Jun Xu
Jun Xu
Assistant Professor at Stevens Institute of Technology
Verifierad e-postadress på stevens.edu - Startsida
Titel
Citeras av
Citeras av
År
Comparing different moving target defense techniques
J Xu, P Guo, M Zhao, RF Erbacher, M Zhu, P Liu
Proceedings of the First ACM Workshop on Moving Target Defense, 97-107, 2014
942014
Lemna: Explaining deep learning based security applications
W Guo, D Mu, J Xu, P Su, G Wang, X Xing
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
732018
FlashGuard: Leveraging intrinsic flash properties to defend against encryption ransomware
J Huang, J Xu, X Xing, P Liu, MK Qureshi
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
382017
A Practical Approach for Adaptive Data Structure Layout Randomization
P Chen, J Xu, Z Lin, D Xu, B Mao, P Liu
Computer Security – ESORICS 2015 9326, 69-89, 2015
342015
Credal: Towards locating a memory corruption vulnerability with your core dump
J Xu, D Mu, P Chen, X Xing, P Wang, P Liu
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
302016
{FUZE}: Towards facilitating exploit generation for kernel use-after-free vulnerabilities
W Wu, Y Chen, J Xu, X Xing, X Gong, W Zou
27th {USENIX} Security Symposium ({USENIX} Security 18), 781-797, 2018
212018
Postmortem program analysis with hardware-enhanced post-crash artifacts
J Xu, D Mu, X Xing, P Liu, P Chen, B Mao
26th {USENIX} Security Symposium ({USENIX} Security 17), 17-32, 2017
192017
Dancing with wolves: Towards practical event-driven vmm monitoring
L Deng, P Liu, J Xu, P Chen, Q Zeng
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on …, 2017
172017
From physical to cyber: Escalating protection for personalized auto insurance
L Guan, J Xu, S Wang, X Xing, L Lin, H Huang, P Liu, W Lee
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD …, 2016
152016
SAVIOR: towards bug-driven hybrid testing
Y Chen, P Li, J Xu, S Guo, R Zhou, Y Zhang, T Wei, L Lu
2020 IEEE Symposium on Security and Privacy (SP), 1580-1596, 2020
132020
RoboADS: Anomaly detection against sensor and actuator misbehaviors in mobile robots
P Guo, H Kim, N Virani, J Xu, M Zhu, P Liu
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
132018
Exploiting physical dynamics to detect actuator and sensor attacks in mobile robots
P Guo, H Kim, N Virani, J Xu, M Zhu, P Liu
arXiv preprint arXiv:1708.01834, 2017
122017
What you see is not what you get! thwarting just-in-time rop with chameleon
P Chen, J Xu, Z Hu, X Xing, M Zhu, B Mao, P Liu
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
72017
Feedback control can make data structure layout randomization more cost-effective under zero-day attacks
P Chen, Z Hu, J Xu, M Zhu, P Liu
Cybersecurity 1 (1), 3, 2018
52018
Ptrix: Efficient hardware-assisted fuzzing for cots binary
Y Chen, D Mu, J Xu, Z Sun, W Shen, X Xing, L Lu, B Mao
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
32019
Nonlinear unknown input and state estimation algorithm in mobile robots
P Guo, H Kim, N Virani, J Xu, M Zhu, P Liu
arXiv preprint arXiv:1804.02814, 2018
32018
Instantly obsoleting the address-code associations: A new principle for defending advanced code reuse attack
P Chen, J Xu, J Wang, P Liu
arXiv preprint arXiv:1507.02786, 2015
32015
POMP++: Facilitating Postmortem Program Diagnosis with Value-set Analysis
D Mu, Y Du, J Xu, J Xu, X Xing, B Mao, P Liu
IEEE Transactions on Software Engineering, 2019
12019
Exploiting insurance telematics for fun and profit
L Guan, J Xu, S Wang, X Xing, L Lin, H Huang, P Liu, W Lee
arXiv preprint arXiv: 1609.02234, 2016
12016
Towards Agile Cyber Analysis: Leveraging Visualization as Functions in Collaborative Visual Analytics
C Zhong, M Zhao, G Xiao, J Xu
Proceedings of IEEE Symposium on Visual Analytics Science and Technology, 2013
12013
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20