Dongpeng Xu

Orcid: 0000-0001-6596-9101

Affiliations:
  • University of New Hampshire, Durham, NH, USA


According to our database1, Dongpeng Xu authored at least 23 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An In-Depth Analysis of the Code-Reuse Gadgets Introduced by Software Obfuscation.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
No Free Lunch: On the Increased Code Reuse Attack Surface of Obfuscated Programs.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

2022
Generating Effective Software Obfuscation Sequences With Reinforcement Learning.
IEEE Trans. Dependable Secur. Comput., 2022

2021
Security Threat Analyses and Attack Models for Approximate Computing Systems: From Hardware and Micro-architecture Perspectives.
ACM Trans. Design Autom. Electr. Syst., 2021

MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation.
Proceedings of the 30th USENIX Security Symposium, 2021

Boosting SMT solver performance on mixed-bitwise-arithmetic expressions.
Proceedings of the PLDI '21: 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation, 2021

Software Obfuscation with Non-Linear Mixed Boolean-Arithmetic Expressions.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

GraphMR: Graph Neural Network for Mathematical Reasoning.
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021

Towards Optimal Use of Exception Handling Information for Function Detection.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

2020
Blurring Boundaries: A New Way to Secure Approximate Computing Systems.
Proceedings of the GLSVLSI '20: Great Lakes Symposium on VLSI 2020, 2020

NeuReduce: Reducing Mixed Boolean-Arithmetic Expressions by Recurrent Neural Network.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2020, 2020

VAHunt: Warding Off New Repackaged Android Malware in App-Virtualization's Clothing.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Security Threats and Countermeasures for Approximate Arithmetic Computing.
Proceedings of the 25th Asia and South Pacific Design Automation Conference, 2020

2019
Memory access integrity: detecting fine-grained memory access errors in binary code.
Cybersecur., 2019

MetaHunt: Towards Taming Malware Mutation via Studying the Evolution of Metamorphic Virus.
Proceedings of the 3rd ACM Workshop on Software Protection, 2019

2018
VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
MalwareHunt: semantics-based malware diffing speedup by normalized basic block memoization.
J. Comput. Virol. Hacking Tech., 2017

BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking.
Proceedings of the 26th USENIX Security Symposium, 2017

Cryptographic Function Detection in Obfuscated Binaries via Bit-Precise Symbolic Loop Mapping.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

2016
Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method.
Proceedings of the Information Security - 19th International Conference, 2016

2015
Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2012
An Address-Based Compiling Optimization for FFT on Multi-cluster DSP.
Proceedings of the Fifth International Symposium on Parallel Architectures, 2012


  Loading...