Machine learning-based analysis of program binaries: A comprehensive study H Xue, S Sun, G Venkataramani, T Lan IEEE Access 7, 65889-65912, 2019 | 70 | 2019 |
Statsym: vulnerable path discovery through statistics-guided symbolic execution F Yao, Y Li, Y Chen, H Xue, T Lan, G Venkataramani 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 44 | 2017 |
Simber: Eliminating redundant memory bound checks via statistical inference H Xue, Y Chen, F Yao, Y Li, T Lan, G Venkataramani ICT Systems Security and Privacy Protection: 32nd IFIP TC 11 International …, 2017 | 39 | 2017 |
Clone-hunter: accelerated bound checks elimination via binary code clone detection H Xue, G Venkataramani, T Lan Proceedings of the 2nd ACM SIGPLAN International Workshop on Machine …, 2018 | 27 | 2018 |
Clone-slicer: Detecting domain specific binary code clones through program slicing H Xue, G Venkataramani, T Lan Proceedings of the 2018 Workshop on Forming an Ecosystem Around Software …, 2018 | 27 | 2018 |
Hecate: Automated customization of program and communication features to reduce attack surfaces H Xue, Y Chen, G Venkataramani, T Lan Security and Privacy in Communication Networks: 15th EAI International …, 2019 | 15 | 2019 |
Twin-finder: Integrated reasoning engine for pointer-related code clone detection H Xue, Y Mei, K Gogineni, G Venkataramani, T Lan 2020 IEEE 14th International Workshop on Software Clones (IWSC), 1-7, 2020 | 11 | 2020 |
Morph: Enhancing system security through interactive customization of application and communication protocol features H Xue, Y Chen, G Venkataramani, T Lan, G Jin, J Li Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 11 | 2018 |
Personal attributes extraction based on the combination of trigger words, dictionary and rules K Zhang, M Wang, X Cong, F Huang, H Xue, L Li, Z Gao Proceedings of The Third CIPS-SIGHAN Joint Conference on Chinese Language …, 2014 | 9 | 2014 |
Chop: Bypassing runtime bounds checking through convex hull optimization Y Chen, H Xue, T Lan, G Venkataramani Computers & Security 90, 101708, 2020 | 6 | 2020 |
Learn2reason: Joint statistical and formal learning approach to improve the robustness and time-to-solution for software security H Xue The George Washington University, 2020 | 2 | 2020 |
Integrated Reasoning Engine for Pointer-related Code Clone Detection H Xue, Y Mei, K Gogineni, G Venkataramani, T Lan arXiv preprint arXiv:2105.11933, 2021 | 1 | 2021 |
AMASS: Automated Software Mass Customization via Feature Identification and Tailoring H Xue, Y Chen, G Venkataramani, T Lan EAI Endorsed Transactions on Security and Safety 6 (20), 2019 | 1 | 2019 |
Clone-Slicer H Xue, G Venkataramani, T Lan Proceedings of the 2018 Workshop on Forming an Ecosystem Around Software …, 2018 | | 2018 |
POSTER: MORPH: Enhancing System Security through Interactive Customization of Application and Communication Protocol Features H Xue, Y Chen, G Venkataramani, T Lan, G Jin, J Li | | |