USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 28 results:
Filters: Author is Dongyan Xu [Clear All Filters]
Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations. 33rd USENIX Security Symposium (USENIX Security 24). :4499--4516.
.
2024. SAIN: Improving ICS Attack Detection Sensitivity via State-Aware Invariants. 33rd USENIX Security Symposium (USENIX Security 24). :6597--6613.
.
2024. PatchVerif: Discovering Faulty Patches in Robotic Vehicles. 32nd USENIX Security Symposium (USENIX Security 23). :3011--3028.
.
2023. ZBCAN: A Zero-Byte CAN Defense System. 32nd USENIX Security Symposium (USENIX Security 23). :6893--6910.
.
2023. DnD: A Cross-Architecture Deep Neural Network Decompiler. 31st USENIX Security Symposium (USENIX Security 22). :2135--2152.
.
2022. ProFactory: Improving IoT Security via Formalized Protocol Customization. 31st USENIX Security Symposium (USENIX Security 22). :3879--3896.
.
2022. ATLAS: A Sequence-based Learning Approach for Attack Investigation. 30th USENIX Security Symposium (USENIX Security 21). :3005--3022.
.
2021. Exposing New Vulnerabilities of Error Handling Mechanism in CAN. 30th USENIX Security Symposium (USENIX Security 21). :4241--4258.
.
2021. LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks. 30th USENIX Security Symposium (USENIX Security 21). :339--356.
.
2021. M2MON: Building an MMIO-based Security Reference Monitor for Unmanned Vehicles. 30th USENIX Security Symposium (USENIX Security 21). :285--302.
.
2021. PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications. 30th USENIX Security Symposium (USENIX Security 21). :249--266.
.
2021. SHARD: Fine-Grained Kernel Specialization with Context-Aware Hardening. 30th USENIX Security Symposium (USENIX Security 21). :2435--2452.
.
2021. BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy. 14th USENIX Workshop on Offensive Technologies (WOOT 20).
.
2020. BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks. 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). :397--411.
.
2020. From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAY. 29th USENIX Security Symposium (USENIX Security 20). :913--930.
.
2020. Software-based Realtime Recovery from Sensor Attacks on Robotic Vehicles. 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). :349--364.
.
2020. RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing. 28th USENIX Security Symposium (USENIX Security 19). :425--442.
.
2019. Kernel-Supported Cost-Effective Audit Logging for Causality Tracking. 2018 USENIX Annual Technical Conference (USENIX ATC 18). :241--254.
.
2018. MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning. 26th USENIX Security Symposium (USENIX Security 17). :1111--1128.
.
2017. Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic. 10th USENIX Workshop on Offensive Technologies (WOOT 16).
.
2016. Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images. 25th USENIX Security Symposium (USENIX Security 16). :1137--1151.
.
2016. DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse. 23rd USENIX Security Symposium (USENIX Security 14). :255--269.
.
2014. X-Force: Force-Executing Binary Programs for Security Applications. 23rd USENIX Security Symposium (USENIX Security 14). :829--844.
.
2014. vPipe: One Pipe to Connect Them All!. 5th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 13).
.
2013. vTurbo: Accelerating Virtual Machine I/O Processing Using Designated Turbo-Sliced Core. 2013 USENIX Annual Technical Conference (USENIX ATC 13). :243--254.
.
2013.