Dongyan Xu

According to our database1, Dongyan Xu
  • authored at least 128 papers between 1999 and 2017.
  • has a "Dijkstra number"2 of three.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
J-Force: Forced Execution on JavaScript.
Proceedings of the 26th International Conference on World Wide Web, 2017

MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning.
Proceedings of the 26th USENIX Security Symposium, 2017

CPR: cross platform binary code reuse via platform independent trace program.
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017

RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic.
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016

Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images.
Proceedings of the 25th USENIX Security Symposium, 2016

vMocity: Traveling VMs Across Heterogeneous Clouds.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems, 2016

PerfGuard: binary-centric application performance monitoring in production environments.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting.
Proceedings of the 23nd Annual Network and Distributed System Security Symposium, 2016

StorM: Enabling Tenant-Defined Cloud Storage Middle-Box Services.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

BASS: Improving I/O Performance for Cloud Block Storage via Byte-Addressable Storage Stack.
Proceedings of the Seventh ACM Symposium on Cloud Computing, 2016

LDX: Causality Inference by Lightweight Dual Execution.
Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems, 2016

HERCULE: attack story reconstruction via community discovery on correlated log graph.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

vRead: Efficient Data Access for Hadoop in Virtualized Clouds.
Proceedings of the 16th Annual Middleware Conference, Vancouver, BC, Canada, December 07, 2015

A Practical Approach for Adaptive Data Structure Layout Randomization.
Proceedings of the Computer Security - ESORICS 2015, 2015

LEAPS: Detecting Camouflaged Attacks with Statistical Learning Guided by Program Analysis.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

vFair: latency-aware fair storage scheduling via per-IO cost-based differentiation.
Proceedings of the Sixth ACM Symposium on Cloud Computing, 2015

VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

GUITAR: Piecing Together Android App GUIs from Memory Images.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality.
Proceedings of the 10th ACM Symposium on Information, 2015

iRiS: Vetting Private API Abuse in iOS Applications.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Dual Execution for On the Fly Fine Grained Execution Comparison.
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015

Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

vHaul: Towards Optimal Scheduling of Live Multi-VM Migration for Multi-tier Applications.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Data-Centric OS Kernel Malware Characterization.
IEEE Trans. Information Forensics and Security, 2014

DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

X-Force: Force-Executing Binary Programs for Security Applications.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

IntroPerf: transparent context-sensitive multi-layer performance inference using system stack traces.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2014

CLUE: System trace analytics for cloud service performance diagnosis.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Reuse-oriented reverse engineering of functional components from x86 binaries.
Proceedings of the 36th International Conference on Software Engineering, 2014

FACE-CHANGE: Application-Driven Dynamic Kernel View Switching in a Virtual Machine.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

Virtualization and security: happily ever after?
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

vPipe: Piped I/O Offloading for Efficient Data Movement in Virtualized Clouds.
Proceedings of the ACM Symposium on Cloud Computing, 2014

2013
Protocol Responsibility Offloading to Improve TCP Throughput in Virtualized Environments.
ACM Trans. Comput. Syst., 2013

vTurbo: Accelerating Virtual Machine I/O Processing Using Designated Turbo-Sliced Core.
Proceedings of the 2013 USENIX Annual Technical Conference, 2013

High Accuracy Attack Provenance via Binary-based Execution Partition.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

PIEtrace: Platform independent executable trace.
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013

Improved kernel security through memory layout randomization.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

vPipe: One Pipe to Connect Them All!
Proceedings of the 5th USENIX Workshop on Hot Topics in Cloud Computing, 2013

BISTRO: Binary Component Extraction and Embedding for Software Security Applications.
Proceedings of the Computer Security - ESORICS 2013, 2013

DRIP: A framework for purifying trojaned kernel drivers.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

Obfuscation resilient binary code reuse through trace-oriented programming.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

LogGC: garbage collecting audit log.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

SPIDER: stealthy binary program instrumentation and debugging via hardware virtualization.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
VNsnap: Taking Snapshots of Virtual Networked Infrastructures in the Cloud.
IEEE Trans. Services Computing, 2012

Precise, Scalable, and Online Request Tracing for Multitier Services of Black Boxes.
IEEE Trans. Parallel Distrib. Syst., 2012

Discovering Semantic Data of Interest from Un-mappable Memory with Confidence.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Guest-transparent instruction authentication for self-patching kernels.
Proceedings of the 31st IEEE Military Communications Conference, 2012

vSlicer: latency-aware virtual machine scheduling via differentiated-frequency CPU slicing.
Proceedings of the 21st International Symposium on High-Performance Parallel and Distributed Computing, 2012

CloudER: a framework for automatic software vulnerability location and patching in the cloud.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
In-network live snapshot service for recovering virtual infrastructures.
IEEE Network, 2011

Guest editorial - second part of special issue on cloud computing.
J. Internet Services and Applications, 2011

Guest editorial - special issue on cloud computing.
J. Internet Services and Applications, 2011

Autonomic live adaptation of virtual networked environments in a multidomain infrastructure.
J. Internet Services and Applications, 2011

Process Implanting: A New Active Introspection Framework for Virtualization.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems (SRDS 2011), 2011

SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.
Proceedings of the Network and Distributed System Security Symposium, 2011

Challenges in supporting virtual infrastructures in the cloud.
Proceedings of the 5th International Workshop on Virtualization Technologies in Distributed Computing, 2011

Opportunistic flooding to improve TCP transmit performance in virtualized clouds.
Proceedings of the ACM Symposium on Cloud Computing in conjunction with SOSP 2011, 2011

Process out-grafting: an efficient "out-of-VM" approach for fine-grained process execution monitoring.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Characterizing kernel malware behavior with kernel data access patterns.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Reverse Engineering Input Syntactic Structure from Program Execution and Its Applications.
IEEE Trans. Software Eng., 2010

Stealthy malware detection and monitoring through VMM-based "out-of-the-box" semantic view reconstruction.
ACM Trans. Inf. Syst. Secur., 2010

An Architectural Approach to Preventing Code Injection Attacks.
IEEE Trans. Dependable Sec. Comput., 2010

Guest Editorial: "Special issue on selected papers from NOSSDAV 2009".
Multimedia Syst., 2010

Precise, Scalable and Online Request Tracing for Multi-tier Services of Black Boxes
CoRR, 2010

LogMaster: Mining Event Correlations in Logs of Large scale Cluster Systems
CoRR, 2010

DKSM: Subverting Virtual Machine Introspection for Fun and Profit.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

vSnoop: Improving TCP Throughput in Virtualized Environments via Acknowledgement Offload.
Proceedings of the Conference on High Performance Computing Networking, 2010

Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Automatic Reverse Engineering of Data Structures from Binary Execution.
Proceedings of the Network and Distributed System Security Symposium, 2010

Strict control dependence and its effect on dynamic information flow analyses.
Proceedings of the Nineteenth International Symposium on Software Testing and Analysis, 2010

Reuse-oriented camouflaging trojan: Vulnerability detection and attack construction.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

2009
Multi-aspect profiling of kernel rootkit behavior.
Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April 1-3, 2009, 2009

VNsnap: Taking snapshots of virtual networked environments with minimal downtime.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

Polymorphing Software by Randomizing Data Structure Layout.
Proceedings of the Detection of Intrusions and Malware, 2009

Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach.
IEEE Trans. Parallel Distrib. Syst., 2008

Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution.
Proceedings of the Network and Distributed System Security Symposium, 2008

Middleware Integration and Deployment Strategies for Cyberinfrastructures.
Proceedings of the Advances in Grid and Pervasive Computing, 2008

Convicting exploitable software vulnerabilities: An efficient input provenance based approach.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

2007
Portable virtual cycle accounting for large-scale distributed cycle sharing systems.
Parallel Computing, 2007

RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization.
Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), 2007

Taking snapshots of virtual networked environments.
Proceedings of the 2nd International Workshop on Virtualization Technology in Distributed Computing, 2007

An Architectural Approach to Preventing Code Injection Attacks.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Trust-based privacy preservation for peer-to-peer data sharing.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2006

Robust Computation of Aggregates in Wireless Sensor Networks: Distributed Randomized Algorithms and Analysis.
IEEE Trans. Parallel Distrib. Syst., 2006

Analysis of a CDN-P2P hybrid architecture for cost-effective streaming media distribution.
Multimedia Syst., 2006

Collapsar: A VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention.
J. Parallel Distrib. Comput., 2006

Profiling self-propagating worms via behavioral footprinting.
Proceedings of the 2006 ACM Workshop on Rapid Malcode, 2006

Mixed Reality Tabletop (MRT): A Low-Cost Teleconferencing Framework for Mixed-Reality Applications.
Proceedings of the IEEE Virtual Reality Conference, 2006

Executing MPI programs on virtual machines in an Internet sharing system.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach.
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006

Autonomic Live Adaptation of Virtual Computational Environments in a Multi-Domain Infrastructure.
Proceedings of the 3rd International Conference on Autonomic Computing, 2006

Autonomic Adaptation of Virtual Distributed Environments in a Multi-Domain Infrastructure.
Proceedings of the 15th IEEE International Symposium on High Performance Distributed Computing, 2006

2005
A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming.
IEEE Trans. Knowl. Data Eng., 2005

CollectCast: A peer-to-peer service for media streaming.
Multimedia Syst., 2005

Virtual Distributed Environments in a Shared Infrastructure.
IEEE Computer, 2005

Virtual Playgrounds for Worm Behavior Investigation.
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005

Robust computation of aggregates in wireless sensor networks: distributed randomized algorithms and analysis.
Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks, 2005

VioCluster: Virtualization for Dynamic Computational Domains.
Proceedings of the 2005 IEEE International Conference on Cluster Computing (CLUSTER 2005), September 26, 2005

2004
Seamless User-Level Handoff in Ubiquitous Multimedia Service Delivery.
Multimedia Tools Appl., 2004

Collapsar: A VM-Based Architecture for Network Attack Detention Center.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

Towards an integrated multimedia service hosting overlay.
Proceedings of the 12th ACM International Conference on Multimedia, 2004

Policy-driven multifile distribution.
Proceedings of the Quality of Service, 2004

E-notebook Middleware for Accountability and Reputation Based Trust in Distributed Data Sharing Communities.
Proceedings of the Trust Management, Second International Conference, 2004

VIOLIN: Virtual Internetworking on Overlay Infrastructure.
Proceedings of the Parallel and Distributed Processing and Applications, 2004

Protection mechanisms for application service hosting platforms.
Proceedings of the 4th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGrid 2004), 2004

2003
iFlow: Middleware-assisted Rendezvous-based Information Access for Mobile Ad Hoc Applications.
Proceedings of the First International Conference on Mobile Systems, 2003

PROMISE: peer-to-peer media streaming using CollectCast.
Proceedings of the Eleventh ACM International Conference on Multimedia, 2003

GnuStream: a P2P media streaming system prototype.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

SODA: A Service-On-Demand Architecture for Application Service Hosting Utility Platforms.
Proceedings of the 12th International Symposium on High-Performance Distributed Computing (HPDC-12 2003), 2003

Analysis of Parallel Downloading for Large File Distribution.
Proceedings of the 9th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2003), 2003

2002
An XML-based Quality of Service Enabling Language for the Web.
J. Vis. Lang. Comput., 2002

An integrated runtime QoS-aware middleware framework for distributed multimedia applications.
Multimedia Syst., 2002

MeGaDiP: A wide-area Media Gateway Discovery Protocol.
Inf. Sci., 2002

Efficient Peer-to-Peer Data Dissemination in Mobile Ad-Hoc Networks.
Proceedings of the 31st International Conference on Parallel Processing Workshops (ICPP 2002 Workshops), 2002

On Peer-to-Peer Media Streaming.
ICDCS, 2002

2001
QoS and Contention-Aware Multi-Resource Reservation.
Cluster Computing, 2001

2K: An Integrated Approach of QoS Compilation and Reconfigurable, Component-Based Run-Time Middleware for the Unified QoS Management Framework.
Proceedings of the Middleware 2001, 2001

SMART: A Scalable Middleware solution for Ubiquitous Multimedia Service Delivery.
Proceedings of the 2001 IEEE International Conference on Multimedia and Expo, 2001

QoS-Aware Discovery of Wide-Area Distributed Services.
Proceedings of the First IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2001), 2001

2000
Resource-Aware Configuration of Ubiquitous Multimedia Services.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

Multimedia Service Configuration and Reservation in Heterogeneous Environments.
Proceedings of the 20th International Conference on Distributed Computing Systems, 2000

QoS and Contention-Aware Multi-Resource Reservation.
Proceedings of the Ninth IEEE International Symposium on High Performance Distributed Computing, 2000

1999
QoS-directed error control of video multicast in wireless networks.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1999), 1999


  Loading...