Chengcheng Xiang
Chengcheng Xiang
Verified email at - Homepage
Cited by
Cited by
ForenVisor: A tool for acquiring and preserving reliable data in cloud live forensics
Z Qi, C Xiang, R Ma, J Li, H Guan, DSL Wei
IEEE Transactions on Cloud Computing 5 (3), 443-456, 2016
Towards continuous access control validation and forensics
C Xiang, Y Wu, B Shen, M Shen, H Huang, T Xu, Y Zhou, C Moore, X Jin, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
An automation-assisted empirical study on lock usage for concurrent programs
R Xin, Z Qi, S Huang, C Xiang, Y Zheng, Y Wang, H Guan
2013 IEEE International Conference on Software Maintenance, 100-109, 2013
PracExtractor: Extracting Configuration Good Practices from Manuals to Detect Server Misconfigurations
C Xiang, H Huang, A Yoo, Y Zhou, S Pasupathy
2020 USENIX Annual Technical Conference (USENIX ATC 20), 265-280, 2020
A virtualization based monitoring system for mini-intrusive live forensics
X Zhong, C Xiang, M Yu, Z Qi, H Guan
International Journal of Parallel Programming 43 (3), 455-471, 2015
Can Systems Explain Permissions Better? Understanding Users' Misperceptions under Smartphone Runtime Permission Model
B Shen, L Wei, C Xiang, Y Wu, M Shen, Y Zhou, X Jin
30th USENIX Security Symposium (USENIX Security 21), 751-768, 2021
Flexible and extensible runtime verification for Java (Extended Version)
C Xiang, Z Qi, W Binder
International Journal of Software Engineering and Knowledge Engineering 25 …, 2015
Detecting Access Control Misconfigurations with Change Validation
C Xiang
University of California, San Diego, 2021
Flexible and Extensible Runtime Verification for Java.
C Xiang, Z Qi, W Binder
SEKE, 595-600, 2015
PYLIVE:On-the-Fly Code Change for Python-based Online Services
H Huang, C Xiang, L Zhong, Y Zhou
2021 USENIX Annual Technical Conference (USENIX ATC 21), 349-363, 2021
The system can't perform the operation now. Try again later.
Articles 1–10