Biblio

Export 24 results:
Filters: Author is Dongyan Xu  [Clear All Filters]
2022
Wu R, Kim T, Tian D, Bianchi A, Xu D.  2022.  DnD: A Cross-Architecture Deep Neural Network Decompiler. 31st USENIX Security Symposium (USENIX Security 22). :2135--2152.
Wang F, Wu J, Nan Y, Aafer Y, Zhang X, Xu D, Payer M.  2022.  ProFactory: Improving IoT Security via Formalized Protocol Customization. 31st USENIX Security Symposium (USENIX Security 22). :3879--3896.
2021
Alsaheel A, Nan Y, Ma S, Yu L, Walkup G, Z. Celik B, Zhang X, Xu D.  2021.  ATLAS: A Sequence-based Learning Approach for Attack Investigation. 30th USENIX Security Symposium (USENIX Security 21). :3005--3022.
Serag K, Bhatia R, Kumar V, Z. Celik B, Xu D.  2021.  Exposing New Vulnerabilities of Error Handling Mechanism in CAN. 30th USENIX Security Symposium (USENIX Security 21). :4241--4258.
Wu J, Wu R, Antonioli D, Payer M, Tippenhauer NOle, Xu D, Tian D, Bianchi A.  2021.  LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks. 30th USENIX Security Symposium (USENIX Security 21). :339--356.
Khan A, Kim H, Lee B, Xu D, Bianchi A, Tian D.  2021.  M2MON: Building an MMIO-based Security Reference Monitor for Unmanned Vehicles. 30th USENIX Security Symposium (USENIX Security 21). :285--302.
Kim T, Kumar V, Rhee J, Chen J, Kim K, Kim CHwan, Xu D, Tian D.  2021.  PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications. 30th USENIX Security Symposium (USENIX Security 21). :249--266.
Abubakar M, Ahmad A, Fonseca P, Xu D.  2021.  SHARD: Fine-Grained Kernel Specialization with Context-Aware Hardening. 30th USENIX Security Symposium (USENIX Security 21). :2435--2452.
2020
Wu J, Nan Y, Kumar V, Tian D, Bianchi A, Payer M, Xu D.  2020.  BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy. 14th USENIX Workshop on Offensive Technologies (WOOT 20).
Wu J, Nan Y, Kumar V, Payer M, Xu D.  2020.  BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks. 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). :397--411.
Kim T, Kim CHwan, Ozen A, Fei F, Tu Z, Zhang X, Deng X, Tian D, Xu D.  2020.  From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAY. 29th USENIX Security Symposium (USENIX Security 20). :913--930.
Choi H, Kate S, Aafer Y, Zhang X, Xu D.  2020.  Software-based Realtime Recovery from Sensor Attacks on Robotic Vehicles. 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). :349--364.
2013
Gamage S, Kompella R, Xu D.  2013.  vPipe: One Pipe to Connect Them All!. 5th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 13).
Xu C, Gamage S, Lu H, Kompella R, Xu D.  2013.  vTurbo: Accelerating Virtual Machine I/O Processing Using Designated Turbo-Sliced Core. 2013 USENIX Annual Technical Conference (USENIX ATC 13). :243--254.
2010
Nahum E, Xu D.  2010.  Welcome and Introduction. 2nd USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 10).
2004
Jiang X, Xu D.  2004.  Collapsar: A VM-Based Architecture for Network Attack Detention Center. 13th USENIX Security Symposium (USENIX Security 04).
2003
Li Z, Li B, Xu D, Zhou X.  2003.  iFlow: Middleware-assisted Rendezvous-based Information Access for Mobile Ad Hoc Applications. First International Conference on Mobile Systems, Applications, and Services (MobiSys2003).