Xunchao Hu

According to our database1, Xunchao Hu authored at least 11 papers between 2014 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
DeepDi: Learning a Relational Graph Convolutional Network Model on Instructions for Fast and Accurate Disassembly.
Proceedings of the 31st USENIX Security Symposium, 2022

2020
Chaser: An Enhanced Fault Injection Tool for Tracing Soft Errors in MPI Applications.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

2019
ChaffyScript: Vulnerability-Agnostic Defense of JavaScript Exploits via Memory Perturbation.
Proceedings of the Security and Privacy in Communication Networks, 2019

2018
Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysis.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
DECAF: A Platform-Neutral Whole-System Dynamic Binary Analysis Platform.
IEEE Trans. Software Eng., 2017

JSForce: A Forced Execution Engine for Malicious JavaScript Detection.
Proceedings of the Security and Privacy in Communication Networks, 2017

2016
Semantics-Preserving Dissection of JavaScript Exploits via Dynamic JS-Binary Analysis.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

Extract Me If You Can: Abusing PDF Parsers in Malware Detectors.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
vfGuard: Strict Protection for Virtual Function Calls in COTS C++ Binaries.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2014
Make it work, make it right, make it fast: building a platform-neutral whole-system dynamic binary analysis platform.
Proceedings of the International Symposium on Software Testing and Analysis, 2014

Code Injection Attacks on HTML5-based Mobile Apps: Characterization, Detection and Mitigation.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014


  Loading...