Yang Xiao

Orcid: 0009-0005-8009-2252

Affiliations:
  • Chinese Academy of Sciences, Institute of Information Engineering, School of Cyber Security, Beijing, China


According to our database1, Yang Xiao authored at least 17 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Asteria-Pro: Enhancing Deep Learning-based Binary Code Similarity Detection by Incorporating Domain Knowledge.
ACM Trans. Softw. Eng. Methodol., January, 2024

Leveraging Semantic Relations in Code and Data to Enhance Taint Analysis of Embedded Systems.
Proceedings of the 33rd USENIX Security Symposium, 2024

File Hijacking Vulnerability: The Elephant in the Room.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

SCALE: Constructing Structured Natural Language Comment Trees for Software Vulnerability Detection.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

LibvDiff: Library Version Difference Guided OSS Version Identification in Binaries.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

2023
Towards Practical Binary Code Similarity Detection: Vulnerability Verification via Patch Semantic Analysis.
ACM Trans. Softw. Eng. Methodol., November, 2023

Detecting API Post-Handling Bugs Using Code and Description in Patches.
Proceedings of the 32nd USENIX Security Symposium, 2023

Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Learning Program Semantics for Vulnerability Detection via Vulnerability-Specific Inter-procedural Slicing.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

Decompilation Based Deep Binary-Source Function Matching.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023

ACETest: Automated Constraint Extraction for Testing Deep Learning Operators.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Enhancing OSS Patch Backporting with Semantics.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Unleashing the power of pseudo-code for binary code similarity analysis.
Cybersecur., 2022

RegexScalpel: Regular Expression Denial of Service (ReDoS) Defense by Localize-and-Fix.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
VIVA: Binary Level Vulnerability Identification via Partial Signature.
Proceedings of the 28th IEEE International Conference on Software Analysis, 2021

2020
MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures.
Proceedings of the 29th USENIX Security Symposium, 2020

2019
Open-Source License Violations of Binary Software at Large Scale.
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019


  Loading...