor Attack Hardness. SP 2024: 2328-2347 - [c145]Jianliang Wu, Ruoyu Wu, Dongyan Xu, Dave Jing Tian, Antonio Bianchi:
SoK: The Long Journey of Exploiting and Defending the Legacy of King Harald Bluetooth. SP 2024: 2847-228066 - [c144]Syed Ghazanfar Abbas, Muslum Ozgur Ozmen, Abdulellah Alsaheel, Arslan Khan, Z. Berkay Celik, Dongyan Xu:
SAIN: Improving ICS Attack Detection Sensitivity via State-Aware Invariants. USENIX Security Symposium 2024 - [c143]Jianliang Wu, Patrick Traynor, Dongyan Xu, Dave (Jing) Tian, Antonio Bianchi:
Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations. USENIX Security Symposium 2024 - [c142]Jaewoo Shin, Lan Zhao, Carol X. Song, Dikai Xu, Ming Qu, Ananth Grama, Dongyan Xu:
Integrating ML/AI workflows in a Streaming Data Management and Processing Platform for Building Energy Research. PEARC 2024: 54:1-54:5 - 2023
- [c141]Arslan Khan, Muqi Zou, Kyungtae Kim, Dongyan Xu, Antonio Bianchi, Dave Jing Tian:
Fuzzing SGX Enclaves via Host Program Mutations. EuroS&P 2023: 472-488 - [c140]Arslan Khan, Dongyan Xu, Dave Jing Tian:
EC: Embedded Systems Compartmentalization via Intra-Kernel Isolation. SP 2023: 2990-3007 - [c139]Arslan Khan, Dongyan Xu, Dave Jing Tian:
Low-Cost Privilege Separation with Compile Time Compartmentalization for Embedded Systems. SP 2023: 3008-3025 - [c138]Hyungsub Kim, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Dongyan Xu:
PatchVerif: Discovering Faulty Patches in Robotic Vehicles. USENIX Security Symposium 2023: 3011-3028 - [c137]Khaled Serag, Rohit Bhatia, Akram Faqih, Muslum Ozgur Ozmen, Vireshwar Kumar, Z. Berkay Celik, Dongyan Xu:
ZBCAN: A Zero-Byte CAN Defense System. USENIX Security Symposium 2023: 6893-6910 - 2022
- [j35]Howard D. Grimes, Gabriela F. Ciocarlie, Bo Yu, Duminda Wijesekera, Gregory E. Shannon, Wayne Austad, Charles Fracchia, Dongyan Xu, Thomas R. Kurfess, Lisa Strama, Michael Mylrea, Bill Reid:
PURE Biomanufacturing: Secure, Pandemic-Adaptive Biomanufacturing. IEEE Secur. Priv. 20(6): 53-65 (2022) - [c136]Sungwoo Kim, Gisu Yeo, Taegyu Kim, Junghwan John Rhee, Yuseok Jeon, Antonio Bianchi, Dongyan Xu, Dave (Jing) Tian:
ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs. AsiaCCS 2022: 534-545 - [c135]Taegyu Kim, Aolin Ding, Sriharsha Etigowni, Pengfei Sun, Jizhou Chen, Luis Garcia, Saman A. Zonouz, Dongyan Xu, Dave (Jing) Tian:
Reverse engineering and retrofitting robotic aerial vehicle control firmware using dispatch. MobiSys 2022: 69-83 - [c134]Hyungsub Kim, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Dongyan Xu:
PGPatch: Policy-Guided Logic Bug Patching for Robotic Vehicles. SP 2022: 1826-1844 - [c133]Jianliang Wu, Ruoyu Wu, Dongyan Xu, Dave Jing Tian, Antonio Bianchi:
Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities. SP 2022: 2285-2303 - [c132]Ruoyu Wu, Taegyu Kim, Dave (Jing) Tian, Antonio Bianchi, Dongyan Xu:
DnD: A Cross-Architecture Deep Neural Network Decompiler. USENIX Security Symposium 2022: 2135-2152 - [c131]Fei Wang, Jianliang Wu, Yuhong Nan, Yousra Aafer, Xiangyu Zhang, Dongyan Xu, Mathias Payer:
ProFactory: Improving IoT Security via Formalized Protocol Customization. USENIX Security Symposium 2022: 3879-3896 - 2021
- [j34]Hassaan Irshad, Gabriela F. Ciocarlie, Ashish Gehani, Vinod Yegneswaran, Kyu Hyung Lee, Jignesh M. Patel, Somesh Jha, Yonghwi Kwon, Dongyan Xu, Xiangyu Zhang:
TRACE: Enterprise-Wide Provenance Tracking for Real-Time APT Detection. IEEE Trans. Inf. Forensics Secur. 16: 4363-4376 (2021) - [c130]Rohit Bhatia, Vireshwar Kumar, Khaled Serag, Z. Berkay Celik, Mathias Payer, Dongyan Xu:
Evading Voltage-Based Intrusion Detection on Automotive CAN. NDSS 2021 - [c129]Hyungsub Kim, Muslum Ozgur Ozmen, Antonio Bianchi, Z. Berkay Celik, Dongyan Xu:
PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles. NDSS 2021 - [c128]Yapeng Ye, Zhuo Zhang, Fei Wang, Xiangyu Zhang, Dongyan Xu:
NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces. NDSS 2021 - [c127]Le Yu, Shiqing Ma, Zhuo Zhang, Guanhong Tao, Xiangyu Zhang, Dongyan Xu, Vincent E. Urias, Han Wei Lin, Gabriela F. Ciocarlie, Vinod Yegneswaran, Ashish Gehani:
ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation. NDSS 2021 - [c126]Taegyu Kim, Vireshwar Kumar, Junghwan Rhee, Jizhou Chen, Kyungtae Kim, Chung Hwan Kim, Dongyan Xu, Dave (Jing) Tian:
PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications. USENIX Security Symposium 2021: 249-266 - [c125]Arslan Khan, Hyungsub Kim, Byoungyoung Lee, Dongyan Xu, Antonio Bianchi, Dave (Jing) Tian:
M2MON: Building an MMIO-based Security Reference Monitor for Unmanned Vehicles. USENIX Security Symposium 2021: 285-302 - [c124]Jianliang Wu, Ruoyu Wu, Daniele Antonioli, Mathias Payer, Nils Ole Tippenhauer, Dongyan Xu, Dave (Jing) Tian, Antonio Bianchi:
LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks. USENIX Security Symposium 2021: 339-356 - [c123]Muhammad Abubakar, Adil Ahmad, Pedro Fonseca, Dongyan Xu:
SHARD: Fine-Grained Kernel Specialization with Context-Aware Hardening. USENIX Security Symposium 2021: 2435-2452 - [c122]Abdulellah Alsaheel, Yuhong Nan, Shiqing Ma, Le Yu, Gregory Walkup, Z. Berkay Celik, Xiangyu Zhang, Dongyan Xu:
ATLAS: A Sequence-based Learning Approach for Attack Investigation. USENIX Security Symposium 2021: 3005-3022 - [c121]Khaled Serag, Rohit Bhatia, Vireshwar Kumar, Z. Berkay Celik, Dongyan Xu:
Exposing New Vulnerabilities of Error Handling Mechanism in CAN. USENIX Security Symposium 2021: 4241-4258 - 2020
- [j33]Sungjin Park, Chung Hwan Kim, Junghwan Rhee, Jong-Jin Won, Taisook Han, Dongyan Xu:
CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality. IEEE Trans. Dependable Secur. Comput. 17(4): 883-897 (2020) - [c120]Hongjun Choi, Sayali Kate, Yousra Aafer, Xiangyu Zhang, Dongyan Xu:
Cyber-Physical Inconsistency Vulnerability Identification for Safety Checks in Robotic Vehicles. CCS 2020: 263-278 - [c119]Gregory Walkup, Sriharsha Etigowni, Dongyan Xu, Vincent Urias, Han W. Lin:
Forensic Investigation of Industrial Control Systems Using Deterministic Replay. CNS 2020: 1-9 - [c118]Fan Fei, Zhan Tu, Dongyan Xu, Xinyan Deng:
Learn-to-Recover: Retrofitting UAVs with Reinforcement Learning-Assisted Flight Control Under Cyber-Physical Attacks. ICRA 2020: 7358-7364 - [c117]Hongjun Choi, Sayali Kate, Yousra Aafer, Xiangyu Zhang, Dongyan Xu:
Software-based Realtime Recovery from Sensor Attacks on Robotic Vehicles. RAID 2020: 349-364 - [c116]Jianliang Wu, Yuhong Nan, Vireshwar Kumar, Mathias Payer, Dongyan Xu:
BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks. RAID 2020: 397-411 - [c115]Sushant Dinesh, Nathan Burow, Dongyan Xu, Mathias Payer:
RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization. SP 2020: 1497-1511 - [c114]Taegyu Kim, Chung Hwan Kim, Altay Ozen, Fan Fei, Zhan Tu, Xiangyu Zhang, Xinyan Deng, Dave (Jing) Tian, Dongyan Xu:
From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAY. USENIX Security Symposium 2020: 913-930 - [c113]Jianliang Wu, Yuhong Nan, Vireshwar Kumar, Dave (Jing) Tian, Antonio Bianchi, Mathias Payer, Dongyan Xu:
BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy. WOOT @ USENIX Security Symposium 2020
2010 – 2019
- 2019
- [c112]Zhan Tu, Fan Fei, Matthew Eagon, Dongyan Xu, Xinyan Deng:
Flight Recovery of MAVs with Compromised IMU. IROS 2019: 3638-3644 - [c111]Taegyu Kim, Chung Hwan Kim, Junghwan Rhee, Fan Fei, Zhan Tu, Gregory Walkup, Xiangyu Zhang, Xinyan Deng, Dongyan Xu:
RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing. USENIX Security Symposium 2019: 425-442 - 2018
- [j32]Aisha I. Ali-Gombe, Brendan Saltaformaggio, J. Ramanujam, Dongyan Xu, Golden G. Richard III:
Toward a more dependable hybrid analysis of android malware using aspect-oriented programming. Comput. Secur. 73: 235-248 (2018) - [j31]Zhongshu Gu, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu:
Gemini: Guest-transparent honey files via hypervisor-level access redirection. Comput. Secur. 77: 737-744 (2018) - [c110]Fei Wang, Yonghwi Kwon, Shiqing Ma, Xiangyu Zhang, Dongyan Xu:
Lprov: Practical Library-aware Provenance Tracing. ACSAC 2018: 605-617 - [c109]Hongjun Choi, Wen-Chuan Lee, Yousra Aafer, Fan Fei, Zhan Tu, Xiangyu Zhang, Dongyan Xu, Xinyan Deng:
Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach. CCS 2018: 801-816 - [c108]Fan Fei, Zhan Tu, Ruikun Yu, Taegyu Kim, Xiangyu Zhang, Dongyan Xu, Xinyan Deng:
Cross-Layer Retrofitting of UAVs Against Cyber-Physical Attacks. ICRA 2018: 550-557 - [c107]Rohit Bhatia, Brendan Saltaformaggio, Seung Jei Yang, Aisha I. Ali-Gombe, Xiangyu Zhang, Dongyan Xu, Golden G. Richard III:
Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images. NDSS 2018 - [c106]Chung Hwan Kim, Taegyu Kim, Hongjun Choi, Zhongshu Gu, Byoungyoung Lee, Xiangyu Zhang, Dongyan Xu:
Securing Real-Time Microcontroller Systems through Customized Memory View Switching. NDSS 2018 - [c105]Yonghwi Kwon, Fei Wang, Weihang Wang, Kyu Hyung Lee, Wen-Chuan Lee, Shiqing Ma, Xiangyu Zhang, Dongyan Xu, Somesh Jha, Gabriela F. Ciocarlie, Ashish Gehani, Vinod Yegneswaran:
MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation. NDSS 2018 - [c104]Shiqing Ma, Juan Zhai, Yonghwi Kwon, Kyu Hyung Lee, Xiangyu Zhang, Gabriela F. Ciocarlie, Ashish Gehani, Vinod Yegneswaran, Dongyan Xu, Somesh Jha:
Kernel-Supported Cost-Effective Audit Logging for Causality Tracking. USENIX ATC 2018: 241-254 - [i3]Zhan Tu, Fan Fei, Matthew Eagon, Xiangyu Zhang, Dongyan Xu, Xinyan Deng:
Redundancy-Free UAV Sensor Fault Isolation And Recovery. CoRR abs/1812.00063 (2018) - 2017
- [j30]Seung Jei Yang, Jung Ho Choi, Ki Bom Kim, Rohit Bhatia, Brendan Saltaformaggio, Dongyan Xu:
Live acquisition of main memory data from Android smartphones and smartwatches. Digit. Investig. 23: 50-62 (2017) - [c103]Taegyu Kim, Chung Hwan Kim, Hongjun Choi, Yonghwi Kwon, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu:
RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications. ACSAC 2017: 412-424 - [c102]Yonghwi Kwon, Weihang Wang, Yunhui Zheng, Xiangyu Zhang, Dongyan Xu:
CPR: cross platform binary code reuse via platform independent trace program. ISSTA 2017: 158-169 - [c101]Yonghwi Kwon, Brendan Saltaformaggio, I Luk Kim, Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu:
Self Destructing Exploit Executions via Input Perturbation. NDSS 2017 - [c100]Shiqing Ma, Juan Zhai, Fei Wang, Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu:
MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning. USENIX Security Symposium 2017: 1111-1128 - [c99]Kyungtae Kim, I Luk Kim, Chung Hwan Kim, Yonghwi Kwon, Yunhui Zheng, Xiangyu Zhang, Dongyan Xu:
J-Force: Forced Execution on JavaScript. WWW 2017: 897-906 - [e5]Bhavani Thuraisingham, David Evans, Tal Malkin, Dongyan Xu:
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017. ACM 2017, ISBN 978-1-4503-4946-8 [contents] - 2016
- [c98]Kexin Pei, Zhongshu Gu, Brendan Saltaformaggio, Shiqing Ma, Fei Wang, Zhiwei Zhang, Luo Si, Xiangyu Zhang, Dongyan Xu:
HERCULE: attack story reconstruction via community discovery on correlated log graph. ACSAC 2016: 583-595 - [c97]Yonghwi Kwon, Dohyeong Kim, William N. Sumner, Kyungtae Kim, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu:
LDX: Causality Inference by Lightweight Dual Execution. ASPLOS 2016: 503-515 - [c96]Hui Lu, Brendan Saltaformaggio, Cong Xu, Umesh Bellur, Dongyan Xu:
BASS: Improving I/O Performance for Cloud Block Storage via Byte-Addressable Storage Stack. SoCC 2016: 169-181 - [c95]Hui Lu, Abhinav Srivastava, Brendan Saltaformaggio, Dongyan Xu:
StorM: Enabling Tenant-Defined Cloud Storage Middle-Box Services. DSN 2016: 73-84 - [c94]Shiqing Ma, Xiangyu Zhang, Dongyan Xu:
ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting. NDSS 2016 - [c93]Chung Hwan Kim, Junghwan Rhee, Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu:
PerfGuard: binary-centric application performance monitoring in production environments. SIGSOFT FSE 2016: 595-606 - [c92]Cheng Cheng, Zhui Deng, Zhongshu Gu, Dongyan Xu:
vMocity: Traveling VMs Across Heterogeneous Clouds. SRDS 2016: 101-110 - [c91]Brendan Saltaformaggio, Rohit Bhatia, Xiangyu Zhang, Dongyan Xu, Golden G. Richard III:
Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images. USENIX Security Symposium 2016: 1137-1151 - [c90]Brendan Saltaformaggio, Hongjun Choi, Kristen Johnson, Yonghwi Kwon, Qi Zhang, Xiangyu Zhang, Dongyan Xu, John Qian:
Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic. WOOT 2016 - 2015
- [c89]Hui Lu, Cong Xu, Cheng Cheng, Ramana Rao Kompella, Dongyan Xu:
vHaul: Towards Optimal Scheduling of Live Multi-VM Migration for Multi-tier Applications. CLOUD 2015: 453-460 - [c88]Shiqing Ma, Kyu Hyung Lee, Chung Hwan Kim, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu:
Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows. ACSAC 2015: 401-410 - [c87]Dohyeong Kim, Yonghwi Kwon, William N. Sumner, Xiangyu Zhang, Dongyan Xu:
Dual Execution for On the Fly Fine Grained Execution Comparison. ASPLOS 2015: 325-338 - [c86]Zhui Deng, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu:
iRiS: Vetting Private API Abuse in iOS Applications. CCS 2015: 44-56 - [c85]Brendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu:
GUITAR: Piecing Together Android App GUIs from Memory Images. CCS 2015: 120-132 - [c84]Brendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu:
VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images. CCS 2015: 146-157 - [c83]Chung Hwan Kim, Sungjin Park, Junghwan Rhee, Jong-Jin Won, Taisook Han, Dongyan Xu:
CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality. AsiaCCS 2015: 651-656 - [c82]Hui Lu, Brendan Saltaformaggio, Ramana Rao Kompella, Dongyan Xu:
vFair: latency-aware fair storage scheduling via per-IO cost-based differentiation. SoCC 2015: 125-138 - [c81]Zhongshu Gu, Kexin Pei, Qifan Wang, Luo Si, Xiangyu Zhang, Dongyan Xu:
LEAPS: Detecting Camouflaged Attacks with Statistical Learning Guided by Program Analysis. DSN 2015: 57-68 - [c80]Ping Chen, Jun Xu, Zhiqiang Lin, Dongyan Xu, Bing Mao, Peng Liu:
A Practical Approach for Adaptive Data Structure Layout Randomization. ESORICS (1) 2015: 69-89 - [c79]Cong Xu, Brendan Saltaformaggio, Sahan Gamage, Ramana Rao Kompella, Dongyan Xu:
vRead: Efficient Data Access for Hadoop in Virtualized Clouds. Middleware 2015: 125-136 - [c78]Yonghwi Kwon, Fei Peng, Dohyeong Kim, Kyungtae Kim, Xiangyu Zhang, Dongyan Xu, Vinod Yegneswaran, John Qian:
P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions. NDSS 2015 - 2014
- [j29]Junghwan Rhee, Ryan D. Riley, Zhiqiang Lin, Xuxian Jiang, Dongyan Xu:
Data-Centric OS Kernel Malware Characterization. IEEE Trans. Inf. Forensics Secur. 9(1): 72-87 (2014) - [c77]Sahan Gamage, Cong Xu, Ramana Rao Kompella, Dongyan Xu:
vPipe: Piped I/O Offloading for Efficient Data Movement in Virtualized Clouds. SoCC 2014: 27:1-27:13 - [c76]Dongyan Xu:
Virtualization and security: happily ever after? CODASPY 2014: 73-74 - [c75]Zhongshu Gu, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu:
FACE-CHANGE: Application-Driven Dynamic Kernel View Switching in a Virtual Machine. DSN 2014: 491-502 - [c74]Dohyeong Kim, William N. Sumner, Xiangyu Zhang, Dongyan Xu, Hira Agrawal:
Reuse-oriented reverse engineering of functional components from x86 binaries. ICSE 2014: 1128-1139 - [c73]Hui Zhang, Junghwan Rhee, Nipun Arora, Sahan Gamage, Guofei Jiang, Kenji Yoshihira, Dongyan Xu:
CLUE: System trace analytics for cloud service performance diagnosis. NOMS 2014: 1-9 - [c72]Chung Hwan Kim, Junghwan Rhee, Hui Zhang, Nipun Arora, Guofei Jiang, Xiangyu Zhang, Dongyan Xu:
IntroPerf: transparent context-sensitive multi-layer performance inference using system stack traces. SIGMETRICS 2014: 235-247 - [c71]Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu:
DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse. USENIX Security Symposium 2014: 255-269 - [c70]Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, Zhendong Su:
X-Force: Force-Executing Binary Programs for Security Applications. USENIX Security Symposium 2014: 829-844 - [e4]Beth Plale, Matei Ripeanu, Franck Cappello, Dongyan Xu:
The 23rd International Symposium on High-Performance Parallel and Distributed Computing, HPDC'14, Vancouver, BC, Canada - June 23 - 27, 2014. ACM 2014, ISBN 978-1-4503-2749-7 [contents] - 2013
- [j28]Sahan Gamage, Ramana Rao Kompella, Dongyan Xu, Ardalan Kangarlou:
Protocol Responsibility Offloading to Improve TCP Throughput in Virtualized Environments. ACM Trans. Comput. Syst. 31(3): 7 (2013) - [j27]Sahan Gamage, Ramana Rao Kompella, Dongyan Xu:
vPipe: One Pipe to Connect Them All. login Usenix Mag. 38(5) (2013) - [c69]Zhui Deng, Xiangyu Zhang, Dongyan Xu:
SPIDER: stealthy binary program instrumentation and debugging via hardware virtualization. ACSAC 2013: 289-298 - [c68]Junyuan Zeng, Yangchun Fu, Kenneth A. Miller, Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu:
Obfuscation resilient binary code reuse through trace-oriented programming. CCS 2013: 487-498 - [c67]Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu:
LogGC: garbage collecting audit log. CCS 2013: 1005-1016 - [c66]Zhongshu Gu, William N. Sumner, Zhui Deng, Xiangyu Zhang, Dongyan Xu:
DRIP: A framework for purifying trojaned kernel drivers. DSN 2013: 1-12 - [c65]Zhui Deng, Xiangyu Zhang, Dongyan Xu:
BISTRO: Binary Component Extraction and Embedding for Software Security Applications. ESORICS 2013: 200-218 - [c64]Sahan Gamage, Ramana Rao Kompella, Dongyan Xu:
vPipe: One Pipe to Connect Them All! HotCloud 2013 - [c63]Dannie M. Stanley, Dongyan Xu, Eugene H. Spafford:
Improved kernel security through memory layout randomization. IPCCC 2013: 1-10 - [c62]Yonghwi Kwon, Xiangyu Zhang, Dongyan Xu:
PIEtrace: Platform independent executable trace. ASE 2013: 48-58 - [c61]Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu:
High Accuracy Attack Provenance via Binary-based Execution Partition. NDSS 2013 - [c60]Cong Xu, Sahan Gamage, Hui Lu, Ramana Rao Kompella, Dongyan Xu:
vTurbo: Accelerating Virtual Machine I/O Processing Using Designated Turbo-Sliced Core. USENIX ATC 2013: 243-254 - 2012
- [j26]Zhui Deng, Dongyan Xu, Xiangyu Zhang, Xuxian Jiang:
IntroLib: Efficient and transparent library call introspection for malware forensics. Digit. Investig. 9(Supplement): S13-S23 (2012) - [j25]Bo Sang, Jianfeng Zhan, Gang Lu, Haining Wang, Dongyan Xu, Lei Wang, Zhihong Zhang, Zhen Jia:
Precise, Scalable, and Online Request Tracing for Multitier Services of Black Boxes. IEEE Trans. Parallel Distributed Syst. 23(6): 1159-1167 (2012) - [j24]Ardalan Kangarlou, Patrick Eugster, Dongyan Xu:
VNsnap: Taking Snapshots of Virtual Networked Infrastructures in the Cloud. IEEE Trans. Serv. Comput. 5(4): 484-496 (2012) - [c59]Ping Chen, Dongyan Xu, Bing Mao:
CloudER: a framework for automatic software vulnerability location and patching in the cloud. AsiaCCS 2012: 50 - [c58]Cong Xu, Sahan Gamage, Pawan N. Rao, Ardalan Kangarlou, Ramana Rao Kompella, Dongyan Xu:
vSlicer: latency-aware virtual machine scheduling via differentiated-frequency CPU slicing. HPDC 2012: 3-14 - [c57]Dannie M. Stanley, Zhui Deng, Dongyan Xu, Rick Porter, Shane Snyder:
Guest-transparent instruction authentication for self-patching kernels. MILCOM 2012: 1-6 - [c56]Zhiqiang Lin, Junghwan Rhee, Chao Wu, Xiangyu Zhang, Dongyan Xu:
Discovering Semantic Data of Interest from Un-mappable Memory with Confidence. NDSS 2012 - [e3]Dejan S. Milojicic, Dongyan Xu, Vanish Talwar:
9th International Conference on Autonomic Computing, ICAC'12, San Jose, CA, USA, September 16 - 20, 2012. ACM 2012, ISBN 978-1-4503-1520-3 [contents] - 2011
- [j23]Dilma Da Silva, Dongyan Xu, Dan Reed:
Guest editorial - special issue on cloud computing. J. Internet Serv. Appl. 2(2): 139-140 (2011) - [j22]Paul Ruth, Junghwan Rhee, Dongyan Xu, Sebastien Goasguen, Rick Kennell:
Autonomic live adaptation of virtual networked environments in a multidomain infrastructure. J. Internet Serv. Appl. 2(2): 141-154 (2011) - [j21]Dilma Da Silva, Dongyan Xu, Dan Reed:
Guest editorial - second part of special issue on cloud computing. J. Internet Serv. Appl. 2(3): 189 (2011) - [j20]Ardalan Kangarlou, Dongyan Xu, Ulas C. Kozat, Pradeep Padala, Bob Lantz, Ken Igarashi:
In-network live snapshot service for recovering virtual infrastructures. IEEE Netw. 25(4): 12-19 (2011) - [c55]Junghwan Rhee, Zhiqiang Lin, Dongyan Xu:
Characterizing kernel malware behavior with kernel data access patterns. AsiaCCS 2011: 207-216 - [c54]Deepa Srinivasan, Zhi Wang, Xuxian Jiang, Dongyan Xu:
Process out-grafting: an efficient "out-of-VM" approach for fine-grained process execution monitoring. CCS 2011: 363-374 - [c53]Sahan Gamage, Ardalan Kangarlou, Ramana Rao Kompella, Dongyan Xu:
Opportunistic flooding to improve TCP transmit performance in virtualized clouds. SoCC 2011: 24 - [c52]Dongyan Xu:
Challenges in supporting virtual infrastructures in the cloud. VTDC@HPDC 2011: 19-20 - [c51]Zhiqiang Lin, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu, Xuxian Jiang:
SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures. NDSS 2011 - [c50]