Selected Publications
Journal Publications
-
H. Grimes, G. Ciocarlie, B. Yu, D. Wijesekera, G. Shannon, W. Austad, C. Fracchia, D. Xu, T. Kurfess, L. Strama, M. Mylrea,
B. Reid,
"PURE Biomanufacturing: Secure, Pandemic-Adaptive Biomanufacturing",
IEEE Security and Privacy Magazine, 20(6),
2022.
-
Sungjin Park, Chung Hwan Kim, Junghwan Rhee, Jong-Jin Won,
Taisook Han, Dongyan Xu,
"CAFE: A Virtualization-Based Approach to Protecting Sensitive
Cloud Application Logic Confidentiality", IEEE Transactions on Dependable and Secure Computing
(TDSC), 17(4), 2020.
-
Junghwan Rhee, Ryan Riley, Zhiqiang Lin, Xuxian Jiang, Dongyan Xu,
"Data-Centric OS Kernel Malware Characterization", IEEE Transactions on Information Forensics and Security
(TIFS), 9(1), 2014.
-
Sahan Gamage, Ardalan Kangarlou, Ramana Kompella, Dongyan Xu,
"Protocol Responsibility Offloading to Improve TCP Throughput in Virtualized Environments",
ACM Transactions on Computer Systems (TOCS), 31(3), 2013.
-
Bo Sang, Jianfeng Zhan, Gang Lu, Haing Wang, Dongyan Xu, Lei Wang, Zhihong Zhang,
"Precise, Scalable, and Online Request Tracing for Multi-tier Services of Black
Boxes", IEEE Transactions on Parallel and Distributed Systems (TPDS), 23(6),
2012.
-
Ardalan Kangarlou, Patrick Eugster, Dongyan Xu,
"VNsnap: Taking Snapshots of Virtual Networked Infrastructures in the
Cloud",
IEEE Transactions on Services Computing (TSC), Special Issue on Cloud
Computing, 5(4), 2012.
-
Ardalan Kangarlou, Ulas Kozat, Pradeep Padala, Bob Lantz, Ken
Igarashi, Dongyan Xu,
"In-Network Live Snapshot Service for Recovering Virtual
Infrastructures",
IEEE Network, Special Issue on Cloud
Computing, 25(4), 2011.
-
Ryan Riley, Xuxian Jiang, Dongyan Xu,
"An Architectural Approach to Preventing Code Injection Attacks",
IEEE Transactions on Dependable and Secure
Computing (TDSC), Special Issue on DSN 2007, 7(4), 2010.
-
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu,
"Reverse Engineering Input Syntactic Structure from Program
Execution and Its Applications",
IEEE Transactions on Software Engineering
(TSE), 36(5),
2010.
-
Xuxian Jiang, Xinyuan Wang, Dongyan Xu,
"Stealthy Malware Detection and Monitoring
Through VMM-Based `Out of the Box' Semantic View Reconstruction",
ACM Transactions on Information and System
Security
(TISSEC), Special Issue on CCS 2007, 13(2), 2010.
-
Xuxian Jiang, Florian Buchholz, AAron Walters, Dongyan Xu, Yi-Min Wang,
Eugene H. Spafford,
"Tracing Worm Break-in and Contaminations via Process
Coloring: A Provenance-Preserving Approach",
IEEE Transactions on Parallel and Distributed Systems (TPDS),
19(7), 2008.
-
Hiroshi Yamauchi, Dongyan Xu,
"Portable Virtual Cycle Accounting for Large-Scale Distributed
Cycle Sharing Systems", Parallel Computing, Special Issue on
Large-Scale Grid,
33(4-5), 2007.
-
Xuxian Jiang, Dongyan Xu, Yi-Min Wang,
"Collapsar: A VM-Based Honeyfarm and Reverse Honeyfarm Architecture
for Network Attack Capture and Detention",
Journal of Parallel and Distributed Computing,
Special Issue on Security In Grid and Distributed Systems, 66(9),
2006 (12.2%).
-
Dongyan Xu, Sunil Kulkarni, Catherine Rosenberg, Heung-Keung Chai,
"Analysis of a CDN-P2P Hybrid Architecture for Cost-Effective
Streaming Distribution",
ACM/Springer Multimedia Systems Journal, 11(4), 2006.
-
Jen-Yeu Chen, Gopal Pandurangan, Dongyan Xu,
"Robust Computation of Aggregates in
Wireless Sensor Networks: Distributed Randomized Algorithms and
Analysis", IEEE
Transactions on Parallel and Distributed Systems, 17(9), 2006.
-
Mohamed Hefeeda, Ahsan Habib, Dongyan Xu, Bharat Bhargava,
Boyan Botev,
"CollectCast: A Peer-to-Peer Service for Media Streaming",
ACM/Springer Multimedia Systems Journal, 11(1), 2005.
-
Paul Ruth, Xuxian Jiang, Dongyan Xu, Sebastien Goasguen,
"Virtual Distributed Environments in a Shared Infrastructure",
IEEE Computer, Special Issue on Virtualization Technologies, May 2005.
-
Ahsan Habib, Dongyan Xu, Mikhail Atallah, Bharat
Bhargava, and John Chuang, "A Tree-Based Forward
Digest Protocol
to Verify Data
Integrity in Distributed Media Streaming" (short paper), IEEE
Transactions on
Knowledge and Data Engineering, 17(7), 2005.
-
Baochun Li, Dongyan Xu and Klara Nahrstedt, "An Integrated
Runtime QoS-Aware Middleware
Framework for Distributed Multimedia Applications", ACM/Springer
Multimedia Systems
Journal, Special Issue on Multimedia Middleware, 8(5), 2002
(Preliminary version also appeared in ACM Multimedia Middleware Workshop 2001).
-
Dongyan Xu, Klara Nahrstedt, Duangdao Wichadakul, "QoS and Contention Aware
Multi-Resource
Reservation", Cluster Computing, the Journal of
Networks, Software Tools and
Applications,
4(2), Springer, 2001 (Preliminary version also appeared in IEEE HPDC
2000).
-
Klara Nahrstedt, Dongyan Xu, Duangdao Wichadakul, Baochun Li, "QoS-Aware Middleware for
Ubiquitous and Heterogeneous Environments", IEEE Communications Magazine, 39(11),
2001.
-
Dongyan Xu, Klara Nahrstedt, Duangdao Wichadakul, "MeGaDiP: A
Wide-Area Media Gateway Discovery
Protocol", Information Sciences, Special Issue on Intelligent Multimedia Computing and
Networking, 141(1-2), Elsevier Science, 2002.
Conference and Workshop Publications
- Syed Ghazanfar Abbas, Muslum Ozgur Ozmen, Abdulellah Alsaheel, Arslan Khan,
Z. Berkay Celik, Dongyan Xu
"SAIN: Improving ICS Attack Detection Sensitivity via State-Aware Invariants,"
Proceedings of the 33rd USENIX Security Symposium (Security'24),
Philadelphia, PA, August 2024 (?%).
- Jianliang Wu, Patrick Traynor, Dongyan Xu, Dave (Jing) Tian, Antonio Bianchi
"Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations,"
Proceedings of the 33rd USENIX Security Symposium (Security'24),
Philadelphia, PA, August 2024 (?%).
- Hyungsub Kim,
Rwitam Bandyopadhyay,
Muslum Ozgur Ozmen,
Z. Berkay Celik,
Antonio Bianchi,
Yongdae Kim,
Dongyan Xu
"A Systematic Study of Physical Sensor Attack Hardness,"
Proceedings of the 45th IEEE Symposium on Security and Privacy (S&P'24),
San Francisco, CA, May 2024 (?%).
- Jianliang Wu, Ruoyu Wu, Dongyan Xu, Dave (Jing) Tian, Antonio Bianchi
"SoK: The Long Journey of Exploiting and Defending the Legacy
of King Harald Bluetooth,"
Proceedings of the 45th IEEE Symposium on Security and Privacy (S&P'24),
San Francisco, CA, May 2024 (?%).
- Hyungsub Kim, Muslum Ozgur Ozmen,
Z. Berkay Celik, Antonio Bianchi, Dongyan Xu
"PatchVerif: Discovering Faulty Patches in Robotic Vehicles,"
Proceedings of the 32nd USENIX Security Symposium (Security'23),
Anaheim, CA, August 2023 (?%).
- Khaled Serag, Rohit Bhatia, Akram Faqih, Muslum Ozgur Ozmen, Vireshwar Kumar,
Z. Berkay Celik, Dongyan Xu
"ZBCAN: A Zero-Byte CAN Defense System,"
Proceedings of the 32nd USENIX Security Symposium (Security'23),
Anaheim, CA, August 2023 (?%).
- Arslan Khan, Dongyan Xu, Dave (Jing) Tian,
"EC: Embedded Systems Compartmentalization via Intra-Kernel Isolation,"
Proceedings of the 44th IEEE Symposium on Security and Privacy (S&P'23),
San Francisco, CA, May 2023 (?%).
- Arslan Khan, Dongyan Xu, Dave (Jing) Tian,
"Low-Cost Privilege Separation with Compile Time Compartmentalization for Embedded
Systems,$
Proceedings of the 44th IEEE Symposium on Security and Privacy (S&P'23),
San Francisco, CA, May 2023 (?%).
- Ruoyu Wu, Taegyu Kim, Dave (Jing) Tian, Antonio Bianchi, Dongyan Xu
"DnD: A Cross-Architecture Deep Neural Network
Decompiler,"
Proceedings of the 31st USENIX Security Symposium (Security'22),
Boston, MA, August 2022 (?%).
- Fei Wang, Jianliang Wu, Yuhong Nan, Yousra Aafer, Xiangyu Zhang, Dongyan Xu, Mathias Payer,
"ProFactory: Improving IoT Security via Formalized Protocol Customization,"
Proceedings of the 31st USENIX Security Symposium (Security'22),
Boston, MA, August 2022 (?%).
- Taegyu Kim,
Aolin Ding,
Sriharsha Etigowni,
Pengfei Sun,
Jizhou Chen,
Luis Garcia,
Saman Zonouz,
Dongyan Xu,
Dave (Jing) Tian,
"Reverse Engineering and Retrofitting Robotic Aerial Vehicle
Control Firmware using DisPatch,"
Proceedings of the 20th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys'22),
Portland, OR, June 2022 (21.6%).
- Sungwoo Kim, Gisu Yeo, Taegyu Kim, Junghwan John Rhee, Yuseok Jeon, Antonio Bianchi, Dongyan Xu, Dave (Jing)
Tian,
"ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs,"
Proceedings of the 17th ACM ASIA Conference on Computer and Communications Security (ASIACCS'22),
Nagasaki, Japan, May 2022 (18.4%).
- Hyungsub Kim, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Dongyan Xu,
"PGPATCH: Policy-Guided Logic Bug Patching for Robotic Vehicles,"
Proceedings of the 43rd IEEE Symposium on Security and Privacy (S&P'22),
San Francisco, CA, May 2022 (14.5%).
- Jianliang Wu, Ruoyu Wu, Dongyan Xu, Dave (Jing) Tian, and Antonio Bianchi,
"Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities,"
Proceedings of the 43rd IEEE Symposium on Security and Privacy (S&P'22),
San Francisco, CA, May 2022 (14.5%).
- Khaled Serag, Rohit Bhatia, Vireshwar Kumar, Berkay Celik, Dongyan Xu,
"Exposing New Vulnerabilities of Error Handling Mechanism in CAN,"
Proceedings of the 30th USENIX Security Symposium (Security'21),
Vancouver, BC, August 2021 (19%).
- Taegyu Kim, Vireshwar Kumar, Junghwan Rhee, Jizhou Chen, Kyungtae Kim, Chunghwan Kim, Dongyan Xu,
Dave (Jing) Tian,
"PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-metal Embedded Applications,"
Proceedings of the 30th USENIX Security Symposium (Security'21),
Vancouver, BC, August 2021 (19%).
- Arslan Khan, Hyungsub Kim, Byoungyoung Lee, Dongyan Xu, Antonio Bianchi, Dave (Jing) Tian,
"M2MON: Building an MMIO-based Security Reference Monitor for Unmanned Vehicles,"
Proceedings of the 30th USENIX Security Symposium (Security'21),
Vancouver, BC, August 2021 (19%).
- Jianliang Wu, Ruoyu Wu, Daniele Antonioli, Mathias Payer, Nils Ole Tippenhauer, Dongyan Xu, Dave
(Jing) Tian, Antonio Bianchi,
"LIGHTBLUE : Automatic Profile-Aware Debloating of Bluetooth Stacks,"
Proceedings of the 30th USENIX Security Symposium (Security'21),
Vancouver, BC, August 2021 (19%).
- Muhammad Abubakar, Adil Ahmad, Pedro Fonseca, Dongyan Xu,
"SHARD: Fine-Grained Kernel Specialization with Context-Aware Hardening,"
Proceedings of the 30th USENIX Security Symposium (Security'21),
Vancouver, BC, August 2021 (19%).
- Abdulellah Alsaheel, Yuhong Nan, Shiqing Ma, Le Yu, Gregory Walkup, Z. Berkay Celik, Xiangyu Zhang,
Dongyan Xu,
"ATLAS: A Sequence-based Learning Approach for Attack Investigation,"
Proceedings of the 30th USENIX Security Symposium (Security'21),
Vancouver, BC, August 2021 (19%).
-
Rohit Bhatia, Vireshwar Kumar, Khaled Serag, Z. Berkay Celik,
Mathias Payer, Dongyan Xu,
"Evading Voltage-Based Intrusion Detection on Automotive CAN,"
Proceedings of the 28th Network and Distributed System Security
Symposium (NDSS'21), San Diego, CA,
February 2021 (15.2%).
-
Hyungsub Kim, Muslum O. Ozmen, Antonio Bianchi, Z. Berkay Celik, Dongyan Xu,
"PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles,"
Proceedings of the 28th Network and Distributed System Security
Symposium (NDSS'21), San Diego, CA,
February 2021 (15.2%).
-
Le Yu, Shiqing Ma, Zhuo Zhang, Guanhong Tao, Xiangyu Zhang, Dongyan Xu, Vincent Urias, Han
Wei Lin, Gabriela Ciocarlie, Vinod Yegneswaran, Ashish Gehani,
"ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without
Instrumentation,"
Proceedings of the 28th Network and Distributed System Security
Symposium (NDSS'21), San Diego, CA,
February 2021 (15.2%).
-
Jianliang Wu, Yuhong Nan, Vireshwar Kumar, Mathias Payer, Dongyan Xu,
"BlueShield: Detecting Spoofing Attacks in Bluetooth Low
Energy Networks,"
Proceeding of the 23rd International Symposium on Research in Attacks, Intrusions
and Defenses (RAID'20), Donostia/San Sebastian, Spain,
October 2020 (25.6%).
-
Hongjun Choi, Sayali Kate, Yousra Aafer, Xiangyu Zhang, Dongyan Xu,
"Software-based Realtime Recovery from Sensor Attacks on
Robotic Vehicles,"
Proceeding of the 23rd International Symposium on Research in Attacks, Intrusions
and Defenses (RAID'20), Donostia/San Sebastian, Spain,
October 2020 (25.6%).
-
Hongjun Choi, Sayali Kate, Yousra Aafer, Xiangyu Zhang, Dongyan Xu,
"Cyber-Physical Inconsistency Vulnerability Identification for
Safety Checks in Robotic Vehicles,"
Proceeding of the 27th ACM Conference on Computer and Communications Security (CCS'20), Orlando, FL,
October 2020 (?%).
-
Jianliang Wu, Yuhong Nan, Vireshwar Kumar, Dave (Jing) Tian, Antonio Bianchi, Mathias Payer,
Dongyan Xu,
"BLESA: Spoofing Attacks against Reconnections in Bluetooth
Low Energy,"
Proceeding of the 14th USENIX Workshop on Offensive Technologies (WOOT'20), Online,
August 2020 (33%). Best Paper
Award, CSAW'20 Applied Research Competition
Finalist
- Taegyu Kim, Chung Hwan Kim,
Altay Ozen,
Fan Fei,
Zhan Tu,
Xiangyu Zhang,
Xinyan Deng, Dave (Jing) Tian, Dongyan Xu,
"From Control Model to Program: Investigating Robotic Aerial
Vehicle Accidents with MAYDAY,"
Proceedings of the 29th USENIX Security Symposium (Security'20),
Online, August 2020 (16.1%).
-
Gregory Walkup, Sriharsha Etigowni, Vincent Urias, Han W. Lin, Dongyan Xu,
"Forensic Investigation of Industrial Control Systems Using Deterministic Replay," Proceedings of the
IEEE Conference on Communications and Network Security (CNS'20), Online, June 2020 (28%).
-
Fan Fei, Zhan Tu, Dongyan Xu, Xinyan Deng,
"Learn-to-Recover: Retrofitting UAVs with Reinforcement Learning-Assisted Flight Control Under
Cyber-Physical Attacks," Proceedings of the IEEE International Conference on Robotics
and Automation (ICRA'20), Paris, France, May 2020 (?%).
- Sushant Dinesh, Nathan Burow, Dongyan Xu, Mathias Payer,
"RetroWrite: Statically Instrumenting COTS Binaries for
Fuzzing and Sanitization,"
Proceedings of the 41st IEEE Symposium on Security and Privacy (S&P'20),
Online, May 2020 (?%).
- Zhan Tu, Fan Fei, Matthew Eagon, Dongyan Xu, Xinyan Deng,
"Flight Recovery of MAVs with Compromised IMU,"
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems
(IROS'19),
Macau, China, November 2019 (?%).
- Taegyu Kim, Chung Hwan Kim,
Junghwan Rhee,
Fan Fei,
Zhan Tu,
Gregory Walkup,
Xiangyu Zhang,
Xinyan Deng, Dongyan Xu,
"RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles
through Control-Guided Testing,"
Proceedings of the 28th USENIX Security Symposium (Security'19),
Santa Clara, CA, August 2019 (15.7%).
-
Hongjun Choi, Wen-Chuan Lee, Yousra Aafer, Fan Fei, Zhan Tu, Xiangyu Zhang, Dongyan Xu,
Xinyan Deng,
"Detecting Attacks Against Robotic Vehicles: A Control
Invariant Approach,"
Proceedings of the 25th ACM Conference on Computer and Communications
Security (CCS 2018),
Toronto, Canada, October 2018 (16.6%).
-
Shiqing Ma, Juan Zhai, Yonghwi Kwon, Kyu Hyung Lee,
Xiangyu Zhang, Gabriela Ciocarlie, Ashish Gehani, Vinod Yegneswaran, Dongyan Xu, Somesh Jha,
"Kernel-Supported Cost-Effective Audit Logging for Causality Tracking,"
Proceedings of the 2018 USENIX Annual Technical Conference (ATC 2018), Boston, MA, July 2018 (20.2%).
-
Fan Fei, Zhan Tu, Ruikun Yu, Taegyu Kim, Xiangyu Zhang, Dongyan Xu, Xinyan Deng,
"Cross-Layer Retrofitting of UAVs Against Cyber-Physical Attacks,"
Proceedings of the IEEE International Conference on Robotics and Automation (ICRA 2018), Brisbane, Australia, May 2018 (40%).
-
Chung Hwan Kim,
Taegyu Kim,
Hongjun Choi,
Zhongshu Gu,
Byoungyoung Lee,
Xiangyu Zhang,
Dongyan Xu,
"Securing Real-Time Microcontroller Systems through Customized Memory View Switching,"
Proceedings of the 25th Network and Distributed System
Security
Symposium (NDSS
2018),
San Diego, CA, February 2018 (21%).
-
Rohit Bhatia,
Brendan Saltaformaggio,
Seung Jei Yang,
Aisha Ali-Gombe,
Xiangyu Zhang,
Dongyan Xu,
Golden G. Richard III,
""Tipped Off by Your Memory Allocator": Device-Wide User Activity Sequencing from Android Memory
Images,"
Proceedings of the 25th Network and Distributed System Security
Symposium (NDSS
2018),
San Diego, CA, February 2018 (21%).
-
Yonghwi Kwon,
Fei Wang,
Weihang Wang,
Kyu Hyung Lee,
Wen-Chuan Lee,
Shiqing Ma,
Xiangyu Zhang,
Dongyan Xu,
Somesh Jha,
Gabriela Ciocarlie,
Ashish Gehani,
Vinod Yegneswaran,
"MCI: Modeling-Based Causality Inference in Audit Logging for Attack Investigation,"
Proceedings of the 25th Network and Distributed System Security
Symposium (NDSS
2018),
San Diego, CA, February 2018 (21%).
-
Taegyu Kim, Chung Hwan Kim, Hongjun Choi, Yonghwi Kwon, Brendan Saltaformaggio, Xiangyu
Zhang, Dongyan Xu,
"RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications,"
Proceedings of the Annual Computer Security Applications Conference (ACSAC 2017), San Juan, PR, December 2017 (19.7%).
-
Shiqing Ma, Juan Zhai, Fei Wang, Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu,
"MPI: Multiple Perspective Attack Investigation with Semantic
Aware Execution Partitioning,"
Proceedings of the 26th USENIX Security Symposium (Security'17), Vancouver,
Canada, August
2017 (16.3%) Distinguished Paper
Award.
-
Yonghwi Kwon, Weihang Wang, Yunhui Zheng, Xiangyu Zhang, Dongyan Xu,
"CPR: Cross Platform Binary Code Reuse via Platform Independent Trace Program,"
Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2017), Santa Barbara, CA, July 2017
(26.3%).
-
Kyungtae Kim, I Luk Kim, Chung Hwan Kim, Yonghwi Kwon, Yunhui Zheng, Xiangyu Zhang, Dongyan Xu,
"J-Force: Forced Execution on JavaScript,"
Proceedings of the 26th World Wide Web Conference (WWW
2017),
Perth, Australia, April 2017 (17%).
-
Yonghwi Kwon, Brendan Saltaformaggio, I Luk Kim, Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu,
"A2C: Self-Destructing Exploit Executions via Input Perturbation,"
Proceedings of the 24th Network and Distributed System Security
Symposium (NDSS
2017),
San Diego, CA, February 2017 (16.1%).
-
Kexin Pei, Zhongshu Gu, Brendan Saltaformaggio, Shiqing Ma, Fei Wang, Zhiwei Zhang, Luo Si, Xiangyu
Zhang, Dongyan Xu,
"HERCULE: Attack Story Reconstruction via Community Discovery on Correlated Log Graph,"
Proceedings of the Annual Computer Security Applications Conference (ACSAC 2016), Los Angeles, CA, December 2016 (20.7%).
-
Hui Lu, Brendan Saltaformaggio, Cong Xu, Umesh Bellur, Dongyan Xu,
"BASS: Improving I/O Performance for Cloud Block Storage via
Byte-Addressable Storage Stack,"
Proceedings of the 7th ACM Symposium on Cloud Computing (SOCC 2016), Santa Clara, CA, October 2016 (25%).
-
Chung Hwan Kim, Junghwan Rhee, Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu,
"PerfGuard: Binary-Centric Application Performance Monitoring in Production Environments,"
Proceedings of the ACM SIGSOFT International Symposium on the Foundations of Software
Engineering (FSE'16), Seattle, WA, November
2016 (27%).
-
Cheng Cheng, Zhui Deng, Zhongshu Gu, Dongyan Xu,
"vMocity: Traveling VMs across Heterogeneous Clouds,"
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems
(SRDS'16), Budapest,
Hungary, September 2016 (35%).
-
Brendan Saltaformaggio, Rohit Bhatia, Xiangyu Zhang, Dongyan Xu, Golden Richard,
"Screen after Previous Screens: Spatial-Temporal Recreation of
Android App Displays from Memory Images,"
Proceedings of the 25th USENIX Security Symposium (Security'16), Austin, TX, August
2016 (15.6%).
-
Brendan Saltaformaggio, Hongjun Choi, Kristen Johnson, Yonghwi Kwon,
Qi Zhang, Xiangyu Zhang, Dongyan Xu, John Qian,
"Eavesdropping on Fine-Grained User Activities Within
Smartphone Apps Over Encrypted Network Traffic,"
Proceedings of the 10th USENIX Workshop on Offensive Technologies (WOOT'16), Austin, TX, August
2016 (47.7%).
-
Hui Lu, Abhinav Srivastava, Brendan Saltaformaggio, Dongyan Xu,
"StorM: Enabling Tenant-Defined Cloud Storage Middle-Box Services,"
Proceedings of the 46th IEEE/IFIP International Conference on
Dependable Systems and Networks (DSN 2016), Toulouse, France, June 2016 (22.3%).
-
Yonghwi Kwon, Dohyeong Kim, William N. Sumner, Kyungtae Kim,
Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu,
"LDX: Causality Inference by Lightweight Dual Execution,"
Proceedings of the 21st International Conference on Architectural Support for Programming Languages and Operating Systems
(ASPLOS 2016), Atlanta, GA, March 2016 (22.1%).
-
Shiqing Ma, Xiangyu Zhang, Dongyan Xu,
"ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting,"
Proceedings of the 23rd Network and Distributed System Security
Symposium (NDSS 2016),
San Diego, CA, February 2016 (15.4%) Distinguished Paper
Award.
-
Cong Xu, Brendan Saltaformaggio, Sahan Gamage, Ramana Kompella, Dongyan Xu,
"vRead: Efficient Data Access for Hadoop in Virtualized Clouds,"
Proceedings of the 16th ACM/IFIP/USENIX Middleware conference (Middleware 2015),
Vancouver, Canada, December 2015 (19.5%).
-
Shiqing Ma, Kyu Hyung Lee, Chung Hwan Kim, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu,
"Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows,"
Proceedings of the Annual Computer Security Applications Conference (ACSAC 2015), Los Angeles, CA, December 2015 (24.4%).
-
Brendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu,
"GUITAR: Piecing Together Android App GUIs from Memory Images,"
Proceedings of the 22nd ACM Conference on Computer and Communications
Security (CCS 2015),
Denver, CO, October 2015 (19.8%) Best Paper
Award.
-
Brendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu,
"VCR: App-Agnostic Recovery of Photographic Evidence from
Android Device Memory Images,"
Proceedings of the 22nd ACM Conference on Computer and Communications
Security (CCS 2015),
Denver, CO, October 2015 (19.8%).
-
Zhui Deng, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu,
"iRiS: Vetting Private API Abuse in iOS Applications,"
Proceedings of the 22nd ACM Conference on Computer and Communications
Security (CCS 2015),
Denver, CO, October 2015 (19.8%) Contributed to the confirmation
and removal of hundreds of privacy-violating apps from Apple's App Store.
-
Ping Chen, Jun Xu, Zhiqiang Lin, Dongyan Xu, Bing Mao, Peng Liu,
"A Practical Approach for Adaptive Data Structure Layout Randomization,"
Proceedings of the 20th European Symposium on Research in Computer Security
(ESORICS 2015), Vienna, Austria, September 2015 (19.8%).
-
Hui Lu, Brendan Saltaformaggio, Ramana Kompella, Dongyan Xu,
"vFair: Latency-Aware Fair Storage Scheduling via Per-IO
Cost-Based Differentiation,"
Proceedings of the 6th ACM Symposium on Cloud Computing (SOCC 2015), Kohala Coast, HI, August 2015 (21.6%).
-
Hui Lu, Cong Xu, Cheng Cheng, Ramana Kompella, Dongyan Xu,
"vHaul: Towards Optimal Scheduling of Live Multi-VM Migration for Multi-tier
Applications,"
Proceedings of the 8th IEEE International Conference on Cloud Computing (CLOUD 2015, Applications Track), New York, NY,
June 2015
(14%).
-
Zhongshu Gu, Kexin Pei, Qifan Wang, Luo Si, Xiangyu Zhang, Dongyan Xu,
"Detecting Camouflaged Attacks with Statistical Learning Guided by Program Analysis,"
Proceedings of the 45th IEEE/IFIP International Conference on
Dependable Systems and Networks (DSN 2015), Rio de Janeiro, Brazil, June 2015 (21.7%).
-
Dohyeong Kim, Yonghwi Kwon, William N. Sumner, Xiangyu Zhang, Dongyan Xu,
"Dual Execution for On the Fly Fine Grained Execution Comparison,"
Proceedings of the 20th International Conference on Architectural Support for Programming Languages and Operating Systems
(ASPLOS 2015), Istanbul, Turkey, March 2015 (17.3%).
-
Chung Hwan Kim, Sungjin Park, Junghwan Rhee, Jongjin Won, Taisook Han, Dongyan Xu,
"CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic
Confidentiality," Short Paper in
Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
(ASIACCS 2015), Singapore, April 2015 (23%
full+short).
-
Yonghwi Kwon, Fei Peng, Dohyeong Kim, Kyungtae Kim, Xiangyu Zhang, Dongyan Xu, Vinod Yegneswaran, John
Qian,
"P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions,"
Proceedings of the 22th Network and Distributed System Security
Symposium (NDSS 2015),
San Diego, CA, February 2015 (16.8%).
-
Sahan Gamage, Cong Xu, Ramana Kompella, Dongyan Xu,
"vPipe: Piped I/O Offloading for Efficient Data Movement in
Virtualized Clouds,"
Proceedings of the 5th ACM Symposium on Cloud Computing (SOCC 2014), Seattle, WA, November 2014 (24%).
-
Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu,
"DSCRETE: Automatic Rendering of Forensic Information from
Memory Images via Application Logic Reuse,"
Proceedings of the 23rd USENIX Security Symposium (Security'14), San Diego, CA, August 2014 (19.1%). Best Student Paper
Award
-
Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, Zhendong Su,
"X-Force: Force-Executing Binary Programs for Security
Applications,"
Proceedings of the 23rd USENIX Security Symposium (Security'14), San Diego, CA, August 2014 (19.1%).
-
Zhongshu Gu, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu,
"FACE-CHANGE: Application-Driven Dynamic Kernel View Switching
in a Virtual Machine,"
Proceedings of the 44th IEEE/IFIP International Conference on
Dependable Systems and Networks (DSN 2014), Atlanta, GA, June 2014 (30%).
-
Chung Hwan Kim, Junghwan Rhee, Hui Zhang, Nipun Arora, Guofei Jiang, Xiangyu Zhang, Dongyan Xu,
"IntroPerf: Transparent Context-Sensitive Multi-Layer
Performance Inference using System Stack Traces,"
Proceedings of ACM SIGMETRICS (SIGMETRICS 2014), Austin, TX, June 2014
(16.8%).
-
Dohyeong Kim, William N. Sumner, Xiangyu Zhang, Dongyan Xu, Hira Agrawal,
"Reuse-Oriented Reverse Engineering of Functional Components from X86 Binaries,"
Proceedings of the 36th International Conference on Software Engineering (ICSE 2014), Hyderabad, India, June 2014 (20%).
-
Hui Zhang, Junghwan Rhee, Nipun Arora, Sahan Gamage, Guofei Jiang, Kenji Yoshihira, Dongyan Xu,
"CLUE: System Trace Analytics for Cloud Service Performance Diagnosis,"
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, Special Track on Data Centric
Cloud and Network Management (NOMS 2014), Krakow, Poland, May 2014 (19%).
-
Zhui Deng, Xiangyu Zhang, Dongyan Xu,
"SPIDER: Stealthy Binary Program Instrumentation and Debugging via
Hardware Virtualization,"
Proceedings of the Annual Computer Security Applications Conference (ACSAC 2013), New Orleans, LA, December 2013 (19.8%) (Technical Report).
-
Junyuan Zeng, Yangchun Fu, Kenneth Miller, Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu,
"Obfuscation Resilient Binary Code Reuse through Trace-oriented Programming,"
Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS 2013), Berlin, Germany, November 2013 (19.8%).
-
Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu,
"LogGC: Garbage Collecting Audit Log,"
Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS 2013), Berlin, Germany, November 2013 (19.8%).
-
Yonghwi Kwon, Xiangyu Zhang, Dongyan Xu,
"PIEtrace: Platform Independent Executable Trace,"
Proceedings of the 28th IEEE/ACM International Conference on Automated Software Engineering (ASE 2013), Silicon Valley, CA, November 2013 (23.3%). ACM SIGSOFT Distinguished Paper Award
-
Zhui Deng, Xiangyu Zhang, Dongyan Xu,
"BISTRO: Binary Component Extraction and Embedding for Software Security Applications,"
Proceedings of the 18th European Symposium on Research in Computer Security
(ESORICS 2013), Egham, UK, September 2013 (17.8%) (Technical Report).
-
Cong Xu, Sahan Gamage, Hui Lu, Ramana Kompella, Dongyan Xu,
"vTurbo: Accelerating Virtual Machine I/O Processing Using
Designated Turbo-Sliced Core,"
Proceedings of the USENIX Annual Technical Conference
(USENIX ATC 2013), San Jose, CA, June 2013 (14.2%).
-
Sahan Gamage, Ramana Kompella, Dongyan Xu,
"vPipe: One Pipe to Connect Them All!"
Proceedings of the 5th USENIX Workshop on Hot Topics in Cloud Computing
(HotCloud 2013), San Jose, CA, June 2013 (28.4%).
-
Zhongshu Gu, William Sumner, Zhui Deng, Xiangyu Zhang, Dongyan Xu,
"DRIP: A Framework for Purifying Trojaned Kernel Drivers,"
Proceedings of the 43rd IEEE/IFIP International Conference on
Dependable Systems and Networks
(DSN-PDS
2013), Budapest, Hungary, June 2013 (22.1%).
-
Brendan Saltaformaggio, Dongyan Xu, Xiangyu Zhang,
"BusMonitor: A Hypervisor-Based Solution for Memory Bus Covert Channels,"
Proceedings of the 6th European Workshop on Systems Security
(EuroSec
2013, in conjunction with EuroSys'13), Prague, Czech Republic, April 2013 (29.6%).
-
Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu,
"High Accuracy Attack Provenance via Binary-based Execution Partition,"
Proceedings of the 20th Network and Distributed System Security
Symposium (NDSS 2013),
San Diego, CA, February 2013 (18.8%).
-
Zhui Deng, Dongyan Xu, Xiangyu Zhang, Xuxian Jiang,
"IntroLib: Efficient and Transparent Library Call Introspection for Malware Forensics,"
Proceedings of the 12th Annual DFRWS Digital Forensics Conference (DFRWS 2012), Washington, DC, August
2012 (29.8%).
-
Cong Xu, Sahan Gamage, Pawan N. Rao, Ardalan
Kangarlou, Ramana R. Kompella,
Dongyan Xu,
"vSlicer: Latency-Aware Virtual Machine Scheduling via
Differentiated-Frequency CPU Slicing," Proceedings of the 21st ACM Symposium on
High-Performance Parallel and Distributed Computing (HPDC
2012), Delft, the Netherlands, June 2012 (16.1%).
Nominee for Best Paper and Best Presentation Awards
-
Ping Chen, Dongyan Xu, Bing Mao,
"CloudER: A Framework for Automatic Software Vulnerability Location and
Patching in the Cloud," Short Paper in
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
(ASIACCS 2012), Seoul,
Korea, May 2012 (30% full+short).
-
Zhiqiang Lin, Junghwan Rhee, Chao Wu, Xiangyu Zhang, Dongyan Xu,
"DIMSUM: Discovering Semantic Data of Interest from Un-mappable Memory with
Confidence," Proceedings of the 19th Network and Distributed System Security
Symposium (NDSS 2012),
San Diego, CA, February 2012 (17.8%).
-
Deepa Srinivasan, Zhi Wang, Xuxian Jiang, Dongyan Xu,
"Process Out-Grafting: An Efficient 'Out-of-VM' Approach for
Fine-Grained Process Execution Monitoring,"
Proceedings of the
ACM Conference on Computer and Communications Security
(CCS 2011),
Chicago, IL, October 2011 (14.0%).
-
Sahan Gamage, Ardalan Kangarlou, Ramana Kompella, Dongyan Xu,
"Opportunistic Flooding to Improve TCP Transmit Performance in
Virtualized Clouds," Proceedings of the
ACM Symposium on Cloud Computing
(SOCC 2011),
Cascais, Portugal, October 2011 (16.8%). Paper
of Distinction Award
-
Zhongshu Gu, Zhui Deng, Dongyan Xu, Xuxian Jiang,
"Process Implanting: A New Active Introspection Framework for
Virtualization,"
Proceedings of the IEEE Symposium on Reliable Distributed Systems
(SRDS 2011), Madrid,
Spain, October 2011 (26.1%).
-
Junghwan Rhee, Zhiqiang Lin, Dongyan Xu,
"Characterizing Kernel Malware Behavior with Kernel Data Access Patterns,"
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011), Hong Kong,
China, March 2011 (16.1%).
-
Zhiqiang Lin, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu, Xuxian Jiang,
"SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures,"
Proceedings of the 18th Network and Distributed System Security
Symposium (NDSS 2011), San Diego,
CA, February 2011 (20%).
-
Ardalan Kangarlou, Sahan Gamage, Ramana Kompella, Dongyan Xu,
"vSnoop: Improving TCP Throughput in Virtualized Environments via
Acknowledgment Offload,"
Proceedings of the ACM/IEEE Supercomputing Conference 2010
(SC10), New Orleans,
LA, November 2010 (20%).Best Student
Paper Finalist
-
Sina Bahram, Xuxian Jiang, Zhi Wang, Mike Grace, Jinku Li, Deepa
Srinivasan, Junghwan Rhee, Dongyan Xu, "DKSM:
Subverting Virtual Machine
Introspection for Fun and Profit," Proceedings of the 29th IEEE
International Symposium on Reliable Distributed Systems (SRDS
2010), New Delhi, India, October 2010 (22.6%).
-
Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jiang,
"Kernel Malware Analysis with Un-tampered and Temporal Views of
Dynamic Kernel Memory,"
Proceedings of the 13th International Symposium on Recent Advances in
Intrusion Detection
(RAID 2010), Ottawa, Canada,
September
2010 (23.1%).
-
Tao Bao, Yunhui Zheng, Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu, "Strict
Control Dependence and its Effect on Dynamic Information Flow
Analyses,"
Proceedings of the International Symposium on Software
Testing and Analysis (ISSTA
2010), Trento, Italy, July 2010 (23%).
-
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu,
"Reuse-Oriented Camouflaging Trojan: Vulnerability Detection and
Attack Construction,"
Proceedings of the 40th IEEE/IFIP International Conference on
Dependable Systems and Networks
(DSN-DCCS
2010), Chicago, IL, June 2010 (23.2%).
-
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu,
"Automatic Reverse Engineering of Data Structures from Binary
Execution,"
Proceedings of the 17th Network and Distributed System Security
Symposium
(NDSS
2010), San Diego, CA, February 2010 (15.4%).
-
Zhiqiang Lin, Ryan Riley, Dongyan Xu,
"Polymorphing Software by Randomizing Data Structure Layout,"
Proceedings of SIG SIDAR Conference on
Detection of Intrusions and Malware and Vulnerability Assessment
(DIMVA
2009), Milan, Italy, July 2009 (29.5%).
-
Ardalan Kangarlou, Patrick Eugster, Dongyan Xu,
"VNsnap: Taking Snapshots of Virtual Networked Environments with Minimal
Downtime,"
Proceedings of the 39th IEEE/IFIP International Conference on
Dependable
Systems and Networks
(DSN-DCCS
2009), Estoril, Portugal, June 2009 (19.6%).
-
Ryan Riley, Xuxian Jiang, Dongyan Xu,
"Multi-Aspect Profiling of Kernel Rootkit Behavior,"
Proceedings of the 4th European Conference on Computer Systems
(EuroSys
2009),
Nuremberg, Germany, April 2009 (16.9%).
-
Junghwan Rhee, Ryan Riley, Xuxian Jiang, Dongyan Xu,
"Defeating Dynamic Data Kernel Rootkit Attacks via VMM-based Guest
Transparent Monitoring",
Proceedings of 4th International Conference on Availability,
Reliability and Security
(ARES 2009),
Fukuoka, Japan, March 2009 (25%).
-
Ryan Riley, Xuxian Jiang, Dongyan Xu,
"Guest-Transparent
Prevention of Kernel Rootkits with VMM-based Memory Shadowing",
Proceedings of 11th International Symposium on Recent Advances in Intrusion
Detection
(RAID 2008),
Boston, MA, September 2008 (25%). Best Paper
Award
-
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu,
"Convicting Exploitable Software Vulnerabilities: An Efficient Input
Provenance Based
Approach",
Proceedings of the 38th IEEE/IFIP International Conference on
Dependable
Systems and Networks
(DSN-DCCS
2008),
Anchorage, AK, June 2008 (23%).
-
Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Xiangyu Zhang,
"Automatic Protocol Format Reverse Engineering through Context-Aware
Monitored Execution",
Proceedings of the 15th Network and Distributed System Security
Symposium (NDSS
2008), San Diego, CA, February 2008 (17.8%).
-
Ardalan Kangarlou, Paul Ruth, Dongyan Xu, Patrick Eugster, "Taking Snapshots of Virtual Networked
Environments",
Proceedings of IEEE International Workshop on
Virtualization Technology in Distributed Computing
(VTDC 2007, in
conjunction with SC07), Reno,
NV, November 2007.
-
Xuxian Jiang, Xinyuan Wang, Dongyan Xu,
"Stealthy Malware Detection Through VMM-Based "Out-of-the-Box"
Semantic View Reconstruction",
Proceedings of ACM Conference on Computer and Communications Security
(CCS
2007), Alexandria, VA, November 2007 (18%).
-
Xuxian Jiang, Helen J. Wang, Dongyan Xu, Yi-Min Wang,
"RandSys: Thwarting Code Injection Attacks with System Service
Interface Randomization",
Proceedings of IEEE International Symposium on Reliable Distributed Systems
(SRDS
2007), Beijing, China, October 2007 (15%).
-
Ryan Riley, Xuxian Jiang, Dongyan Xu,
"An Architectural Approach to Preventing Code Injection Attacks",
Proceedings of the 37th IEEE/IFIP International Conference on
Dependable
Systems and Networks
(DSN-DCCS
2007),
Edinburgh, UK, June 2007 (25%).
-
Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Bing Mao, Li Xie,
"AutoPaG: Towards Automated Software Patch Generation with Source
Code Root Cause Identification and Repair",
Proceedings of ACM Symposium on InformAtion, Computer and
Communications Security
(ASIACCS
2007),
Singapore, March 2007 (17.6%).
-
Xuxian Jiang, Dongyan Xu,
"Profiling Self-Propagating Worms via Behavioral Footprinting",
Proceedings of ACM Workshop on Recurring Malcode
(WORM
2006, in conjunction with
ACM CCS-13), Fairfax, VA,
November 2006 (30%).
-
Xuxian Jiang, AAron Walters, Florian Buchholz, Dongyan Xu, Yi-Min Wang,
Eugene H. Spafford,
"Provenance-Aware Tracing of Worm Break-in and Contaminations: A
Process Coloring Approach",
Proceedings of IEEE International Conference on Distributed
Computing Systems
(ICDCS 2006), Lisboa, Portugal,
July 2006 (13.9%).
-
Dongyan Xu, Paul Ruth, Junghwan Rhee, Rick Kennell, Sebastien Goasguen,
"Short Paper: Autonomic Adaptation of Virtual Distributed Environments
in a Multi-Domain Infrastructure",
Proceedings of IEEE International Symposium on High Performance
Distributed Computing, "Hot Topics" Session
(HPDC-15),
Paris, France, June 2006 (6/43).
Talk given
by Ryan
Riley
.