User profiles for Xinming Ou

Xinming (Simon) Ou

Professor of Computer Science and Engineering, University of South Florida
Verified email at usf.edu
Cited by 8230

Cyber-physical-social interdependencies and organizational resilience: A review of water, transportation, and cyber infrastructure systems and processes

…, Z Wu, Y Zhang, A Tuladhar, X Ou - Sustainable Cities and …, 2020 - Elsevier
Building resilience in critical infrastructures for smart and connected cities requires consideration
of different types of interdependencies. Previous research has mainly conceptualized …

MulVAL: A logic-based network security analyzer.

X Ou, S Govindavajhala, AW Appel - USENIX security symposium, 2005 - usenix.org
To determine the security impact software vulnerabilities have on a particular network, one
must consider interactions among multiple network elements. For a vulnerability analysis tool …

A scalable approach to attack graph generation

X Ou, WF Boyer, MA McQueen - … of the 13th ACM conference on …, 2006 - dl.acm.org
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks.
Previous work on attack graphs has not provided an account of the scalability of the graph …

Amandroid: A precise and general inter-component data flow analysis framework for security vetting of android apps

F Wei, S Roy, X Ou, Robby - ACM Transactions on Privacy and Security …, 2018 - dl.acm.org
We present a new approach to static analysis for security vetting of Android apps and a general
framework called Amandroid. Amandroid determines points-to information for all objects …

Deep ground truth analysis of current android malware

F Wei, Y Li, S Roy, X Ou, W Zhou - … , DIMVA 2017, Bonn, Germany, July 6-7 …, 2017 - Springer
To build effective malware analysis techniques and to evaluate new detection tools, up-to-date
datasets reflecting the current Android malware landscape are essential. For such …

Using Bayesian networks for cyber security analysis

P Xie, JH Li, X Ou, P Liu, R Levy - 2010 IEEE/IFIP International …, 2010 - ieeexplore.ieee.org
Capturing the uncertain aspects in cyber security is important for security analysis in
enterprise networks. However, there has been insufficient effort in studying what modeling …

Towards a theory of moving target defense

R Zhuang, SA DeLoach, X Ou - Proceedings of the first ACM workshop …, 2014 - dl.acm.org
The static nature of cyber systems gives attackers the advantage of time. Fortunately, a new
approach, called the Moving Target Defense (MTD) has emerged as a potential solution to …

Identifying critical attack assets in dependency attack graphs

RE Sawilla, X Ou - Computer Security-ESORICS 2008: 13th European …, 2008 - Springer
Attack graphs have been proposed as useful tools for analyzing security vulnerabilities in
network systems. Even when they are produced efficiently, the size and complexity of attack …

An empirical study on using the national vulnerability database to predict software vulnerabilities

S Zhang, D Caragea, X Ou - … , DEXA 2011, Toulouse, France, August 29 …, 2011 - Springer
Software vulnerabilities represent a major cause of cyber-security problems. The National
Vulnerability Database (NVD) is a public data source that maintains standardized information …

[BOOK][B] Security risk analysis of enterprise networks using probabilistic attack graphs

L Wang, S Jajodia, A Singhal, A Singhal, X Ou - 2017 - Springer
Today’s information systems face sophisticated attackers who combine multiple vulnerabilities
to penetrate networks with devastating impact. The overall security of an enterprise …