Xiaorui Gong

According to our database1, Xiaorui Gong authored at least 30 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Combating alert fatigue with AlertPro: Context-aware alert prioritization using reinforcement learning for multi-step attack detection.
Comput. Secur., February, 2024

ReIFunc: Identifying Recurring Inline Functions in Binary Code.
Proceedings of the IEEE International Conference on Software Analysis, 2024

CARDSHARK: Understanding and Stablizing Linux Kernel Concurrency Bugs Against the Odds.
Proceedings of the 33rd USENIX Security Symposium, 2024

2023
AppChainer: investigating the chainability among payloads in android applications.
Cybersecur., December, 2023

FSmell: Recognizing Inline Function in Binary Code.
Proceedings of the Computer Security - ESORICS 2023, 2023

Reverse Engineering Workload Measure based on Function Classification.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
Modx: Binary Level Partial Imported Third-Party Library Detection through Program Modularization and Semantic Matching.
CoRR, 2022

COMRace: Detecting Data Race Vulnerabilities in COM Objects.
Proceedings of the 31st USENIX Security Symposium, 2022

ModX: Binary Level Partially Imported Third-Party Library Detection via Program Modularization and Semantic Matching.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

2021
SEPAL: Towards a Large-scale Analysis of SEAndroid Policy Customization.
Proceedings of the WWW '21: The Web Conference 2021, 2021

MAZE: Towards Automated Heap Feng Shui.
Proceedings of the 30th USENIX Security Symposium, 2021

MAAC: Novel Alert Correlation Method To Detect Multi-step Attack.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Auto-Recon: An Automated Network Reconnaissance System Based on Knowledge Graph.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

Towards Automated Detection of Higher-Order Memory Corruption Vulnerabilities in Embedded Devices.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021

Ghost in the Binder: Binder Transaction Redirection Attacks in Android System Services.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
MAAC: Novel Alert Correlation Method To Detect Multi-step Attack.
CoRR, 2020

RouAlign: Cross-Version Function Alignment and Routine Recovery with Graphlet Edge Embedding.
Proceedings of the ICT Systems Security and Privacy Protection, 2020

HAEPG: An Automatic Multi-hop Exploitation Generation Framework.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020

Rolling Attack: An Efficient Way to Reduce Armors of Office Automation Devices.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
From proof-of-concept to exploitable.
Cybersecur., 2019

Memory access integrity: detecting fine-grained memory access errors in binary code.
Cybersecur., 2019

FuncNet: A Euclidean Embedding Approach for Lightweight Cross-platform Binary Recognition.
Proceedings of the Security and Privacy in Communication Networks, 2019

Wi-Fi Secure Access Control System Based on Geo-fence.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

PPIDS: A Pyramid-Like Printer Intrusion Detection System Based on ATT&CK Framework.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

2018
FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.
Proceedings of the 27th USENIX Security Symposium, 2018

Revery: From Proof-of-Concept to Exploitable.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
State-of-the-Art: Security Competition in Talent Education.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2015
A TOA-Based Geolocation Algorithm Utilizing Convex Combination.
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015

2012
SmartDroid: an automatic system for revealing UI-based trigger conditions in android applications.
Proceedings of the SPSM'12, 2012

2011
Poster: temporal attribute-based encryption in clouds.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011


  Loading...