Jun Xu

Orcid: 0009-0002-8128-5062

Affiliations:
  • Stevens Institute of Technology, Hoboken, NJ, USA
  • Pennsylvania State University, College of Information Sciences and Technology, State College, PA, USA (former)


According to our database1, Jun Xu authored at least 45 papers between 2014 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
The Security War in File Systems: An Empirical Study from A Vulnerability-centric Perspective.
ACM Trans. Storage, November, 2023

Disparate Vulnerability in Link Inference Attacks against Graph Neural Networks.
Proc. Priv. Enhancing Technol., October, 2023

Generation-based fuzzing? Don't build a new generator, reuse!
Comput. Secur., June, 2023

AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Profile-guided System Optimizations for Accelerated Greybox Fuzzing.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

SysPart: Automated Temporal System Call Filtering for Binaries.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Eliminating Vulnerabilities by Disabling Unwanted Functionality in Binary Programs.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
S-Blocks: Lightweight and Trusted Virtual Security Function With SGX.
IEEE Trans. Cloud Comput., 2022

Debloating Address Sanitizer.
Proceedings of the 31st USENIX Security Symposium, 2022

Ground Truth for Binary Disassembly is Not Easy.
Proceedings of the 31st USENIX Security Symposium, 2022

Building Embedded Systems Like It's 1996.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Towards Understanding the Runtime Performance of Rust.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

An Efficient Key Recovery Attack Against NTRUReEncrypt from AsiaCCS 2015.
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022

Understanding Disparate Effects of Membership Inference Attacks and their Countermeasures.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
POMP++: Facilitating Postmortem Program Diagnosis with Value-Set Analysis.
IEEE Trans. Software Eng., 2021

Source-Level Bitwise Branching for Temporal Verification of Lifted Binaries.
CoRR, 2021

SoK: All You Ever Wanted to Know About x86/x64 Binary Disassembly But Were Afraid to Ask.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Facilitating Parallel Fuzzing with Mutually-Exclusive Task Distribution.
Proceedings of the Security and Privacy in Communication Networks, 2021

Towards Optimal Use of Exception Handling Information for Function Detection.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

Proving LTL Properties of Bitvector Programs and Decompiled Binaries.
Proceedings of the Programming Languages and Systems - 19th Asian Symposium, 2021

2020
An Empirical Study on Benchmarks of Artificial Software Vulnerabilities.
CoRR, 2020

Privacy for All: Demystify Vulnerability Disparity of Differential Privacy against Membership Inference Attack.
CoRR, 2020

SAVIOR: Towards Bug-Driven Hybrid Testing.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

HART: Hardware-Assisted Kernel Module Tracing on Arm.
Proceedings of the Computer Security - ESORICS 2020, 2020

PDiff: Semantic-based Patch Presence Testing for Downstream Kernels.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
MTD Techniques for Memory Protection Against Zero-Day Attacks.
Proceedings of the Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019

PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Feedback control can make data structure layout randomization more cost-effective under zero-day attacks.
Cybersecur., 2018

Nonlinear Unknown Input and State Estimation Algorithm in Mobile Robots.
CoRR, 2018

FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.
Proceedings of the 27th USENIX Security Symposium, 2018

RoboADS: Anomaly Detection Against Sensor and Actuator Misbehaviors in Mobile Robots.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

LEMNA: Explaining Deep Learning based Security Applications.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Towards Practical Obfuscation of General Circuits.
IACR Cryptol. ePrint Arch., 2017

Exploiting Physical Dynamics to Detect Actuator and Sensor Attacks in Mobile Robots.
CoRR, 2017

Dancing with Wolves: Towards Practical Event-driven VMM Monitoring.
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2017

Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.
Proceedings of the 26th USENIX Security Symposium, 2017

What You See is Not What You Get! Thwarting Just-in-Time ROP with Chameleon.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Exploiting Insurance Telematics for Fun and Profit.
CoRR, 2016

From Physical to Cyber: Escalating Protection for Personalized Auto Insurance.
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems, SenSys 2016, 2016

CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Demo: A Symbolic N-Variant System.
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016

2015
Instantly Obsoleting the Address-code Associations: A New Principle for Defending Advanced Code Reuse Attack.
CoRR, 2015

A Practical Approach for Adaptive Data Structure Layout Randomization.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
Comparing Different Moving Target Defense Techniques.
Proceedings of the First ACM Workshop on Moving Target Defense, 2014


  Loading...