Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution.

Xuxian Jiang , Dongyan Xu , Zhiqiang Lin , Xiangyu Zhang
network and distributed system security symposium

335
2008
Collapsar: a VM-based architecture for network attack detention center

Xuxian Jiang , Dongyan Xu
usenix security symposium 2 -2

115
2004
Billing attacks on SIP-based VoIP systems

Xuxian Jiang , Ruishan Zhang , Xiaohui Yang , Xinyuan Wang
WOOT '07 Proceedings of the first USENIX workshop on Offensive Technologies 4

54
2007
Application Performance on the CROSS/ Linux Software Programmable Router

Puneet Zaroo , Prem Gopalan , Seung Chul Han , David K.Y. Yau

4
2001
Worm Meets Beehive

Xuxian Jiang , Dongyan Xu , Paul Ruth , Shan Lei

1
2004
Running Linux on Back-end Computers in The Xinu lab

Douglas E Comer , Xuxian Jiang ,

2003
AutoPaG: towards automated software patch generation with source code root cause identification and repair

Xuxian Jiang , Li Xie , Bing Mao , Dongyan Xu
computer and communications security 329 -340

36
2007
Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities.

Chad Verbowski , Roussi Roussev , Xuxian Jiang , Yi-Min Wang
network and distributed system security symposium 12

491
2006
Systematic Detection of Capability Leaks in Stock Android Smartphones.

Xuxian Jiang , Yajin Zhou , Michael C. Grace , Zhi Wang
network and distributed system security symposium

371
2012
SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.

Xuxian Jiang , Dongyan Xu , Zhiqiang Lin , Junghwan Rhee
network and distributed system security symposium

90
2011
Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets

Xuxian Jiang , Yajin Zhou , Wu Zhou , Zhi Wang
network and distributed system security symposium

1,172
2012
Taming Hosted Hypervisors with (Mostly) Deprivileged Execution.

Xuxian Jiang , Chiachih Wu , Zhi Wang
network and distributed system security symposium

32
2013
Graph-based signatures for kernel data structures

Zhiqiang Lin , Junghwan Rhee , Xiangyu Zhang , Dongyan Xu
annual information security symposium 21

2011
Detecting capability leaks in Android-based smartphones

Xuxian Jiang , Yajin Zhou , Zhi Wang , Mike Grace
North Carolina State University. Dept. of Computer Science

1
2011
Android Malware

Yajin Zhou , Xuxian Jiang

55
2013
Security Analysis of EOSIO Smart Contracts.

Xuxian Jiang , Xiapu Luo , Haoyu Wang , Yao Guo
arXiv: Cryptography and Security

23
2020
LiveDM: kernel malware analysis with un-tampered and temporal views of dynamic kernel memory

Xuxian Jiang , Dongyan Xu , Junghwan Rhee , Ryan Riley
annual information security symposium 16

2011