Biblio

Export 22 results:
Filters: Author is Dongyan Xu  [Clear All Filters]
2021
Alsaheel A, Nan Y, Ma S, Yu L, Walkup G, Z. Celik B, Zhang X, Xu D.  2021.  ATLAS: A Sequence-based Learning Approach for Attack Investigation. 30th {USENIX} Security Symposium ({USENIX} Security 21). :3005--3022.
Serag K, Bhatia R, Kumar V, Z. Celik B, Xu D.  2021.  Exposing New Vulnerabilities of Error Handling Mechanism in CAN. 30th {USENIX} Security Symposium ({USENIX} Security 21). :4241--4258.
Wu J, Wu R, Antonioli D, Payer M, Tippenhauer NOle, Xu D, Tian D, Bianchi A.  2021.  LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks. 30th {USENIX} Security Symposium ({USENIX} Security 21). :339--356.
Khan A, Kim H, Lee B, Xu D, Bianchi A, Tian D.  2021.  M2MON: Building an MMIO-based Security Reference Monitor for Unmanned Vehicles. 30th {USENIX} Security Symposium ({USENIX} Security 21). :285--302.
Kim T, Kumar V, Rhee J, Chen J, Kim K, Kim CHwan, Xu D, Tian D.  2021.  PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications. 30th {USENIX} Security Symposium ({USENIX} Security 21). :249--266.
Abubakar M, Ahmad A, Fonseca P, Xu D.  2021.  SHARD: Fine-Grained Kernel Specialization with Context-Aware Hardening. 30th {USENIX} Security Symposium ({USENIX} Security 21). :2435--2452.
2020
Wu J, Nan Y, Kumar V, Tian D, Bianchi A, Payer M, Xu D.  2020.  BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy. 14th {USENIX} Workshop on Offensive Technologies ({WOOT} 20).
Wu J, Nan Y, Kumar V, Payer M, Xu D.  2020.  BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks. 23rd International Symposium on Research in Attacks, Intrusions and Defenses ({RAID} 2020). :397--411.
Kim T, Kim CHwan, Ozen A, Fei F, Tu Z, Zhang X, Deng X, Tian D, Xu D.  2020.  From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAY. 29th {USENIX} Security Symposium ({USENIX} Security 20). :913--930.
Choi H, Kate S, Aafer Y, Zhang X, Xu D.  2020.  Software-based Realtime Recovery from Sensor Attacks on Robotic Vehicles. 23rd International Symposium on Research in Attacks, Intrusions and Defenses ({RAID} 2020). :349--364.
2018
Ma S, Zhai J, Kwon Y, Lee KHyung, Zhang X, Ciocarlie G, Gehani A, Yegneswaran V, Xu D, Jha S.  2018.  Kernel-Supported Cost-Effective Audit Logging for Causality Tracking. 2018 {USENIX} Annual Technical Conference ({USENIX} {ATC} 18). :241--254.
2017
Ma S, Zhai J, Wang F, Lee KHyung, Zhang X, Xu D.  2017.  MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning. 26th {USENIX} Security Symposium ({USENIX} Security 17). :1111--1128.
2014
Saltaformaggio B, Gu Z, Zhang X, Xu D.  2014.  DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse. 23rd {USENIX} Security Symposium ({USENIX} Security 14). :255--269.
Peng F, Deng Z, Zhang X, Xu D, Lin Z, Su Z.  2014.  X-Force: Force-Executing Binary Programs for Security Applications. 23rd {USENIX} Security Symposium ({USENIX} Security 14). :829--844.
2013
Gamage S, Kompella R, Xu D.  2013.  vPipe: One Pipe to Connect Them All!. 5th {USENIX} Workshop on Hot Topics in Cloud Computing (HotCloud 13).
Xu C, Gamage S, Lu H, Kompella R, Xu D.  2013.  vTurbo: Accelerating Virtual Machine I/O Processing Using Designated Turbo-Sliced Core. 2013 {USENIX} Annual Technical Conference ({USENIX} {ATC} 13). :243--254.
2010
Nahum E, Xu D.  2010.  Welcome and Introduction. 2nd {USENIX} Workshop on Hot Topics in Cloud Computing (HotCloud 10).
2004
Jiang X, Xu D.  2004.  Collapsar: A VM-Based Architecture for Network Attack Detention Center. 13th {USENIX} Security Symposium ({USENIX} Security 04).
2003
Li Z, Li B, Xu D, Zhou X.  2003.  iFlow: Middleware-assisted Rendezvous-based Information Access for Mobile Ad Hoc Applications. First International Conference on Mobile Systems, Applications, and Services (MobiSys2003).