Biblio

Export 23 results:
Filters: Author is Xiapu Luo  [Clear All Filters]
2023
Li H, Cheng Z, Wu B, Yuan L, Gao C, Yuan W, Luo X.  2023.  Black-box Adversarial Example Attack towards FCG Based Android Malware Detection under Incomplete Feature Information. 32nd USENIX Security Symposium (USENIX Security 23). :1181--1198.
Dong F, Wang L, Nie X, Shao F, Wang H, Li D, Luo X, Xiao X.  2023.  DISTDET: A Cost-Effective Distributed Cyber Threat Detection System. 32nd USENIX Security Symposium (USENIX Security 23). :6575--6592.
Qu J, Ma X, Li J, Luo X, Xue L, Zhang J, Li Z, Feng L, Guan X.  2023.  An Input-Agnostic Hierarchical Deep Learning Framework for Traffic Fingerprinting. 32nd USENIX Security Symposium (USENIX Security 23). :589--606.
Sun Z, Luo X, Zhang Y.  2023.  Panda: Security Analysis of Algorand Smart Contracts. 32nd USENIX Security Symposium (USENIX Security 23). :1811--1828.
Li W, Ruan J, Yi G, Cheng L, Luo X, Cai H.  2023.  PolyFuzz: Holistic Greybox Fuzzing of Multi-Language Systems. 32nd USENIX Security Symposium (USENIX Security 23). :1379--1396.
Xi Z, Du T, Li C, Pang R, Ji S, Luo X, Xiao X, Ma F, Wang T.  2023.  On the Security Risks of Knowledge Graph Reasoning. 32nd USENIX Security Symposium (USENIX Security 23). :3259--3276.
Zhang Y, Hu Y, Ning Z, Zhang F, Luo X, Huang H, Yan S, He Z.  2023.  SHELTER: Extending Arm CCA with Isolation in User Space. 32nd USENIX Security Symposium (USENIX Security 23). :6257--6274.
2022
Li J, Zhou H, Wu S, Luo X, Wang T, Zhan X, Ma X.  2022.  FOAP: Fine-Grained Open-World Android App Fingerprinting. 31st USENIX Security Symposium (USENIX Security 22). :1579--1596.
Li W, Ming J, Luo X, Cai H.  2022.  PolyCruise: A Cross-Language Dynamic Information Flow Analysis. 31st USENIX Security Symposium (USENIX Security 22). :2513--2530.
Xue L, Liu Y, Li T, Zhao K, Li J, Yu L, Luo X, Zhou Y, Gu G.  2022.  SAID: State-aware Defense Against Injection Attacks on In-vehicle Network. 31st USENIX Security Symposium (USENIX Security 22). :1921--1938.
Pang R, Xi Z, Ji S, Luo X, Wang T.  2022.  On the Security Risks of AutoML. 31st USENIX Security Symposium (USENIX Security 22). :3953--3970.
Shen T, Qi J, Jiang J, Wang X, Wen S, Chen X, Zhao S, Wang S, Chen L, Luo X et al..  2022.  SOTER: Guarding Black-box Inference for General Neural Networks at the Edge. 2022 USENIX Annual Technical Conference (USENIX ATC 22). :723--738.
Yu L, Liu Y, Jing P, Luo X, Xue L, Zhao K, Zhou Y, Wang T, Gu G, Nie S et al..  2022.  Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols. 31st USENIX Security Symposium (USENIX Security 22). :1939--1956.
2021
He N, Zhang R, Wang H, Wu L, Luo X, Guo Y, Yu T, Jiang X.  2021.  EOSAFE: Security Analysis of EOSIO Smart Contracts. 30th USENIX Security Symposium (USENIX Security 21). :1271--1288.
Jing P, Tang Q, Du Y, Xue L, Luo X, Wang T, Nie S, Wu S.  2021.  Too Good to Be Safe: Tricking Lane Detection in Autonomous Driving with Crafted Perturbations. 30th USENIX Security Symposium (USENIX Security 21). :3237--3254.
2020
Zhang X, Wang N, Shen H, Ji S, Luo X, Wang T.  2020.  Interpretable Deep Learning under Fire. 29th USENIX Security Symposium (USENIX Security 20). :1659--1676.
Kang Q, Xue L, Morrison A, Tang Y, Chen A, Luo X.  2020.  Programmable In-Network Security for Context-aware BYOD Policies. 29th USENIX Security Symposium (USENIX Security 20). :595-612.
2019
Cheng Z, Hou X, Li R, Zhou Y, Luo X, Li J, Ren K.  2019.  Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum. 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). :47--60.
2018
Morrison A, Xue L, Chen A, Luo X.  2018.  Enforcing Context-Aware BYOD Policies with In-Network Security. 10th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 18).
2017
Xue L, Zhou Y, Chen T, Luo X, Gu G.  2017.  Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART. 26th USENIX Security Symposium (USENIX Security 17). :289--306.
2014
Xue L, Luo X, Chan EWW, Zhan X.  2014.  Towards Detecting Target Link Flooding Attack. 28th Large Installation System Administration Conference (LISA14). :90--105.
2005
Luo X, Chang RKC.  2005.  Novel Approaches to End-to-End Packet Reordering Measurement. Internet Measurement Conference 2005 (IMC 05).