Loop: Logic-oriented opaque predicate detection in obfuscated binary code J Ming, D Xu, L Wang, D Wu Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 60 | 2015 |
Cryptographic function detection in obfuscated binaries via bit-precise symbolic loop mapping D Xu, J Ming, D Wu 2017 IEEE Symposium on Security and Privacy (SP), 921-937, 2017 | 51 | 2017 |
Binsim: Trace-based semantic binary diffing via system call sliced segment equivalence checking J Ming, D Xu, Y Jiang, D Wu 26th {USENIX} Security Symposium ({USENIX} Security 17), 253-270, 2017 | 47 | 2017 |
Generalized dynamic opaque predicates: A new control flow obfuscation method D Xu, J Ming, D Wu International Conference on Information Security, 323-342, 2016 | 38 | 2016 |
Memoized semantics-based binary diffing with application to malware lineage inference J Ming, D Xu, D Wu IFIP International Information Security and Privacy Conference, 416-430, 2015 | 28 | 2015 |
VMHunt: A verifiable approach to partially-virtualized binary code simplification D Xu, J Ming, Y Fu, D Wu Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 23 | 2018 |
MalwareHunt: semantics-based malware diffing speedup by normalized basic block memoization J Ming, D Xu, D Wu Journal of Computer Virology and Hacking Techniques 13 (3), 167-178, 2017 | 6 | 2017 |
Memory access integrity: Detecting fine-grained memory access errors in binary code W Li, D Xu, W Wu, X Gong, X Xiang, Y Wang, Q Zeng Cybersecurity 2 (1), 1-18, 2019 | 2 | 2019 |
MetaHunt: Towards Taming Malware Mutation via Studying the Evolution of Metamorphic Virus L Wang, D Xu, J Ming, Y Fu, D Wu Proceedings of the 3rd ACM Workshop on Software Protection, 15-26, 2019 | 2 | 2019 |
An address-based compiling Optimization for FFT on multi-cluster DSP D Xu, Q Zheng 2012 Fifth International Symposium on Parallel Architectures, Algorithms and …, 2012 | 2 | 2012 |
Security Threats and Countermeasures for Approximate Arithmetic Computing P Yellu, MR Monjur, T Kammerer, D Xu, Q Yu 2020 25th Asia and South Pacific Design Automation Conference (ASP-DAC), 259-264, 2020 | 1 | 2020 |
Generating Effective Software Obfuscation Sequences with Reinforcement Learning H Wang, S Wang, D Xu, X Zhang, X Liu IEEE Transactions on Dependable and Secure Computing, 2020 | | 2020 |
NeuReduce: Reducing Mixed Boolean-Arithmetic Expressions by Recurrent Neural Network W Feng, B Liu, D Xu, Q Zheng, Y Xu Proceedings of the 2020 Conference on Empirical Methods in Natural Language …, 2020 | | 2020 |
VAHunt: Warding Off New Repackaged Android Malware in App-Virtualization's Clothing L Shi, J Ming, J Fu, G Peng, D Xu, K Gao, X Pan Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | | 2020 |
Blurring Boundaries: A New Way to Secure Approximate Computing Systems P Yellu, L Buell, D Xu, Q Yu Proceedings of the 2020 on Great Lakes Symposium on VLSI, 327-332, 2020 | | 2020 |
Model Checking–Case Study of a Temporary Structures Monitoring System D Xu, X Yuan, D Wu, CJ Anumba Cyber-Physical Systems in the Built Environment, 139-159, 2020 | | 2020 |
Opaque Predicate: Attack and Defense in Obfuscated Binary Code D Xu | | 2018 |