default search action
Dongpeng Xu 0001
Person information
- affiliation: University of New Hampshire, Durham, NH, USA
Other persons with the same name
- Dongpeng Xu 0002 — City University of Macau, Faculty of Finance, Macau
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c20]Naiqian Zhang, Zheyun Feng, Dongpeng Xu:
An In-Depth Analysis of the Code-Reuse Gadgets Introduced by Software Obfuscation. ACNS (3) 2024: 217-240 - [c19]Nishanth Goud Chennagouni, Mashrafi Alam Kajol, Diliang Chen, Dongpeng Xu, Qiaoyan Yu:
Feature-driven Approximate Computing for Wearable Health-Monitoring Systems. ACM Great Lakes Symposium on VLSI 2024: 712-717 - 2023
- [c18]Naiqian Zhang, Daroc Alden, Dongpeng Xu, Shuai Wang, Trent Jaeger, Wheeler Ruml:
No Free Lunch: On the Increased Code Reuse Attack Surface of Obfuscated Programs. DSN 2023: 313-326 - 2022
- [j4]Huaijin Wang, Shuai Wang, Dongpeng Xu, Xiangyu Zhang, Xiao Liu:
Generating Effective Software Obfuscation Sequences With Reinforcement Learning. IEEE Trans. Dependable Secur. Comput. 19(3): 1900-1917 (2022) - 2021
- [j3]Pruthvy Yellu, Landon Buell, Miguel Mark, Michel A. Kinsy, Dongpeng Xu, Qiaoyan Yu:
Security Threat Analyses and Attack Models for Approximate Computing Systems: From Hardware and Micro-architecture Perspectives. ACM Trans. Design Autom. Electr. Syst. 26(4): 32:1-32:31 (2021) - [c17]Chengbin Pang, Ruotong Yu, Dongpeng Xu, Eric Koskinen, Georgios Portokalidis, Jun Xu:
Towards Optimal Use of Exception Handling Information for Function Detection. DSN 2021: 338-349 - [c16]Weijie Feng, Binbin Liu, Dongpeng Xu, Qilong Zheng, Yun Xu:
GraphMR: Graph Neural Network for Mathematical Reasoning. EMNLP (1) 2021: 3395-3404 - [c15]Binbin Liu, Weijie Feng, Qilong Zheng, Jing Li, Dongpeng Xu:
Software Obfuscation with Non-Linear Mixed Boolean-Arithmetic Expressions. ICICS (1) 2021: 276-292 - [c14]Dongpeng Xu, Binbin Liu, Weijie Feng, Jiang Ming, Qilong Zheng, Jing Li, Qiaoyan Yu:
Boosting SMT solver performance on mixed-bitwise-arithmetic expressions. PLDI 2021: 651-664 - [c13]Binbin Liu, Junfu Shen, Jiang Ming, Qilong Zheng, Jing Li, Dongpeng Xu:
MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation. USENIX Security Symposium 2021: 1701-1718 - [i1]Chengbin Pang, Ruotong Yu, Dongpeng Xu, Eric Koskinen, Georgios Portokalidis, Jun Xu:
Towards Optimal Use of Exception Handling Information for Function Detection. CoRR abs/2104.03168 (2021) - 2020
- [c12]Pruthvy Yellu, Mohammad Mezanur Rahman Monjur, Timothy Kammerer, Dongpeng Xu, Qiaoyan Yu:
Security Threats and Countermeasures for Approximate Arithmetic Computing. ASP-DAC 2020: 259-264 - [c11]Luman Shi, Jiang Ming, Jianming Fu, Guojun Peng, Dongpeng Xu, Kun Gao, Xuanchen Pan:
VAHunt: Warding Off New Repackaged Android Malware in App-Virtualization's Clothing. CCS 2020: 535-549 - [c10]Weijie Feng, Binbin Liu, Dongpeng Xu, Qilong Zheng, Yun Xu:
NeuReduce: Reducing Mixed Boolean-Arithmetic Expressions by Recurrent Neural Network. EMNLP (Findings) 2020: 635-644 - [c9]Pruthvy Yellu, Landon Buell, Dongpeng Xu, Qiaoyan Yu:
Blurring Boundaries: A New Way to Secure Approximate Computing Systems. ACM Great Lakes Symposium on VLSI 2020: 327-332
2010 – 2019
- 2019
- [j2]Wenjie Li, Dongpeng Xu, Wei Wu, Xiaorui Gong, Xiaobo Xiang, Yan Wang, Fangming Gu, Qianxiang Zeng:
Memory access integrity: detecting fine-grained memory access errors in binary code. Cybersecur. 2(1): 17 (2019) - [c8]Li Wang, Dongpeng Xu, Jiang Ming, Yu Fu, Dinghao Wu:
MetaHunt: Towards Taming Malware Mutation via Studying the Evolution of Metamorphic Virus. SPRO@CCS 2019: 15-26 - 2018
- [c7]Dongpeng Xu, Jiang Ming, Yu Fu, Dinghao Wu:
VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification. CCS 2018: 442-458 - 2017
- [j1]Jiang Ming, Dongpeng Xu, Dinghao Wu:
MalwareHunt: semantics-based malware diffing speedup by normalized basic block memoization. J. Comput. Virol. Hacking Tech. 13(3): 167-178 (2017) - [c6]Dongpeng Xu, Jiang Ming, Dinghao Wu:
Cryptographic Function Detection in Obfuscated Binaries via Bit-Precise Symbolic Loop Mapping. IEEE Symposium on Security and Privacy 2017: 921-937 - [c5]Jiang Ming, Dongpeng Xu, Yufei Jiang, Dinghao Wu:
BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking. USENIX Security Symposium 2017: 253-270 - 2016
- [c4]Dongpeng Xu, Jiang Ming, Dinghao Wu:
Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method. ISC 2016: 323-342 - 2015
- [c3]Jiang Ming, Dongpeng Xu, Li Wang, Dinghao Wu:
LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code. CCS 2015: 757-768 - [c2]Jiang Ming, Dongpeng Xu, Dinghao Wu:
Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference. SEC 2015: 416-430 - 2012
- [c1]Dongpeng Xu, Qilong Zheng:
An Address-Based Compiling Optimization for FFT on Multi-cluster DSP. PAAP 2012: 60-64
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-23 21:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint