Dongyan Xu
Orcid: 0000-0002-9892-8733
According to our database1,
Dongyan Xu
authored at least 182 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Integrating ML/AI workflows in a Streaming Data Management and Processing Platform for Building Energy Research.
Proceedings of the Practice and Experience in Advanced Research Computing 2024: Human Powered Computing, 2024
Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
SoK: The Long Journey of Exploiting and Defending the Legacy of King Harald Bluetooth.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Low-Cost Privilege Separation with Compile Time Compartmentalization for Embedded Systems.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
2022
IEEE Secur. Priv., 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Reverse engineering and retrofitting robotic aerial vehicle control firmware using dispatch.
Proceedings of the MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
2020
CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality.
IEEE Trans. Dependable Secur. Comput., 2020
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020
From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAY.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
Learn-to-Recover: Retrofitting UAVs with Reinforcement Learning-Assisted Flight Control Under Cyber-Physical Attacks.
Proceedings of the 2020 IEEE International Conference on Robotics and Automation, 2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
Cyber-Physical Inconsistency Vulnerability Identification for Safety Checks in Robotic Vehicles.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2019
2018
Comput. Secur., 2018
Toward a more dependable hybrid analysis of android malware using aspect-oriented programming.
Comput. Secur., 2018
Proceedings of the 2018 USENIX Annual Technical Conference, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 2018 IEEE International Conference on Robotics and Automation, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
Digit. Investig., 2017
Proceedings of the 26th International Conference on World Wide Web, 2017
MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning.
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic.
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016
Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images.
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems, 2016
PerfGuard: binary-centric application performance monitoring in production environments.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016
ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
BASS: Improving I/O Performance for Cloud Block Storage via Byte-Addressable Storage Stack.
Proceedings of the Seventh ACM Symposium on Cloud Computing, 2016
Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems, 2016
HERCULE: attack story reconstruction via community discovery on correlated log graph.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 16th Annual Middleware Conference, Vancouver, BC, Canada, December 07, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
LEAPS: Detecting Camouflaged Attacks with Statistical Learning Guided by Program Analysis.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015
Proceedings of the Sixth ACM Symposium on Cloud Computing, 2015
VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
vHaul: Towards Optimal Scheduling of Live Multi-VM Migration for Multi-tier Applications.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015
2014
IEEE Trans. Inf. Forensics Secur., 2014
DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
IntroPerf: transparent context-sensitive multi-layer performance inference using system stack traces.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2014
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014
Proceedings of the 36th International Conference on Software Engineering, 2014
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
Proceedings of the ACM Symposium on Cloud Computing, 2014
2013
Protocol Responsibility Offloading to Improve TCP Throughput in Virtualized Environments.
ACM Trans. Comput. Syst., 2013
vTurbo: Accelerating Virtual Machine I/O Processing Using Designated Turbo-Sliced Core.
Proceedings of the 2013 USENIX Annual Technical Conference, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013
BISTRO: Binary Component Extraction and Embedding for Software Security Applications.
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
SPIDER: stealthy binary program instrumentation and debugging via hardware virtualization.
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
IEEE Trans. Serv. Comput., 2012
IEEE Trans. Parallel Distributed Syst., 2012
IntroLib: Efficient and transparent library call introspection for malware forensics.
Digit. Investig., 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the 31st IEEE Military Communications Conference, 2012
vSlicer: latency-aware virtual machine scheduling via differentiated-frequency CPU slicing.
Proceedings of the 21st International Symposium on High-Performance Parallel and Distributed Computing, 2012
CloudER: a framework for automatic software vulnerability location and patching in the cloud.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
IEEE Netw., 2011
J. Internet Serv. Appl., 2011
Autonomic live adaptation of virtual networked environments in a multidomain infrastructure.
J. Internet Serv. Appl., 2011
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems (SRDS 2011), 2011
SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.
Proceedings of the Network and Distributed System Security Symposium, 2011
Proceedings of the 5th International Workshop on Virtualization Technologies in Distributed Computing, 2011
Proceedings of the ACM Symposium on Cloud Computing in conjunction with SOSP 2011, 2011
Process out-grafting: an efficient "out-of-VM" approach for fine-grained process execution monitoring.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
Reverse Engineering Input Syntactic Structure from Program Execution and Its Applications.
IEEE Trans. Software Eng., 2010
Stealthy malware detection and monitoring through VMM-based "out-of-the-box" semantic view reconstruction.
ACM Trans. Inf. Syst. Secur., 2010
IEEE Trans. Dependable Secur. Comput., 2010
Multim. Syst., 2010
CoRR, 2010
CoRR, 2010
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010
vSnoop: Improving TCP Throughput in Virtualized Environments via Acknowledgement Offload.
Proceedings of the Conference on High Performance Computing Networking, 2010
Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
Proceedings of the Network and Distributed System Security Symposium, 2010
Proceedings of the Nineteenth International Symposium on Software Testing and Analysis, 2010
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010
2009
Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April 1-3, 2009, 2009
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009
Proceedings of the Detection of Intrusions and Malware, 2009
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring.
Proceedings of the The Forth International Conference on Availability, 2009
2008
Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach.
IEEE Trans. Parallel Distributed Syst., 2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution.
Proceedings of the Network and Distributed System Security Symposium, 2008
Proceedings of the Advances in Grid and Pervasive Computing, 2008
Convicting exploitable software vulnerabilities: An efficient input provenance based approach.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008
2007
Parallel Comput., 2007
RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization.
Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), 2007
Proceedings of the 2nd International Workshop on Virtualization Technology in Distributed Computing, 2007
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
2006
IEEE Trans. Syst. Man Cybern. Part A, 2006
Robust Computation of Aggregates in Wireless Sensor Networks: Distributed Randomized Algorithms and Analysis.
IEEE Trans. Parallel Distributed Syst., 2006
Analysis of a CDN-P2P hybrid architecture for cost-effective streaming media distribution.
Multim. Syst., 2006
Collapsar: A VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention.
J. Parallel Distributed Comput., 2006
Proceedings of the 2006 ACM Workshop on Rapid Malcode, 2006
Mixed Reality Tabletop (MRT): A Low-Cost Teleconferencing Framework for Mixed-Reality Applications.
Proceedings of the IEEE Virtual Reality Conference, 2006
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006
Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach.
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006
Autonomic Live Adaptation of Virtual Computational Environments in a Multi-Domain Infrastructure.
Proceedings of the 3rd International Conference on Autonomic Computing, 2006
Autonomic Adaptation of Virtual Distributed Environments in a Multi-Domain Infrastructure.
Proceedings of the 15th IEEE International Symposium on High Performance Distributed Computing, 2006
2005
A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming.
IEEE Trans. Knowl. Data Eng., 2005
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005
Proceedings of the 2005 IEEE International Conference on Cluster Computing (CLUSTER 2005), September 26, 2005
2004
Multim. Tools Appl., 2004
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004
Proceedings of the 12th ACM International Conference on Multimedia, 2004
E-notebook Middleware for Accountability and Reputation Based Trust in Distributed Data Sharing Communities.
Proceedings of the Trust Management, Second International Conference, 2004
Proceedings of the Parallel and Distributed Processing and Applications, 2004
Proceedings of the 4th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGrid 2004), 2004
2003
Proceedings of the ACM SIGCOMM workshop on Models, 2003
iFlow: Middleware-assisted Rendezvous-based Information Access for Mobile Ad Hoc Applications.
Proceedings of the First International Conference on Mobile Systems, 2003
Proceedings of the Eleventh ACM International Conference on Multimedia, 2003
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003
SODA: A Service-On-Demand Architecture for Application Service Hosting Utility Platforms.
Proceedings of the 12th International Symposium on High-Performance Distributed Computing (HPDC-12 2003), 2003
Proceedings of the 9th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2003), 2003
2002
J. Vis. Lang. Comput., 2002
An integrated runtime QoS-aware middleware framework for distributed multimedia applications.
Multim. Syst., 2002
Proceedings of the 31st International Conference on Parallel Processing Workshops (ICPP 2002 Workshops), 2002
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), 2002
2001
PhD thesis, 2001
IEEE Commun. Mag., 2001
Proceedings of the 2001 International Workshop on Multimedia Middleware, 2001
2K: An Integrated Approach of QoS Compilation and Reconfigurable, Component-Based Run-Time Middleware for the Unified QoS Management Framework.
Proceedings of the Middleware 2001, 2001
Proceedings of the 2001 IEEE International Conference on Multimedia and Expo, 2001
Proceedings of the First IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2001), 2001
2000
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000
Proceedings of the 20th International Conference on Distributed Computing Systems, 2000
Proceedings of the Ninth IEEE International Symposium on High Performance Distributed Computing, 2000
1999
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1999), 1999