USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 17 results:
Filters: Author is Xiangyu Zhang [Clear All Filters]
Extracting Protocol Format as State Machine via Controlled Static Loop Analysis. 32nd USENIX Security Symposium (USENIX Security 23). :7019--7036.
.
2023. Hard-label Black-box Universal Adversarial Patch Attack. 32nd USENIX Security Symposium (USENIX Security 23). :697--714.
.
2023. PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis. 32nd USENIX Security Symposium (USENIX Security 23). :2365--2382.
.
2023. Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract. 32nd USENIX Security Symposium (USENIX Security 23). :1757--1774.
.
2023. ProFactory: Improving IoT Security via Formalized Protocol Customization. 31st USENIX Security Symposium (USENIX Security 22). :3879--3896.
.
2022. Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing. 30th USENIX Security Symposium (USENIX Security 21). :2759--2776.
.
2021. ATLAS: A Sequence-based Learning Approach for Attack Investigation. 30th USENIX Security Symposium (USENIX Security 21). :3005--3022.
.
2021. From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAY. 29th USENIX Security Symposium (USENIX Security 20). :913--930.
.
2020. Software-based Realtime Recovery from Sensor Attacks on Robotic Vehicles. 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). :349--364.
.
2020. RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing. 28th USENIX Security Symposium (USENIX Security 19). :425--442.
.
2019. Kernel-Supported Cost-Effective Audit Logging for Causality Tracking. 2018 USENIX Annual Technical Conference (USENIX ATC 18). :241--254.
.
2018. MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning. 26th USENIX Security Symposium (USENIX Security 17). :1111--1128.
.
2017. Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic. 10th USENIX Workshop on Offensive Technologies (WOOT 16).
.
2016. Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images. 25th USENIX Security Symposium (USENIX Security 16). :1137--1151.
.
2016. SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps. 24th USENIX Security Symposium (USENIX Security 15). :977--992.
.
2015. DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse. 23rd USENIX Security Symposium (USENIX Security 14). :255--269.
.
2014. X-Force: Force-Executing Binary Programs for Security Applications. 23rd USENIX Security Symposium (USENIX Security 14). :829--844.
.
2014.