Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution.

Xuxian Jiang , Dongyan Xu , Zhiqiang Lin , Xiangyu Zhang
network and distributed system security symposium

335
2008
Collapsar: a VM-based architecture for network attack detention center

Xuxian Jiang , Dongyan Xu
usenix security symposium 2 -2

115
2004
3
2004
Worm Meets Beehive

Xuxian Jiang , Dongyan Xu , Paul Ruth , Shan Lei

1
2004
Supporting Multimedia Service Polymorphism in Dynamic and Heterogeneous Environments

Dongyan Xu , Klara Nahrstedt
University of Illinois at Urbana-Champaign

11
2000
DSCRETE: automatic rendering of forensic information from memory images via application logic reuse

Brendan Saltaformaggio , Dongyan Xu , Zhongshu Gu , Xiangyu Zhang
usenix security symposium 255 -269

22
2014
X-force: force-executing binary programs for security applications

Zhendong Su , Dongyan Xu , Zhiqiang Lin , Zhui Deng
usenix security symposium 829 -844

112
2014
An integrated runtime QoS-aware middleware framework for distributed multimedia applications

Klara Nahrstedt , Baochun Li , Dongyan Xu
Multimedia Systems 8 ( 5) 420 -430

13
2002
AutoPaG: towards automated software patch generation with source code root cause identification and repair

Xuxian Jiang , Li Xie , Bing Mao , Dongyan Xu
computer and communications security 329 -340

36
2007
Executing MPI programs on virtual machines in an Internet sharing system

Zhelong Pan , Rudolf Eigenmann , Xiaojuan Ren , Dongyan Xu
international parallel and distributed processing symposium 101 -101

9
2006
vTurbo: accelerating virtual machine I/O processing using designated turbo-sliced core

Ramana Kompella , Hui Lu , Dongyan Xu , Sahan Gamage
usenix annual technical conference 243 -254

62
2013
vPipe: One Pipe to Connect Them All!

Ramana Rao Kompella , Dongyan Xu , Sahan Gamage
usenix conference on hot topics in cloud ccomputing

2
2013
Log-centric analytics for advanced persistent threat detection

Dongyan Xu , Xiangyu Zhang , Shiqing Ma
annual information security symposium 40

2014
High Accuracy Attack Provenance via Binary-based Execution Partition.

Dongyan Xu , Xiangyu Zhang , Kyu Hyung Lee
network and distributed system security symposium

95
2013
SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.

Xuxian Jiang , Dongyan Xu , Zhiqiang Lin , Junghwan Rhee
network and distributed system security symposium

90
2011
Automatic Reverse Engineering of Data Structures from Binary Execution.

Dongyan Xu , Zhiqiang Lin , Xiangyu Zhang
network and distributed system security symposium

284
2010
KMAG: VMM-level malware detection via kernel data access profiling

Dongyan Xu , Dannie Stanley , Rick Porter , Chung Hwan Kim
annual information security symposium 17

2013