Jun Xu

Affiliations:
  • Google Inc., Mountain View, CA, USA
  • North Carolina State University, Raleigh, NC, USA (former)
  • University of Illinois at Urbana-Champaign, IL, USA (former)


According to our database1, Jun Xu authored at least 23 papers between 1999 and 2008.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2008
Fast and Black-box Exploit Detection and Signature Generation for Commodity Software.
ACM Trans. Inf. Syst. Secur., 2008

2007
Mining API patterns as partial orders from source code: from usage scenarios to specifications.
Proceedings of the 6th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2007

Memsherlock: an automated debugger for unknown memory corruption vulnerabilities.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Security Vulnerabilities: From Analysis to Detection and Masking Techniques.
Proc. IEEE, 2006

Effective Generation of Interface Robustness Properties for Static Analysis.
Proceedings of the 21st IEEE/ACM International Conference on Automated Software Engineering (ASE 2006), 2006

Mining Interface Specifications for Generating Checkable Robustness Properties.
Proceedings of the 17th International Symposium on Software Reliability Engineering (ISSRE 2006), 2006

Integrating IDS Alert Correlation and OS-Level Dependency Tracking.
Proceedings of the Intelligence and Security Informatics, 2006

Packet vaccine: black-box exploit detection and signature generation.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Non-Control-Data Attacks Are Realistic Threats.
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005

Defeating Memory Corruption Attacks via Pointer Taintedness Detection.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

Automatic diagnosis and response to memory corruption vulnerabilities.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2004
Modeling and evaluating the security threats of transient errors in firewall software.
Perform. Evaluation, 2004

WORM vs. WORM: preliminary study of an active counter-attack mechanism.
Proceedings of the 2004 ACM Workshop on Rapid Malcode, 2004

An Architectural Framework for Providing Reliability and Security Support.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

2003
Software and Hardware Techniques for Masking Security Vulnerabilities
PhD thesis, 2003

Security Vulnerabilities - From Data Analysis to Protection Mechanisms.
Proceedings of the 9th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS Fall 2003), 2003

Transparent Runtime Randomization for Security.
Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 2003

A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

2002
Evaluating the Security Threat of Firewall Data Corruption Caused by Transient Errors.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

2001
Comparing Fail-Sailence Provided by Process Duplication versus Internal Error Detection for DHCP Server.
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001

An Experimental Study of Security Vulnerabilities Caused by Errors.
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001

1999
Networked Windows NT System Field Failure Data Analysis.
Proceedings of the 1999 Pacific Rim International Symposium on Dependable Computing (PRDC 1999), 1999


  Loading...