Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring

Junghwan Rhee , Ryan Riley , Dongyan Xu , Xuxian Jiang
availability, reliability and security 74 -81

80
2009
Seamless User-Level Handoff in Ubiquitous Multimedia Service Delivery

Yi Cui , Klara Nahrstedt , Dongyan Xu
Multimedia Tools and Applications 22 ( 2) 137 -170

63
2004
Challenges in supporting virtual infrastructures in the cloud

Dongyan Xu
Proceedings of the 5th international workshop on Virtualization technologies in distributed computing - VTDC '11 19 -20

2011
RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications

Taegyu Kim , Chung Hwan Kim , Hongjun Choi , Yonghwi Kwon
annual computer security applications conference 412 -424

13
2017
Kernel malware analysis with un-tampered and temporal views of dynamic kernel memory

Junghwan Rhee , Ryan Riley , Dongyan Xu , Xuxian Jiang
recent advances in intrusion detection 178 -197

44
2010
PerfGuard: binary-centric application performance monitoring in production environments

Dongyan Xu , Chung Hwan Kim , Junghwan Rhee , Kyu Hyung Lee
foundations of software engineering 595 -606

6
2016
Characterizing kernel malware behavior with kernel data access patterns

Junghwan Rhee , Zhiqiang Lin , Dongyan Xu
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS '11 207 -216

14
2011
vMocity: Traveling VMs Across Heterogeneous Clouds

Cheng Cheng , Zhui Deng , Zhongshu Gu , Dongyan Xu
symposium on reliable distributed systems 101 -110

2016
RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization

Xuxian Jiang , Helen J. Wangz , Dongyan Xu , Yi-Min Wang
symposium on reliable distributed systems 209 -218

53
2007
DKSM: Subverting Virtual Machine Introspection for Fun and Profit

Sina Bahram , Xuxian Jiang , Zhi Wang , Mike Grace
symposium on reliable distributed systems 82 -91

153
2010
Process Implanting: A New Active Introspection Framework for Virtualization

Zhongshu Gu , Zhui Deng , Dongyan Xu , Xuxian Jiang
symposium on reliable distributed systems 147 -156

59
2011
Finding service paths in a media service proxy network

Dongyan Xu , Klara Nahrstedt
Multimedia Computing and Networking 2002 4673 171 -185

73
2001
Towards integrated runtime solutions in QoS-aware middleware

Baochun Li , Dongyan Xu , Klara Nahrstedt
acm multimedia 11 -14

3
2001
VIOLIN: Virtual Internetworking on Overlay Infrastructure

Xuxian Jiang , Dongyan Xu
Parallel and Distributed Processing and Applications 937 -946

209
2004
Process Coloring: An Information Flow-Preserving Approach to Malware Investigation

Dongyan Xu , Eugene H Spafford , Xuxian Jiang , PURDUE UNIV LAFAYETTE IN
Defense Technical Information Center

2009
CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality

Chung Hwan Kim , Sungjin Park , Junghwan Rhee , Jong-Jin Won
computer and communications security 651 -656

3
2015
LDX: Causality Inference by Lightweight Dual Execution

Yonghwi Kwon , Dohyeong Kim , William Nick Sumner , Kyungtae Kim
architectural support for programming languages and operating systems 50 ( 2) 503 -515

28
2016
Lprov: Practical Library-aware Provenance Tracing

Fei Wang , Yonghwi Kwon , Shiqing Ma , Xiangyu Zhang
annual computer security applications conference 605 -617

2
2018
Opportunistic flooding to improve TCP transmit performance in virtualized clouds

Dongyan Xu , Sahan Gamage , Ardalan Kangarlou , Ramana Rao Kompella
symposium on cloud computing 24

53
2011
Obfuscation resilient binary code reuse through trace-oriented programming

Junyuan Zeng , Yangchun Fu , Kenneth A. Miller , Zhiqiang Lin
computer and communications security 487 -498

81
2013