Code injection attacks on html5-based mobile apps: Characterization, detection and mitigation X Jin, X Hu, K Ying, W Du, H Yin, GN Peri Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 245 | 2014 |
vfGuard: Strict Protection for Virtual Function Calls in COTS C++ Binaries. A Prakash, X Hu, H Yin NDSS, 2015 | 160 | 2015 |
Make it work, make it right, make it fast: building a platform-neutral whole-system dynamic binary analysis platform A Henderson, A Prakash, LK Yan, X Hu, X Wang, R Zhou, H Yin Proceedings of the 2014 international symposium on software testing and …, 2014 | 146 | 2014 |
Extract Me If You Can: Abusing PDF Parsers in Malware Detectors C Carmony, M Zhang, X Hu, AV Bhaskar, H Yin The Network and Distributed System Security Symposium 2016, 2016 | 76 | 2016 |
DECAF: A Platform-Neutral Whole-System Dynamic Binary Analysis Platform A Henderson, LK Yan, X Hu, A Prakash, H Yin, S McCamant IEEE Transactions on Software Engineering, 2016 | 64 | 2016 |
Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysis S Zhu, X Hu, Z Qian, Z Shafiq, H Yin The Network and Distributed System Security Symposium (NDSS) 2018, 2018 | 56 | 2018 |
A performance comparison of the ad hoc network protocols Q Feng, Z Cai, J Yang, X Hu 2009 Second International Workshop on Computer Science and Engineering 2 …, 2009 | 38 | 2009 |
JSForce: A Forced Execution Engine for Malicious JavaScript Detection X Hu, Y Cheng, Y Duan, A Henderson, H Yin 13th EAI International Conference on Security and Privacy in Communication …, 2017 | 27 | 2017 |
{DeepDi}: Learning a relational graph convolutional network model on instructions for fast and accurate disassembly S Yu, Y Qu, X Hu, H Yin 31st USENIX Security Symposium (USENIX Security 22), 2709-2725, 2022 | 25 | 2022 |
Chaser: An enhanced fault injection tool for tracing soft errors in mpi applications Q Guan, X Hu, T Grove, B Fang, H Jiang, H Yin, N DeBadeleben 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020 | 6 | 2020 |
Semantics-Preserving Dissection of JavaScript Exploits via Dynamic JS-Binary Analysis X Hu, A Prakash, J Wang, R Zhou, Y Cheng, H Yin the 19th Symposium on Research in Attacks, Intrusions and Defenses, 2016 | 2 | 2016 |
On the Correctness of Metadata-based SBOM Generation: A Differential Analysis Approach S Yu, W Song, X Hu, H Yin | | 2024 |
ChaffyScript: Vulnerability-Agnostic Defense of JavaScript Exploits via Memory Perturbation X Hu, B Testa, H Yin Security and Privacy in Communication Networks: 15th EAI International …, 2019 | | 2019 |
An Extensible Dynamic Analysis Framework for IoT Devices X Hu, Y Zheng, H Yin Blackhat USA Arsenal 2018, 2018 | | 2018 |
DECAF-FSEFI: A Fine-grained, Accountable, Flexible, and Efficient Soft Error Fault Injection Framework for Profiling Application Vulnerability X Hu, Q Guan, H Yin, N DeBardeleben the 13th Workshop on Silicon Errors in Logic System Effects (SELSE-13), 2017 | | 2017 |
Detection, Diagnosis and Mitigation of Malicious Javascript with Enriched Javascript Executions X Hu Syracuse University, 2017 | | 2017 |
Poster: Automatic Dissection of JavaScript Exploits through Dynamic JS-Binary Analysis X Hu, A Prakash, J Wang, R Zhou, H Yin 36th IEEE Symposium on Security and Privacy, 2015 | | 2015 |