Stealthy malware detection and monitoring through VMM-based “out-of-the-box” semantic view reconstruction

Xuxian Jiang , Xinyuan Wang , Dongyan Xu
ACM Transactions on Information and System Security 13 ( 2) 12

924
2010
Toward a more dependable hybrid analysis of android malware using aspect-oriented programming

Aisha I. Ali-Gombe , Brendan Saltaformaggio , J. “Ram” Ramanujam , Dongyan Xu
Computers & Security 73 235 -248

17
2018
Gemini: Guest-transparent honey files via hypervisor-level access redirection

Zhongshu Gu , Brendan Saltaformaggio , Xiangyu Zhang , Dongyan Xu
Computers & Security 77 737 -744

2018
Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing

Ryan Riley , Xuxian Jiang , Dongyan Xu
recent advances in intrusion detection 1 -20

479
2008
Cross-Layer Retrofitting of UAVs Against Cyber-Physical Attacks

Fan Fei , Zhan Tu , Ruikun Yu , Taegyu Kim
international conference on robotics and automation 550 -557

8
2018
Learn-to-Recover: Retrofitting UAVs with Reinforcement Learning-Assisted Flight Control Under Cyber-Physical Attacks

Fan Fei , Zhan Tu , Dongyan Xu , Xinyan Deng
international conference on robotics and automation 7358 -7364

40
2020
iRiS: Vetting Private API Abuse in iOS Applications

Zhui Deng , Brendan Saltaformaggio , Xiangyu Zhang , Dongyan Xu
computer and communications security 44 -56

34
2015
VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images

Brendan Saltaformaggio , Rohit Bhatia , Zhongshu Gu , Xiangyu Zhang
computer and communications security 146 -157

25
2015
GUITAR: Piecing Together Android App GUIs from Memory Images

Brendan Saltaformaggio , Rohit Bhatia , Zhongshu Gu , Xiangyu Zhang
computer and communications security 120 -132

27
2015
HERCULE: attack story reconstruction via community discovery on correlated log graph

Kexin Pei , Zhongshu Gu , Brendan Saltaformaggio , Shiqing Ma
annual computer security applications conference 583 -595

141
2016
BASS: Improving I/O Performance for Cloud Block Storage via Byte-Addressable Storage Stack

Hui Lu , Brendan Saltaformaggio , Cong Xu , Umesh Bellur
symposium on cloud computing 169 -181

3
2016
Portable virtual cycle accounting for large-scale distributed cycle sharing systems

Hiroshi Yamauchi , Dongyan Xu
parallel computing 33 ( 4) 314 -327

2007
CPR: cross platform binary code reuse via platform independent trace program

Yonghwi Kwon , Weihang Wang , Yunhui Zheng , Xiangyu Zhang
international symposium on software testing and analysis 158 -169

3
2017
SPIDER: stealthy binary program instrumentation and debugging via hardware virtualization

Zhui Deng , Xiangyu Zhang , Dongyan Xu
annual computer security applications conference 289 -298

67
2013
Strict control dependence and its effect on dynamic information flow analyses

Tao Bao , Yunhui Zheng , Zhiqiang Lin , Xiangyu Zhang
international symposium on software testing and analysis 13 -24

31
2010
Flight Recovery of MAVs with Compromised IMU

Zhan Tu , Fan Fei , Matthew Eagon , Dongyan Xu
intelligent robots and systems 3638 -3644

1
2019
A Practical Approach for Adaptive Data Structure Layout Randomization

Ping Chen , Jun Xu , Zhiqiang Lin , Dongyan Xu
Computer Security -- ESORICS 2015 69 -89

28
2015
iFlow: Middleware-assisted Rendezvous-based Information Access for Mobile Ad Hoc Applications

Zongpeng Li , Baochun Li , Dongyan Xu , Xin Zhou
Proceedings of the 1st international conference on Mobile systems, applications and services - MobiSys '03 71 -84

8
2003