Xu Zhou

Orcid: 0000-0002-0075-5003

Affiliations:
  • National University of Defense Technology, College of Computer, Changsha, China


According to our database1, Xu Zhou authored at least 48 papers between 2012 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Efficient Forward-Edge Control-Flow Integrity for COTS Binaries via Arm BTI.
IEEE Trans. Inf. Forensics Secur., 2025

Constructing arbitrary write via puppet objects and delivering gadgets in Linux kernel.
Comput. Secur., 2025

2024
The progress, challenges, and perspectives of directed greybox fuzzing.
Softw. Test. Verification Reliab., March, 2024

Towards adaptive graph neural networks via solving prior-data conflicts.
Frontiers Inf. Technol. Electron. Eng., March, 2024

Armor: Protecting Software Against Hardware Tracing Techniques.
IEEE Trans. Inf. Forensics Secur., 2024

HyperGo: Probability-based directed hybrid fuzzing.
Comput. Secur., 2024

Efficiently Rebuilding Coverage in Hardware-Assisted Greybox Fuzzing.
Proceedings of the 27th International Symposium on Research in Attacks, 2024

DeepGo: Predictive Directed Greybox Fuzzing.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

2023
A Survey of the Security Analysis of Embedded Devices.
Sensors, November, 2023

IoTSim: Internet of Things-Oriented Binary Code Similarity Detection with Multiple Block Relations.
Sensors, September, 2023

UltraFuzz: Towards Resource-Saving in Distributed Fuzzing.
IEEE Trans. Software Eng., April, 2023

From Release to Rebirth: Exploiting Thanos Objects in Linux Kernel.
IEEE Trans. Inf. Forensics Secur., 2023

Leveraging Free Labels to Power up Heterophilic Graph Learning in Weakly-Supervised Settings: An Empirical Study.
Proceedings of the Machine Learning and Knowledge Discovery in Databases: Research Track, 2023

VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

ReForker: Patching x86_64 Binaries with the Fork Server to Improve Hardware-Assisted Fuzzing through Trampoline-Based Binary Rewriting.
Proceedings of the 2nd International Conference on Networks, 2023

2022
ovAFLow: Detecting Memory Corruption Bugs with Fuzzing-Based Taint Inference.
J. Comput. Sci. Technol., 2022

Towards Defense Against Adversarial Attacks on Graph Neural Networks via Calibrated Co-Training.
J. Comput. Sci. Technol., 2022

MobFuzz: Adaptive Multi-objective Optimization in Gray-box Fuzzing.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

2021
MEBS: Uncovering Memory Life-Cycle Bugs in Operating System Kernels.
J. Comput. Sci. Technol., 2021

CoG: a Two-View Co-training Framework for Defending Adversarial Attacks on Graph.
CoRR, 2021

2020
Sabotaging the system boundary: A study of the inter-boundary vulnerability.
J. Inf. Secur. Appl., 2020

UniFuzz: Optimizing Distributed Fuzzing via Dynamic Centralized Task Scheduling.
CoRR, 2020

SoK: The Progress, Challenges, and Perspectives of Directed Greybox Fuzzing.
CoRR, 2020

EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit.
Proceedings of the 29th USENIX Security Symposium, 2020

2019
DFTracker: detecting double-fetch bugs by multi-taint parallel tracking.
Frontiers Comput. Sci., 2019

AVPredictor: Comprehensive prediction and detection of atomicity violations.
Concurr. Comput. Pract. Exp., 2019

2018
Untrusted Hardware Causes Double-Fetch Problems in the I/O Memory.
J. Comput. Sci. Technol., 2018

A survey of the double-fetch vulnerabilities.
Concurr. Comput. Pract. Exp., 2018

DFTinker: Detecting and Fixing Double-Fetch Bugs in an Automated Way.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

2017
Fine-grained checkpoint based on non-volatile memory.
Frontiers Inf. Technol. Electron. Eng., 2017

Building Emulation Framework for Non-Volatile Memory.
IEEE Access, 2017

2015
Detecting harmful data races through parallel verification.
J. Supercomput., 2015

Write-Combined Logging: An Optimized Logging for Consistency in NVRAM.
Sci. Program., 2015

An Efficient and Flexible Deterministic Framework for Multithreaded Programs.
J. Comput. Sci. Technol., 2015

Collaborative Technique for Concurrency Bug Detection.
Int. J. Parallel Program., 2015

A Load-Balanced Deterministic Runtime for Pipeline Parallelism.
IEICE Trans. Inf. Syst., 2015

RaceChecker: Efficient Identification of Harmful Data Races.
Proceedings of the 23rd Euromicro International Conference on Parallel, 2015

2014
DRDet: Efficiently Making Data Races Deterministic.
IEICE Trans. Inf. Syst., 2014

Efficient deterministic multithreading without global barriers.
Proceedings of the ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2014

Enhancing the Security of Parallel Programs via Reducing Scheduling Space.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

2013
Deterministic Message Passing for Distributed Parallel Computing.
IEICE Trans. Inf. Syst., 2013

Understanding the Impact of BPRAM on Incremental Checkpoint.
IEICE Trans. Inf. Syst., 2013

ColFinder Collaborative Concurrency Bug Detection.
Proceedings of the 2013 13th International Conference on Quality Software, 2013

RaceFree: an efficient multi-threading model for determinism.
Proceedings of the ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2013

Pruning False Positives of Static Data-Race Detection via Thread Specialization.
Proceedings of the Advanced Parallel Processing Technologies, 2013

2012
Exploiting parallelism in deterministic shared memory multiprocessing.
J. Parallel Distributed Comput., 2012

dMPI: Facilitating Debugging of MPI Programs via Deterministic Message Passing.
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012

NV-process: a fault-tolerance process model based on non-volatile memory.
Proceedings of the Asia-Pacific Workshop on Systems, 2012


  Loading...