Lemna: Explaining deep learning based security applications W Guo, D Mu, J Xu, P Su, G Wang, X Xing proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 346 | 2018 |
Understanding the reproducibility of crowd-reported security vulnerabilities D Mu, A Cuevas, L Yang, H Hu, X Xing, B Mao, G Wang 27th USENIX Security Symposium (USENIX Security 18), 919-936, 2018 | 117 | 2018 |
Postmortem program analysis with {Hardware-Enhanced}{Post-Crash} artifacts J Xu, D Mu, X Xing, P Liu, P Chen, B Mao 26th USENIX Security Symposium (USENIX Security 17), 17-32, 2017 | 56 | 2017 |
Credal: Towards locating a memory corruption vulnerability with your core dump J Xu, D Mu, P Chen, X Xing, P Wang, P Liu Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 54 | 2016 |
Ptrix: Efficient hardware-assisted fuzzing for cots binary Y Chen, D Mu, J Xu, Z Sun, W Shen, X Xing, L Lu, B Mao Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019 | 50 | 2019 |
{DEEPVSA}: Facilitating value-set analysis with deep learning for postmortem program analysis W Guo, D Mu, X Xing, M Du, D Song 28th USENIX Security Symposium (USENIX Security 19), 1787-1804, 2019 | 33 | 2019 |
GREBE: Unveiling exploitation potential for Linux kernel bugs Z Lin, Y Chen, Y Wu, D Mu, C Yu, X Xing, K Li 2022 IEEE Symposium on Security and Privacy (SP), 2078-2095, 2022 | 24 | 2022 |
ROPOB: obfuscating binary code via return oriented programming D Mu, J Guo, W Ding, Z Wang, B Mao, L Shi Security and Privacy in Communication Networks: 13th International …, 2018 | 18 | 2018 |
Min Du, and Dawn Song. 2019. DEEPVSA: Facilitating value-set analysis with deep learning for postmortem program analysis W Guo, D Mu, X Xing 28th USENIX Security Symposium (USENIX Security 19) 1804, 1787 | 14 | 1787 |
Characterizing and detecting webassembly runtime bugs Y Zhang, S Cao, H Wang, Z Chen, X Luo, D Mu, Y Ma, G Huang, X Liu ACM Transactions on Software Engineering and Methodology 33 (2), 1-29, 2023 | 12 | 2023 |
Renn: Efficient reverse execution with neural-network-assisted alias analysis D Mu, W Guo, A Cuevas, Y Chen, J Gai, X Xing, B Mao, C Song 2019 34th IEEE/ACM International Conference on Automated Software …, 2019 | 12 | 2019 |
POMP++: Facilitating postmortem program diagnosis with value-set analysis D Mu, Y Du, J Xu, J Xu, X Xing, B Mao, P Liu IEEE Transactions on Software Engineering 47 (9), 1929-1942, 2019 | 12 | 2019 |
Diffguard: Obscuring sensitive information in canary based protections J Zhu, W Zhou, Z Wang, D Mu, B Mao Security and Privacy in Communication Networks: 13th International …, 2018 | 7 | 2018 |
An in-depth analysis of duplicated linux kernel bug reports D Mu, Y Wu, Y Chen, Z Lin, C Yu, X Xing, G Wang Network and Distributed Systems Security Symposium (NDSS), 2022 | 5 | 2022 |
Robin: Facilitating the reproduction of configuration-related vulnerability L Chen, J Guo, Z He, D Mu, B Mao 2021 IEEE 20th International Conference on Trust, Security and Privacy in …, 2021 | 4 | 2021 |
Mitigating Security Risks in Linux with {KLAUS}: A Method for Evaluating Patch Correctness Y Wu, Z Lin, Y Chen, DK Le, D Mu, X Xing 32nd USENIX Security Symposium (USENIX Security 23), 4247-4264, 2023 | 3 | 2023 |
Towards Unveiling Exploitation Potential With Multiple Error Behaviors for Kernel Bugs Z Liu, Z Lin, Y Chen, Y Wu, Y Zou, D Mu, X Xing IEEE Transactions on Dependable and Secure Computing 21 (1), 93-109, 2023 | 1 | 2023 |
Building Adversarial Defense with Non-invertible Data Transformations W Guo, D Mu, L Chen, J Gai PRICAI 2019: Trends in Artificial Intelligence: 16th Pacific Rim …, 2019 | | 2019 |
LEMNA W Guo, D Mu, J Xu, P Su, G Wang, X Xing Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | | 2018 |