关注
Hongfa Xue
Hongfa Xue
在 gwu.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
Machine learning-based analysis of program binaries: A comprehensive study
H Xue, S Sun, G Venkataramani, T Lan
IEEE Access 7, 65889-65912, 2019
702019
Statsym: vulnerable path discovery through statistics-guided symbolic execution
F Yao, Y Li, Y Chen, H Xue, T Lan, G Venkataramani
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
442017
Simber: Eliminating redundant memory bound checks via statistical inference
H Xue, Y Chen, F Yao, Y Li, T Lan, G Venkataramani
ICT Systems Security and Privacy Protection: 32nd IFIP TC 11 International …, 2017
392017
Clone-hunter: accelerated bound checks elimination via binary code clone detection
H Xue, G Venkataramani, T Lan
Proceedings of the 2nd ACM SIGPLAN International Workshop on Machine …, 2018
272018
Clone-slicer: Detecting domain specific binary code clones through program slicing
H Xue, G Venkataramani, T Lan
Proceedings of the 2018 Workshop on Forming an Ecosystem Around Software …, 2018
272018
Hecate: Automated customization of program and communication features to reduce attack surfaces
H Xue, Y Chen, G Venkataramani, T Lan
Security and Privacy in Communication Networks: 15th EAI International …, 2019
152019
Twin-finder: Integrated reasoning engine for pointer-related code clone detection
H Xue, Y Mei, K Gogineni, G Venkataramani, T Lan
2020 IEEE 14th International Workshop on Software Clones (IWSC), 1-7, 2020
112020
Morph: Enhancing system security through interactive customization of application and communication protocol features
H Xue, Y Chen, G Venkataramani, T Lan, G Jin, J Li
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
112018
Personal attributes extraction based on the combination of trigger words, dictionary and rules
K Zhang, M Wang, X Cong, F Huang, H Xue, L Li, Z Gao
Proceedings of The Third CIPS-SIGHAN Joint Conference on Chinese Language …, 2014
92014
Chop: Bypassing runtime bounds checking through convex hull optimization
Y Chen, H Xue, T Lan, G Venkataramani
Computers & Security 90, 101708, 2020
62020
Learn2reason: Joint statistical and formal learning approach to improve the robustness and time-to-solution for software security
H Xue
The George Washington University, 2020
22020
Integrated Reasoning Engine for Pointer-related Code Clone Detection
H Xue, Y Mei, K Gogineni, G Venkataramani, T Lan
arXiv preprint arXiv:2105.11933, 2021
12021
AMASS: Automated Software Mass Customization via Feature Identification and Tailoring
H Xue, Y Chen, G Venkataramani, T Lan
EAI Endorsed Transactions on Security and Safety 6 (20), 2019
12019
Clone-Slicer
H Xue, G Venkataramani, T Lan
Proceedings of the 2018 Workshop on Forming an Ecosystem Around Software …, 2018
2018
POSTER: MORPH: Enhancing System Security through Interactive Customization of Application and Communication Protocol Features
H Xue, Y Chen, G Venkataramani, T Lan, G Jin, J Li
系统目前无法执行此操作,请稍后再试。
文章 1–15