default search action
Dongyan Xu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c146]Hyungsub Kim, Rwitam Bandyopadhyay, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Yongdae Kim, Dongyan Xu:
A Systematic Study of Physical Sensor Attack Hardness. SP 2024: 2328-2347 - [c145]Jianliang Wu, Ruoyu Wu, Dongyan Xu, Dave Jing Tian, Antonio Bianchi:
SoK: The Long Journey of Exploiting and Defending the Legacy of King Harald Bluetooth. SP 2024: 2847-228066 - [c144]Syed Ghazanfar Abbas, Muslum Ozgur Ozmen, Abdulellah Alsaheel, Arslan Khan, Z. Berkay Celik, Dongyan Xu:
SAIN: Improving ICS Attack Detection Sensitivity via State-Aware Invariants. USENIX Security Symposium 2024 - [c143]Jianliang Wu, Patrick Traynor, Dongyan Xu, Dave (Jing) Tian, Antonio Bianchi:
Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations. USENIX Security Symposium 2024 - [c142]Jaewoo Shin, Lan Zhao, Carol X. Song, Dikai Xu, Ming Qu, Ananth Grama, Dongyan Xu:
Integrating ML/AI workflows in a Streaming Data Management and Processing Platform for Building Energy Research. PEARC 2024: 54:1-54:5 - 2023
- [c141]Arslan Khan, Muqi Zou, Kyungtae Kim, Dongyan Xu, Antonio Bianchi, Dave Jing Tian:
Fuzzing SGX Enclaves via Host Program Mutations. EuroS&P 2023: 472-488 - [c140]Arslan Khan, Dongyan Xu, Dave Jing Tian:
EC: Embedded Systems Compartmentalization via Intra-Kernel Isolation. SP 2023: 2990-3007 - [c139]Arslan Khan, Dongyan Xu, Dave Jing Tian:
Low-Cost Privilege Separation with Compile Time Compartmentalization for Embedded Systems. SP 2023: 3008-3025 - [c138]Hyungsub Kim, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Dongyan Xu:
PatchVerif: Discovering Faulty Patches in Robotic Vehicles. USENIX Security Symposium 2023: 3011-3028 - [c137]Khaled Serag, Rohit Bhatia, Akram Faqih, Muslum Ozgur Ozmen, Vireshwar Kumar, Z. Berkay Celik, Dongyan Xu:
ZBCAN: A Zero-Byte CAN Defense System. USENIX Security Symposium 2023: 6893-6910 - 2022
- [j35]Howard D. Grimes, Gabriela F. Ciocarlie, Bo Yu, Duminda Wijesekera, Gregory E. Shannon, Wayne Austad, Charles Fracchia, Dongyan Xu, Thomas R. Kurfess, Lisa Strama, Michael Mylrea, Bill Reid:
PURE Biomanufacturing: Secure, Pandemic-Adaptive Biomanufacturing. IEEE Secur. Priv. 20(6): 53-65 (2022) - [c136]Sungwoo Kim, Gisu Yeo, Taegyu Kim, Junghwan John Rhee, Yuseok Jeon, Antonio Bianchi, Dongyan Xu, Dave (Jing) Tian:
ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs. AsiaCCS 2022: 534-545 - [c135]Taegyu Kim, Aolin Ding, Sriharsha Etigowni, Pengfei Sun, Jizhou Chen, Luis Garcia, Saman A. Zonouz, Dongyan Xu, Dave (Jing) Tian:
Reverse engineering and retrofitting robotic aerial vehicle control firmware using dispatch. MobiSys 2022: 69-83 - [c134]Hyungsub Kim, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Dongyan Xu:
PGPatch: Policy-Guided Logic Bug Patching for Robotic Vehicles. SP 2022: 1826-1844 - [c133]Jianliang Wu, Ruoyu Wu, Dongyan Xu, Dave Jing Tian, Antonio Bianchi:
Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities. SP 2022: 2285-2303 - [c132]Ruoyu Wu, Taegyu Kim, Dave (Jing) Tian, Antonio Bianchi, Dongyan Xu:
DnD: A Cross-Architecture Deep Neural Network Decompiler. USENIX Security Symposium 2022: 2135-2152 - [c131]Fei Wang, Jianliang Wu, Yuhong Nan, Yousra Aafer, Xiangyu Zhang, Dongyan Xu, Mathias Payer:
ProFactory: Improving IoT Security via Formalized Protocol Customization. USENIX Security Symposium 2022: 3879-3896 - 2021
- [j34]Hassaan Irshad, Gabriela F. Ciocarlie, Ashish Gehani, Vinod Yegneswaran, Kyu Hyung Lee, Jignesh M. Patel, Somesh Jha, Yonghwi Kwon, Dongyan Xu, Xiangyu Zhang:
TRACE: Enterprise-Wide Provenance Tracking for Real-Time APT Detection. IEEE Trans. Inf. Forensics Secur. 16: 4363-4376 (2021) - [c130]Rohit Bhatia, Vireshwar Kumar, Khaled Serag, Z. Berkay Celik, Mathias Payer, Dongyan Xu:
Evading Voltage-Based Intrusion Detection on Automotive CAN. NDSS 2021 - [c129]Hyungsub Kim, Muslum Ozgur Ozmen, Antonio Bianchi, Z. Berkay Celik, Dongyan Xu:
PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles. NDSS 2021 - [c128]Yapeng Ye, Zhuo Zhang, Fei Wang, Xiangyu Zhang, Dongyan Xu:
NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces. NDSS 2021 - [c127]Le Yu, Shiqing Ma, Zhuo Zhang, Guanhong Tao, Xiangyu Zhang, Dongyan Xu, Vincent E. Urias, Han Wei Lin, Gabriela F. Ciocarlie, Vinod Yegneswaran, Ashish Gehani:
ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation. NDSS 2021 - [c126]Taegyu Kim, Vireshwar Kumar, Junghwan Rhee, Jizhou Chen, Kyungtae Kim, Chung Hwan Kim, Dongyan Xu, Dave (Jing) Tian:
PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications. USENIX Security Symposium 2021: 249-266 - [c125]Arslan Khan, Hyungsub Kim, Byoungyoung Lee, Dongyan Xu, Antonio Bianchi, Dave (Jing) Tian:
M2MON: Building an MMIO-based Security Reference Monitor for Unmanned Vehicles. USENIX Security Symposium 2021: 285-302 - [c124]Jianliang Wu, Ruoyu Wu, Daniele Antonioli, Mathias Payer, Nils Ole Tippenhauer, Dongyan Xu, Dave (Jing) Tian, Antonio Bianchi:
LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks. USENIX Security Symposium 2021: 339-356 - [c123]Muhammad Abubakar, Adil Ahmad, Pedro Fonseca, Dongyan Xu:
SHARD: Fine-Grained Kernel Specialization with Context-Aware Hardening. USENIX Security Symposium 2021: 2435-2452 - [c122]Abdulellah Alsaheel, Yuhong Nan, Shiqing Ma, Le Yu, Gregory Walkup, Z. Berkay Celik, Xiangyu Zhang, Dongyan Xu:
ATLAS: A Sequence-based Learning Approach for Attack Investigation. USENIX Security Symposium 2021: 3005-3022 - [c121]Khaled Serag, Rohit Bhatia, Vireshwar Kumar, Z. Berkay Celik, Dongyan Xu:
Exposing New Vulnerabilities of Error Handling Mechanism in CAN. USENIX Security Symposium 2021: 4241-4258 - 2020
- [j33]Sungjin Park, Chung Hwan Kim, Junghwan Rhee, Jong-Jin Won, Taisook Han, Dongyan Xu:
CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality. IEEE Trans. Dependable Secur. Comput. 17(4): 883-897 (2020) - [c120]Hongjun Choi, Sayali Kate, Yousra Aafer, Xiangyu Zhang, Dongyan Xu:
Cyber-Physical Inconsistency Vulnerability Identification for Safety Checks in Robotic Vehicles. CCS 2020: 263-278 - [c119]Gregory Walkup, Sriharsha Etigowni, Dongyan Xu, Vincent Urias, Han W. Lin:
Forensic Investigation of Industrial Control Systems Using Deterministic Replay. CNS 2020: 1-9 - [c118]Fan Fei, Zhan Tu, Dongyan Xu, Xinyan Deng:
Learn-to-Recover: Retrofitting UAVs with Reinforcement Learning-Assisted Flight Control Under Cyber-Physical Attacks. ICRA 2020: 7358-7364 - [c117]Hongjun Choi, Sayali Kate, Yousra Aafer, Xiangyu Zhang, Dongyan Xu:
Software-based Realtime Recovery from Sensor Attacks on Robotic Vehicles. RAID 2020: 349-364 - [c116]Jianliang Wu, Yuhong Nan, Vireshwar Kumar, Mathias Payer, Dongyan Xu:
BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks. RAID 2020: 397-411 - [c115]Sushant Dinesh, Nathan Burow, Dongyan Xu, Mathias Payer:
RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization. SP 2020: 1497-1511 - [c114]Taegyu Kim, Chung Hwan Kim, Altay Ozen, Fan Fei, Zhan Tu, Xiangyu Zhang, Xinyan Deng, Dave (Jing) Tian, Dongyan Xu:
From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAY. USENIX Security Symposium 2020: 913-930 - [c113]Jianliang Wu, Yuhong Nan, Vireshwar Kumar, Dave (Jing) Tian, Antonio Bianchi, Mathias Payer, Dongyan Xu:
BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy. WOOT @ USENIX Security Symposium 2020
2010 – 2019
- 2019
- [c112]Zhan Tu, Fan Fei, Matthew Eagon, Dongyan Xu, Xinyan Deng:
Flight Recovery of MAVs with Compromised IMU. IROS 2019: 3638-3644 - [c111]Taegyu Kim, Chung Hwan Kim, Junghwan Rhee, Fan Fei, Zhan Tu, Gregory Walkup, Xiangyu Zhang, Xinyan Deng, Dongyan Xu:
RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing. USENIX Security Symposium 2019: 425-442 - 2018
- [j32]Aisha I. Ali-Gombe, Brendan Saltaformaggio, J. Ramanujam, Dongyan Xu, Golden G. Richard III:
Toward a more dependable hybrid analysis of android malware using aspect-oriented programming. Comput. Secur. 73: 235-248 (2018) - [j31]Zhongshu Gu, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu:
Gemini: Guest-transparent honey files via hypervisor-level access redirection. Comput. Secur. 77: 737-744 (2018) - [c110]Fei Wang, Yonghwi Kwon, Shiqing Ma, Xiangyu Zhang, Dongyan Xu:
Lprov: Practical Library-aware Provenance Tracing. ACSAC 2018: 605-617 - [c109]Hongjun Choi, Wen-Chuan Lee, Yousra Aafer, Fan Fei, Zhan Tu, Xiangyu Zhang, Dongyan Xu, Xinyan Deng:
Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach. CCS 2018: 801-816 - [c108]Fan Fei, Zhan Tu, Ruikun Yu, Taegyu Kim, Xiangyu Zhang, Dongyan Xu, Xinyan Deng:
Cross-Layer Retrofitting of UAVs Against Cyber-Physical Attacks. ICRA 2018: 550-557 - [c107]Rohit Bhatia, Brendan Saltaformaggio, Seung Jei Yang, Aisha I. Ali-Gombe, Xiangyu Zhang, Dongyan Xu, Golden G. Richard III:
Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images. NDSS 2018 - [c106]Chung Hwan Kim, Taegyu Kim, Hongjun Choi, Zhongshu Gu, Byoungyoung Lee, Xiangyu Zhang, Dongyan Xu:
Securing Real-Time Microcontroller Systems through Customized Memory View Switching. NDSS 2018 - [c105]Yonghwi Kwon, Fei Wang, Weihang Wang, Kyu Hyung Lee, Wen-Chuan Lee, Shiqing Ma, Xiangyu Zhang, Dongyan Xu, Somesh Jha, Gabriela F. Ciocarlie, Ashish Gehani, Vinod Yegneswaran:
MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation. NDSS 2018 - [c104]Shiqing Ma, Juan Zhai, Yonghwi Kwon, Kyu Hyung Lee, Xiangyu Zhang, Gabriela F. Ciocarlie, Ashish Gehani, Vinod Yegneswaran, Dongyan Xu, Somesh Jha:
Kernel-Supported Cost-Effective Audit Logging for Causality Tracking. USENIX ATC 2018: 241-254 - [i3]Zhan Tu, Fan Fei, Matthew Eagon, Xiangyu Zhang, Dongyan Xu, Xinyan Deng:
Redundancy-Free UAV Sensor Fault Isolation And Recovery. CoRR abs/1812.00063 (2018) - 2017
- [j30]Seung Jei Yang, Jung Ho Choi, Ki Bom Kim, Rohit Bhatia, Brendan Saltaformaggio, Dongyan Xu:
Live acquisition of main memory data from Android smartphones and smartwatches. Digit. Investig. 23: 50-62 (2017) - [c103]Taegyu Kim, Chung Hwan Kim, Hongjun Choi, Yonghwi Kwon, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu:
RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications. ACSAC 2017: 412-424 - [c102]Yonghwi Kwon, Weihang Wang, Yunhui Zheng, Xiangyu Zhang, Dongyan Xu:
CPR: cross platform binary code reuse via platform independent trace program. ISSTA 2017: 158-169 - [c101]Yonghwi Kwon, Brendan Saltaformaggio, I Luk Kim, Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu:
Self Destructing Exploit Executions via Input Perturbation. NDSS 2017 - [c100]Shiqing Ma, Juan Zhai, Fei Wang, Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu:
MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning. USENIX Security Symposium 2017: 1111-1128 - [c99]Kyungtae Kim, I Luk Kim, Chung Hwan Kim, Yonghwi Kwon, Yunhui Zheng, Xiangyu Zhang, Dongyan Xu:
J-Force: Forced Execution on JavaScript. WWW 2017: 897-906 - [e5]Bhavani Thuraisingham, David Evans, Tal Malkin, Dongyan Xu:
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017. ACM 2017, ISBN 978-1-4503-4946-8 [contents] - 2016
- [c98]Kexin Pei, Zhongshu Gu, Brendan Saltaformaggio, Shiqing Ma, Fei Wang, Zhiwei Zhang, Luo Si, Xiangyu Zhang, Dongyan Xu:
HERCULE: attack story reconstruction via community discovery on correlated log graph. ACSAC 2016: 583-595 - [c97]Yonghwi Kwon, Dohyeong Kim, William N. Sumner, Kyungtae Kim, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu:
LDX: Causality Inference by Lightweight Dual Execution. ASPLOS 2016: 503-515 - [c96]Hui Lu, Brendan Saltaformaggio, Cong Xu, Umesh Bellur, Dongyan Xu:
BASS: Improving I/O Performance for Cloud Block Storage via Byte-Addressable Storage Stack. SoCC 2016: 169-181 - [c95]Hui Lu, Abhinav Srivastava, Brendan Saltaformaggio, Dongyan Xu:
StorM: Enabling Tenant-Defined Cloud Storage Middle-Box Services. DSN 2016: 73-84 - [c94]Shiqing Ma, Xiangyu Zhang, Dongyan Xu:
ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting. NDSS 2016 - [c93]Chung Hwan Kim, Junghwan Rhee, Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu:
PerfGuard: binary-centric application performance monitoring in production environments. SIGSOFT FSE 2016: 595-606 - [c92]Cheng Cheng, Zhui Deng, Zhongshu Gu, Dongyan Xu:
vMocity: Traveling VMs Across Heterogeneous Clouds. SRDS 2016: 101-110 - [c91]Brendan Saltaformaggio, Rohit Bhatia, Xiangyu Zhang, Dongyan Xu, Golden G. Richard III:
Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images. USENIX Security Symposium 2016: 1137-1151 - [c90]Brendan Saltaformaggio, Hongjun Choi, Kristen Johnson, Yonghwi Kwon, Qi Zhang, Xiangyu Zhang, Dongyan Xu, John Qian:
Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic. WOOT 2016 - 2015
- [c89]Hui Lu, Cong Xu, Cheng Cheng, Ramana Rao Kompella, Dongyan Xu:
vHaul: Towards Optimal Scheduling of Live Multi-VM Migration for Multi-tier Applications. CLOUD 2015: 453-460 - [c88]Shiqing Ma, Kyu Hyung Lee, Chung Hwan Kim, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu:
Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows. ACSAC 2015: 401-410 - [c87]Dohyeong Kim, Yonghwi Kwon, William N. Sumner, Xiangyu Zhang, Dongyan Xu:
Dual Execution for On the Fly Fine Grained Execution Comparison. ASPLOS 2015: 325-338 - [c86]Zhui Deng, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu:
iRiS: Vetting Private API Abuse in iOS Applications. CCS 2015: 44-56 - [c85]Brendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu:
GUITAR: Piecing Together Android App GUIs from Memory Images. CCS 2015: 120-132 - [c84]Brendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu:
VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images. CCS 2015: 146-157 - [c83]Chung Hwan Kim, Sungjin Park, Junghwan Rhee, Jong-Jin Won, Taisook Han, Dongyan Xu:
CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality. AsiaCCS 2015: 651-656 - [c82]Hui Lu, Brendan Saltaformaggio, Ramana Rao Kompella, Dongyan Xu:
vFair: latency-aware fair storage scheduling via per-IO cost-based differentiation. SoCC 2015: 125-138 - [c81]Zhongshu Gu, Kexin Pei, Qifan Wang, Luo Si, Xiangyu Zhang, Dongyan Xu:
LEAPS: Detecting Camouflaged Attacks with Statistical Learning Guided by Program Analysis. DSN 2015: 57-68 - [c80]Ping Chen, Jun Xu, Zhiqiang Lin, Dongyan Xu, Bing Mao, Peng Liu:
A Practical Approach for Adaptive Data Structure Layout Randomization. ESORICS (1) 2015: 69-89 - [c79]Cong Xu, Brendan Saltaformaggio, Sahan Gamage, Ramana Rao Kompella, Dongyan Xu:
vRead: Efficient Data Access for Hadoop in Virtualized Clouds. Middleware 2015: 125-136 - [c78]Yonghwi Kwon, Fei Peng, Dohyeong Kim, Kyungtae Kim, Xiangyu Zhang, Dongyan Xu, Vinod Yegneswaran, John Qian:
P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions. NDSS 2015 - 2014
- [j29]Junghwan Rhee, Ryan D. Riley, Zhiqiang Lin, Xuxian Jiang, Dongyan Xu:
Data-Centric OS Kernel Malware Characterization. IEEE Trans. Inf. Forensics Secur. 9(1): 72-87 (2014) - [c77]Sahan Gamage, Cong Xu, Ramana Rao Kompella, Dongyan Xu:
vPipe: Piped I/O Offloading for Efficient Data Movement in Virtualized Clouds. SoCC 2014: 27:1-27:13 - [c76]Dongyan Xu:
Virtualization and security: happily ever after? CODASPY 2014: 73-74 - [c75]Zhongshu Gu, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu:
FACE-CHANGE: Application-Driven Dynamic Kernel View Switching in a Virtual Machine. DSN 2014: 491-502 - [c74]Dohyeong Kim, William N. Sumner, Xiangyu Zhang, Dongyan Xu, Hira Agrawal:
Reuse-oriented reverse engineering of functional components from x86 binaries. ICSE 2014: 1128-1139 - [c73]Hui Zhang, Junghwan Rhee, Nipun Arora, Sahan Gamage, Guofei Jiang, Kenji Yoshihira, Dongyan Xu:
CLUE: System trace analytics for cloud service performance diagnosis. NOMS 2014: 1-9 - [c72]Chung Hwan Kim, Junghwan Rhee, Hui Zhang, Nipun Arora, Guofei Jiang, Xiangyu Zhang, Dongyan Xu:
IntroPerf: transparent context-sensitive multi-layer performance inference using system stack traces. SIGMETRICS 2014: 235-247 - [c71]Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu:
DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse. USENIX Security Symposium 2014: 255-269 - [c70]Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, Zhendong Su:
X-Force: Force-Executing Binary Programs for Security Applications. USENIX Security Symposium 2014: 829-844 - [e4]Beth Plale, Matei Ripeanu, Franck Cappello, Dongyan Xu:
The 23rd International Symposium on High-Performance Parallel and Distributed Computing, HPDC'14, Vancouver, BC, Canada - June 23 - 27, 2014. ACM 2014, ISBN 978-1-4503-2749-7 [contents] - 2013
- [j28]Sahan Gamage, Ramana Rao Kompella, Dongyan Xu, Ardalan Kangarlou:
Protocol Responsibility Offloading to Improve TCP Throughput in Virtualized Environments. ACM Trans. Comput. Syst. 31(3): 7 (2013) - [j27]Sahan Gamage, Ramana Rao Kompella, Dongyan Xu:
vPipe: One Pipe to Connect Them All. login Usenix Mag. 38(5) (2013) - [c69]Zhui Deng, Xiangyu Zhang, Dongyan Xu:
SPIDER: stealthy binary program instrumentation and debugging via hardware virtualization. ACSAC 2013: 289-298 - [c68]Junyuan Zeng, Yangchun Fu, Kenneth A. Miller, Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu:
Obfuscation resilient binary code reuse through trace-oriented programming. CCS 2013: 487-498 - [c67]Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu:
LogGC: garbage collecting audit log. CCS 2013: 1005-1016 - [c66]Zhongshu Gu, William N. Sumner, Zhui Deng, Xiangyu Zhang, Dongyan Xu:
DRIP: A framework for purifying trojaned kernel drivers. DSN 2013: 1-12 - [c65]Zhui Deng, Xiangyu Zhang, Dongyan Xu:
BISTRO: Binary Component Extraction and Embedding for Software Security Applications. ESORICS 2013: 200-218 - [c64]Sahan Gamage, Ramana Rao Kompella, Dongyan Xu:
vPipe: One Pipe to Connect Them All! HotCloud 2013 - [c63]Dannie M. Stanley, Dongyan Xu, Eugene H. Spafford:
Improved kernel security through memory layout randomization. IPCCC 2013: 1-10 - [c62]Yonghwi Kwon, Xiangyu Zhang, Dongyan Xu:
PIEtrace: Platform independent executable trace. ASE 2013: 48-58 - [c61]Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu:
High Accuracy Attack Provenance via Binary-based Execution Partition. NDSS 2013 - [c60]Cong Xu, Sahan Gamage, Hui Lu, Ramana Rao Kompella, Dongyan Xu:
vTurbo: Accelerating Virtual Machine I/O Processing Using Designated Turbo-Sliced Core. USENIX ATC 2013: 243-254 - 2012
- [j26]Zhui Deng, Dongyan Xu, Xiangyu Zhang, Xuxian Jiang:
IntroLib: Efficient and transparent library call introspection for malware forensics. Digit. Investig. 9(Supplement): S13-S23 (2012) - [j25]Bo Sang, Jianfeng Zhan, Gang Lu, Haining Wang, Dongyan Xu, Lei Wang, Zhihong Zhang, Zhen Jia:
Precise, Scalable, and Online Request Tracing for Multitier Services of Black Boxes. IEEE Trans. Parallel Distributed Syst. 23(6): 1159-1167 (2012) - [j24]Ardalan Kangarlou, Patrick Eugster, Dongyan Xu:
VNsnap: Taking Snapshots of Virtual Networked Infrastructures in the Cloud. IEEE Trans. Serv. Comput. 5(4): 484-496 (2012) - [c59]Ping Chen, Dongyan Xu, Bing Mao:
CloudER: a framework for automatic software vulnerability location and patching in the cloud. AsiaCCS 2012: 50 - [c58]Cong Xu, Sahan Gamage, Pawan N. Rao, Ardalan Kangarlou, Ramana Rao Kompella, Dongyan Xu:
vSlicer: latency-aware virtual machine scheduling via differentiated-frequency CPU slicing. HPDC 2012: 3-14 - [c57]Dannie M. Stanley, Zhui Deng, Dongyan Xu, Rick Porter, Shane Snyder:
Guest-transparent instruction authentication for self-patching kernels. MILCOM 2012: 1-6 - [c56]Zhiqiang Lin, Junghwan Rhee, Chao Wu, Xiangyu Zhang, Dongyan Xu:
Discovering Semantic Data of Interest from Un-mappable Memory with Confidence. NDSS 2012 - [e3]Dejan S. Milojicic, Dongyan Xu, Vanish Talwar:
9th International Conference on Autonomic Computing, ICAC'12, San Jose, CA, USA, September 16 - 20, 2012. ACM 2012, ISBN 978-1-4503-1520-3 [contents] - 2011
- [j23]Dilma Da Silva, Dongyan Xu, Dan Reed:
Guest editorial - special issue on cloud computing. J. Internet Serv. Appl. 2(2): 139-140 (2011) - [j22]Paul Ruth, Junghwan Rhee, Dongyan Xu, Sebastien Goasguen, Rick Kennell:
Autonomic live adaptation of virtual networked environments in a multidomain infrastructure. J. Internet Serv. Appl. 2(2): 141-154 (2011) - [j21]Dilma Da Silva, Dongyan Xu, Dan Reed:
Guest editorial - second part of special issue on cloud computing. J. Internet Serv. Appl. 2(3): 189 (2011) - [j20]Ardalan Kangarlou, Dongyan Xu, Ulas C. Kozat, Pradeep Padala, Bob Lantz, Ken Igarashi:
In-network live snapshot service for recovering virtual infrastructures. IEEE Netw. 25(4): 12-19 (2011) - [c55]Junghwan Rhee, Zhiqiang Lin, Dongyan Xu:
Characterizing kernel malware behavior with kernel data access patterns. AsiaCCS 2011: 207-216 - [c54]Deepa Srinivasan, Zhi Wang, Xuxian Jiang, Dongyan Xu:
Process out-grafting: an efficient "out-of-VM" approach for fine-grained process execution monitoring. CCS 2011: 363-374 - [c53]Sahan Gamage, Ardalan Kangarlou, Ramana Rao Kompella, Dongyan Xu:
Opportunistic flooding to improve TCP transmit performance in virtualized clouds. SoCC 2011: 24 - [c52]Dongyan Xu:
Challenges in supporting virtual infrastructures in the cloud. VTDC@HPDC 2011: 19-20 - [c51]Zhiqiang Lin, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu, Xuxian Jiang:
SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures. NDSS 2011 - [c50]Zhongshu Gu, Zhui Deng, Dongyan Xu, Xuxian Jiang:
Process Implanting: A New Active Introspection Framework for Virtualization. SRDS 2011: 147-156 - 2010
- [j19]Wei Tsang Ooi, Dongyan Xu:
Guest Editorial: "Special issue on selected papers from NOSSDAV 2009". Multim. Syst. 16(3): 169-170 (2010) - [j18]Ryan D. Riley, Xuxian Jiang, Dongyan Xu:
An Architectural Approach to Preventing Code Injection Attacks. IEEE Trans. Dependable Secur. Comput. 7(4): 351-365 (2010) - [j17]Xuxian Jiang, Xinyuan Wang, Dongyan Xu:
Stealthy malware detection and monitoring through VMM-based "out-of-the-box" semantic view reconstruction. ACM Trans. Inf. Syst. Secur. 13(2): 12:1-12:28 (2010) - [j16]Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu:
Reverse Engineering Input Syntactic Structure from Program Execution and Its Applications. IEEE Trans. Software Eng. 36(5): 688-703 (2010) - [c49]Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu:
Reuse-oriented camouflaging trojan: Vulnerability detection and attack construction. DSN 2010: 281-290 - [c48]Tao Bao, Yunhui Zheng, Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu:
Strict control dependence and its effect on dynamic information flow analyses. ISSTA 2010: 13-24 - [c47]Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu:
Automatic Reverse Engineering of Data Structures from Binary Execution. NDSS 2010 - [c46]Junghwan Rhee, Ryan D. Riley, Dongyan Xu, Xuxian Jiang:
Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory. RAID 2010: 178-197 - [c45]Ardalan Kangarlou, Sahan Gamage, Ramana Rao Kompella, Dongyan Xu:
vSnoop: Improving TCP Throughput in Virtualized Environments via Acknowledgement Offload. SC 2010: 1-11 - [c44]Sina Bahram, Xuxian Jiang, Zhi Wang, Mike Grace, Jinku Li, Deepa Srinivasan, Junghwan Rhee, Dongyan Xu:
DKSM: Subverting Virtual Machine Introspection for Fun and Profit. SRDS 2010: 82-91 - [e2]Erich M. Nahum, Dongyan Xu:
2nd USENIX Workshop on Hot Topics in Cloud Computing, HotCloud'10, Boston, MA, USA, June 22, 2010. USENIX Association 2010 [contents] - [i2]Wei Zhou, Jianfeng Zhan, Dan Meng, Dongyan Xu, Zhihong Zhang:
LogMaster: Mining Event Correlations in Logs of Large scale Cluster Systems. CoRR abs/1003.0951 (2010) - [i1]Bo Sang, Jianfeng Zhan, Zhihong Zhang, Lei Wang, Dongyan Xu, Yabing Huang, Dan Meng:
Precise, Scalable and Online Request Tracing for Multi-tier Services of Black Boxes. CoRR abs/1007.4057 (2010)
2000 – 2009
- 2009
- [c43]Junghwan Rhee, Ryan D. Riley, Dongyan Xu, Xuxian Jiang:
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring. ARES 2009: 74-81 - [c42]Zhiqiang Lin, Ryan D. Riley, Dongyan Xu:
Polymorphing Software by Randomizing Data Structure Layout. DIMVA 2009: 107-126 - [c41]Ardalan Kangarlou, Patrick Eugster, Dongyan Xu:
VNsnap: Taking snapshots of virtual networked environments with minimal downtime. DSN 2009: 524-533 - [c40]Ryan D. Riley, Xuxian Jiang, Dongyan Xu:
Multi-aspect profiling of kernel rootkit behavior. EuroSys 2009: 47-60 - [e1]Wei Tsang Ooi, Dongyan Xu:
Network and Operating System Support for Digital Audio and Video, 19th International Workshop, NOSSDAV 2009, Williamsburg, VA, USA. June 3-5, 2009, Proceedings. ACM 2009 [contents] - 2008
- [j15]Xuxian Jiang, Florian P. Buchholz, Aaron Walters, Dongyan Xu, Yi-Min Wang, Eugene H. Spafford:
Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach. IEEE Trans. Parallel Distributed Syst. 19(7): 890-902 (2008) - [c39]Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu:
Convicting exploitable software vulnerabilities: An efficient input provenance based approach. DSN 2008: 247-256 - [c38]Sebastien Goasguen, Krishna Madhavan, David Wolinsky, Renato J. O. Figueiredo, Jaime Frey, Alain Roy, Paul Ruth, Dongyan Xu:
Middleware Integration and Deployment Strategies for Cyberinfrastructures. GPC 2008: 187-198 - [c37]Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Xiangyu Zhang:
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution. NDSS 2008 - [c36]Ryan D. Riley, Xuxian Jiang, Dongyan Xu:
Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing. RAID 2008: 1-20 - 2007
- [j14]Hiroshi Yamauchi, Dongyan Xu:
Portable virtual cycle accounting for large-scale distributed cycle sharing systems. Parallel Comput. 33(4-5): 314-327 (2007) - [c35]Xuxian Jiang, Xinyuan Wang, Dongyan Xu:
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. CCS 2007: 128-138 - [c34]Ryan D. Riley, Xuxian Jiang, Dongyan Xu:
An Architectural Approach to Preventing Code Injection Attacks. DSN 2007: 30-40 - [c33]Ardalan Kangarlou, Dongyan Xu, Paul Ruth, Patrick Eugster:
Taking snapshots of virtual networked environments. VTDC@SC 2007: 4:1-4:8 - [c32]Xuxian Jiang, Helen J. Wang, Dongyan Xu, Yi-Min Wang:
RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization. SRDS 2007: 209-218 - 2006
- [j13]Xuxian Jiang, Dongyan Xu, Yi-Min Wang:
Collapsar: A VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention. J. Parallel Distributed Comput. 66(9): 1165-1180 (2006) - [j12]Dongyan Xu, Sunil Suresh Kulkarni, Catherine Rosenberg, Heung-Keung Chai:
Analysis of a CDN-P2P hybrid architecture for cost-effective streaming media distribution. Multim. Syst. 11(4): 383-399 (2006) - [j11]Jen-Yeu Chen, Gopal Pandurangan, Dongyan Xu:
Robust Computation of Aggregates in Wireless Sensor Networks: Distributed Randomized Algorithms and Analysis. IEEE Trans. Parallel Distributed Syst. 17(9): 987-1000 (2006) - [j10]Yi Lu, Weichao Wang, Bharat K. Bhargava, Dongyan Xu:
Trust-based privacy preservation for peer-to-peer data sharing. IEEE Trans. Syst. Man Cybern. Part A 36(3): 498-502 (2006) - [c31]Dongyan Xu, Paul Ruth, Junghwan Rhee, Rick Kennell, Sebastien Goasguen:
Autonomic Adaptation of Virtual Distributed Environments in a Multi-Domain Infrastructure. HPDC 2006: 317-320 - [c30]Paul Ruth, Junghwan Rhee, Dongyan Xu, Rick Kennell, Sebastien Goasguen:
Autonomic Live Adaptation of Virtual Computational Environments in a Multi-Domain Infrastructure. ICAC 2006: 5-14 - [c29]Xuxian Jiang, Aaron Walters, Dongyan Xu, Eugene H. Spafford, Florian P. Buchholz, Yi-Min Wang:
Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach. ICDCS 2006: 38 - [c28]Zhelong Pan, Xiaojuan Ren, Rudolf Eigenmann, Dongyan Xu:
Executing MPI programs on virtual machines in an Internet sharing system. IPDPS 2006 - [c27]Daniel R. Bekins, Scott Yost, Matthew Garrett, Jonathan Deutsch, Win Mar Htay, Dongyan Xu, Daniel G. Aliaga:
Mixed Reality Tabletop (MRT): A Low-Cost Teleconferencing Framework for Mixed-Reality Applications. VR 2006: 245-248 - [c26]Xuxian Jiang, Dongyan Xu:
Profiling self-propagating worms via behavioral footprinting. WORM 2006: 17-24 - 2005
- [j9]Paul Ruth, Xuxian Jiang, Dongyan Xu, Sebastien Goasguen:
Virtual Distributed Environments in a Shared Infrastructure. Computer 38(5): 63-69 (2005) - [j8]Mohamed Hefeeda, Ahsan Habib, Dongyan Xu, Bharat K. Bhargava, Boyan Botev:
CollectCast: A peer-to-peer service for media streaming. Multim. Syst. 11(1): 68-81 (2005) - [j7]Ahsan Habib, Dongyan Xu, Mikhail J. Atallah, Bharat K. Bhargava, John Chuang:
A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming. IEEE Trans. Knowl. Data Eng. 17(7): 1010-1014 (2005) - [c25]Paul Ruth, P. McGachey, Dongyan Xu:
VioCluster: Virtualization for Dynamic Computational Domains. CLUSTER 2005: 1-10 - [c24]Jen-Yeu Chen, Gopal Pandurangan, Dongyan Xu:
Robust computation of aggregates in wireless sensor networks: distributed randomized algorithms and analysis. IPSN 2005: 348-355 - [c23]Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford:
Virtual Playgrounds for Worm Behavior Investigation. RAID 2005: 1-21 - 2004
- [j6]Yi Cui, Klara Nahrstedt, Dongyan Xu:
Seamless User-Level Handoff in Ubiquitous Multimedia Service Delivery. Multim. Tools Appl. 22(2): 137-170 (2004) - [c22]Xuxian Jiang, Dongyan Xu, Rudolf Eigenmann:
Protection mechanisms for application service hosting platforms. CCGRID 2004: 656-663 - [c21]Xuxian Jiang, Dongyan Xu:
VIOLIN: Virtual Internetworking on Overlay Infrastructure. ISPA 2004: 937-946 - [c20]Paul Ruth, Dongyan Xu, Bharat K. Bhargava, Fred Regnier:
E-notebook Middleware for Accountability and Reputation Based Trust in Distributed Data Sharing Communities. iTrust 2004: 161-175 - [c19]Catherine Rosenberg, Pascal Pons, Dongyan Xu:
Policy-driven multifile distribution. IWQoS 2004: 193-197 - [c18]Dongyan Xu, Xuxian Jiang:
Towards an integrated multimedia service hosting overlay. ACM Multimedia 2004: 96-103 - [c17]Xuxian Jiang, Dongyan Xu:
Collapsar: A VM-Based Architecture for Network Attack Detention Center. USENIX Security Symposium 2004: 15-28 - 2003
- [c16]Simon G. M. Koo, Catherine Rosenberg, Dongyan Xu:
Analysis of Parallel Downloading for Large File Distribution. FTDCS 2003: 128- - [c15]Xuxian Jiang, Dongyan Xu:
SODA: A Service-On-Demand Architecture for Application Service Hosting Utility Platforms. HPDC 2003: 174-183 - [c14]Xuxian Jiang, Yu Dong, Dongyan Xu, Bharat K. Bhargava:
GnuStream: a P2P media streaming system prototype. ICME 2003: 325-328 - [c13]Mohamed Hefeeda, Ahsan Habib, Boyan Botev, Dongyan Xu, Bharat K. Bhargava:
PROMISE: peer-to-peer media streaming using CollectCast. ACM Multimedia 2003: 45-54 - [c12]Zongpeng Li, Baochun Li, Dongyan Xu, Xin Zhou:
iFlow: Middleware-assisted Rendezvous-based Information Access for Mobile Ad Hoc Applications. MobiSys 2003: 71-84 - [c11]Xuxian Jiang, Dongyan Xu:
vBET: a VM-based emulation testbed. MoMeTools@SIGCOMM 2003: 95-104 - 2002
- [j5]Dongyan Xu, Klara Nahrstedt, Duangdao Wichadakul:
MeGaDiP: A wide-area Media Gateway Discovery Protocol. Inf. Sci. 141(1-2): 37-59 (2002) - [j4]Baochun Li, Dongyan Xu, Klara Nahrstedt:
An integrated runtime QoS-aware middleware framework for distributed multimedia applications. Multim. Syst. 8(5): 420-430 (2002) - [j3]Xiaohui Gu, Klara Nahrstedt, Wanghong Yuan, Duangdao Wichadakul, Dongyan Xu:
An XML-based Quality of Service Enabling Language for the Web. J. Vis. Lang. Comput. 13(1): 61-95 (2002) - [c10]Dongyan Xu, Mohamed Hefeeda, Susanne E. Hambrusch, Bharat K. Bhargava:
On Peer-to-Peer Media Streaming. ICDCS 2002: 363-371 - [c9]Siddhartha K. Goel, Manish Singh, Dongyan Xu, Baochun Li:
Efficient Peer-to-Peer Data Dissemination in Mobile Ad-Hoc Networks. ICPP Workshops 2002: 152-158 - 2001
- [b1]Dongyan Xu:
An Integrated and Qos-Aware Framework for Multimedia Service Management. University of Illinois Urbana-Champaign, USA, 2001 - [j2]Dongyan Xu, Klara Nahrstedt, Duangdao Wichadakul:
QoS and Contention-Aware Multi-Resource Reservation. Clust. Comput. 4(2): 95-107 (2001) - [j1]Klara Nahrstedt, Dongyan Xu, Duangdao Wichadakul, Baochun Li:
QoS-aware middleware for ubiquitous and heterogeneous environments. IEEE Commun. Mag. 39(11): 140-148 (2001) - [c8]Dongyan Xu, Klara Nahrstedt, Duangdao Wichadakul:
QoS-Aware Discovery of Wide-Area Distributed Services. CCGRID 2001: 92-99 - [c7]Yi Cui, Dongyan Xu, Klara Nahrstedt:
SMART: A Scalable Middleware solution for Ubiquitous Multimedia Service Delivery. ICME 2001 - [c6]Duangdao Wichadakul, Klara Nahrstedt, Xiaohui Gu, Dongyan Xu:
2K: An Integrated Approach of QoS Compilation and Reconfigurable, Component-Based Run-Time Middleware for the Unified QoS Management Framework. Middleware 2001: 373-394 - [c5]Baochun Li, Dongyan Xu, Klara Nahrstedt:
Towards integrated runtime solutions in QoS-aware middleware. M3W@MM 2001: 11-14 - 2000
- [c4]Dongyan Xu, Klara Nahrstedt, Arun Viswanathan, Duangdao Wichadakul:
QoS and Contention-Aware Multi-Resource Reservation. HPDC 2000: 3-10 - [c3]Dongyan Xu, Duangdao Wichadakul, Klara Nahrstedt:
Multimedia Service Configuration and Reservation in Heterogeneous Environments. ICDCS 2000: 512-519 - [c2]Dongyan Xu, Duangdao Wichadakul, Klara Nahrstedt:
Resource-Aware Configuration of Ubiquitous Multimedia Services. IEEE International Conference on Multimedia and Expo (II) 2000: 851-854
1990 – 1999
- 1999
- [c1]Dongyan Xu, Baochun Li, Klara Nahrstedt:
QoS-directed error control of video multicast in wireless networks. ICCCN 1999: 257-262
Coauthor Index
aka: Junghwan John Rhee
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint