Xuxian Jiang
According to our database1,
Xuxian Jiang
authored at least 94 papers
between 2003 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
Proceedings of the 30th USENIX Security Symposium, 2021
2020
Proc. ACM Meas. Anal. Comput. Syst., 2020
Proceedings of the Financial Cryptography and Data Security, 2020
2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
2016
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016
2015
Comput. Secur., 2015
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
2014
IEEE Trans. Inf. Forensics Secur., 2014
IEEE Trans. Inf. Forensics Secur., 2014
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
DIVILAR: diversifying intermediate language for anti-repackaging on android platform.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-7394-7, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the first international workshop on Security in embedded systems and smartphones, 2013
2012
IntroLib: Efficient and transparent library call introspection for malware forensics.
Digit. Investig., 2012
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the 10th International Conference on Mobile Systems, 2012
Proceedings of the European Conference on Computer Systems, 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the Eighth AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment, 2012
Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content for Privacy Violations.
Proceedings of the Applied Cryptography and Network Security, 2012
2011
ACM Trans. Inf. Syst. Secur., 2011
IEEE Trans. Inf. Forensics Secur., 2011
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems (SRDS 2011), 2011
Proceedings of the Security and Privacy in Communication Networks, 2011
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011
SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.
Proceedings of the Network and Distributed System Security Symposium, 2011
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011
Process out-grafting: an efficient "out-of-VM" approach for fine-grained process execution monitoring.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
Stealthy malware detection and monitoring through VMM-based "out-of-the-box" semantic view reconstruction.
ACM Trans. Inf. Syst. Secur., 2010
IEEE Trans. Dependable Secur. Comput., 2010
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the Security and Privacy in Communication Networks, 2010
Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
Proceedings of the Information Security - 13th International Conference, 2010
Proceedings of the European Conference on Computer Systems, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
Knowl. Inf. Syst., 2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems.
Proceedings of the Information Security Practice and Experience, 2009
Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April 1-3, 2009, 2009
Proceedings of the Computer Security, 2009
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers.
Proceedings of the 2009 ACM Symposium on Information, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring.
Proceedings of the The Forth International Conference on Availability, 2009
2008
Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach.
IEEE Trans. Parallel Distributed Syst., 2008
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution.
Proceedings of the Network and Distributed System Security Symposium, 2008
2007
Proceedings of the First USENIX Workshop on Offensive Technologies, 2007
RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization.
Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), 2007
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
2006
PhD thesis, 2006
Collapsar: A VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention.
J. Parallel Distributed Comput., 2006
Proceedings of the 2006 ACM Workshop on Rapid Malcode, 2006
Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities.
Proceedings of the Network and Distributed System Security Symposium, 2006
Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach.
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006
2005
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005
2004
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004
Proceedings of the 12th ACM International Conference on Multimedia, 2004
Proceedings of the Parallel and Distributed Processing and Applications, 2004
Proceedings of the 4th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGrid 2004), 2004
2003
Proceedings of the ACM SIGCOMM workshop on Models, 2003
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003
SODA: A Service-On-Demand Architecture for Application Service Hosting Utility Platforms.
Proceedings of the 12th International Symposium on High-Performance Distributed Computing (HPDC-12 2003), 2003