Comparing different moving target defense techniques J Xu, P Guo, M Zhao, RF Erbacher, M Zhu, P Liu Proceedings of the First ACM Workshop on Moving Target Defense, 97-107, 2014 | 106 | 2014 |
Lemna: Explaining deep learning based security applications W Guo, D Mu, J Xu, P Su, G Wang, X Xing proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 101 | 2018 |
FlashGuard: Leveraging intrinsic flash properties to defend against encryption ransomware J Huang, J Xu, X Xing, P Liu, MK Qureshi Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 41 | 2017 |
Credal: Towards locating a memory corruption vulnerability with your core dump J Xu, D Mu, P Chen, X Xing, P Wang, P Liu Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 37 | 2016 |
A Practical Approach for Adaptive Data Structure Layout Randomization P Chen, J Xu, Z Lin, D Xu, B Mao, P Liu Computer Security – ESORICS 2015 9326, 69-89, 2015 | 34 | 2015 |
{FUZE}: Towards facilitating exploit generation for kernel use-after-free vulnerabilities W Wu, Y Chen, J Xu, X Xing, X Gong, W Zou 27th {USENIX} Security Symposium ({USENIX} Security 18), 781-797, 2018 | 27 | 2018 |
Savior: Towards bug-driven hybrid testing Y Chen, P Li, J Xu, S Guo, R Zhou, Y Zhang, T Wei, L Lu 2020 IEEE Symposium on Security and Privacy (SP), 1580-1596, 2020 | 25 | 2020 |
RoboADS: Anomaly detection against sensor and actuator misbehaviors in mobile robots P Guo, H Kim, N Virani, J Xu, M Zhu, P Liu 2018 48th Annual IEEE/IFIP international conference on dependable systems …, 2018 | 19 | 2018 |
Postmortem program analysis with hardware-enhanced post-crash artifacts J Xu, D Mu, X Xing, P Liu, P Chen, B Mao 26th {USENIX} Security Symposium ({USENIX} Security 17), 17-32, 2017 | 18 | 2017 |
Dancing with wolves: Towards practical event-driven vmm monitoring L Deng, P Liu, J Xu, P Chen, Q Zeng Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on …, 2017 | 17 | 2017 |
Exploiting physical dynamics to detect actuator and sensor attacks in mobile robots P Guo, H Kim, N Virani, J Xu, M Zhu, P Liu arXiv preprint arXiv:1708.01834, 2017 | 16 | 2017 |
From physical to cyber: Escalating protection for personalized auto insurance L Guan, J Xu, S Wang, X Xing, L Lin, H Huang, P Liu, W Lee Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD …, 2016 | 15 | 2016 |
Ptrix: Efficient hardware-assisted fuzzing for cots binary Y Chen, D Mu, J Xu, Z Sun, W Shen, X Xing, L Lu, B Mao Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019 | 8 | 2019 |
What you see is not what you get! thwarting just-in-time rop with chameleon P Chen, J Xu, Z Hu, X Xing, M Zhu, B Mao, P Liu 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 7 | 2017 |
Feedback control can make data structure layout randomization more cost-effective under zero-day attacks P Chen, Z Hu, J Xu, M Zhu, P Liu Cybersecurity 1 (1), 1-13, 2018 | 6 | 2018 |
Nonlinear unknown input and state estimation algorithm in mobile robots P Guo, H Kim, N Virani, J Xu, M Zhu, P Liu arXiv preprint arXiv:1804.02814, 2018 | 3 | 2018 |
Instantly obsoleting the address-code associations: A new principle for defending advanced code reuse attack P Chen, J Xu, J Wang, P Liu arXiv preprint arXiv:1507.02786, 2015 | 3 | 2015 |
Privacy for All: Demystify Vulnerability Disparity of Differential Privacy against Membership Inference Attack B Zhang, R Yu, H Sun, Y Li, J Xu, H Wang arXiv preprint arXiv:2001.08855, 2020 | 2 | 2020 |
SoK: All You Ever Wanted to Know About x86/x64 Binary Disassembly But Were Afraid to Ask C Pang, R Yu, Y Chen, E Koskinen, G Portokalidis, B Mao, J Xu arXiv preprint arXiv:2007.14266, 2020 | 1 | 2020 |
An empirical study on benchmarks of artificial software vulnerabilities S Geng, Y Li, Y Du, J Xu, Y Liu, B Mao arXiv preprint arXiv:2003.09561, 2020 | 1 | 2020 |