Ya Xiao

Orcid: 0000-0002-4030-811X

Affiliations:
  • Virginia Tech, Department of Computer Science, Blacksburg, VA, USA (PhD 2022)


According to our database1, Ya Xiao authored at least 28 papers between 2018 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Methods and Benchmark for Detecting Cryptographic API Misuses in Python.
IEEE Trans. Software Eng., May, 2024

Measurement of Embedding Choices on Cryptographic API Completion Tasks.
ACM Trans. Softw. Eng. Methodol., March, 2024

2023
Specializing Neural Networks for Cryptographic Code Completion Applications.
IEEE Trans. Software Eng., June, 2023

Evaluation of Static Vulnerability Detection Tools With Java Cryptographic API Benchmarks.
IEEE Trans. Software Eng., February, 2023

Automatic Detection of Java Cryptographic API Misuses: Are We There Yet?
IEEE Trans. Software Eng., 2023

Industrial Experience of Finding Cryptographic Vulnerabilities in Large-scale Codebases.
DTRAP, 2023

Crypto-ransomware Detection through Quantitative API-based Behavioral Profiling.
CoRR, 2023

2022
Neural Network-based Methodologies for Securing Cryptographic Code.
PhD thesis, 2022

Being the Developers' Friend: Our Experience Developing a High-Precision Tool for Secure Coding.
IEEE Secur. Priv., 2022

Deep Learning-based Anomaly Detection in Cyber-physical Systems: Progress and Opportunities.
ACM Comput. Surv., 2022

Privacy Guarantees of Bluetooth Low Energy Contact Tracing: A Case Study on COVIDWISE.
Computer, 2022

Industrial Strength Static Detection for Cryptographic API Misuses.
Proceedings of the IEEE Secure Development Conference, 2022

Example-based vulnerability detection and repair in Java code.
Proceedings of the 30th IEEE/ACM International Conference on Program Comprehension, 2022

Poster: Comprehensive Comparisons of Embedding Approaches for Cryptographic API Completion.
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2022

Privacy Guarantees of BLE Contact Tracing for COVID-19 and Beyond: A Case Study on COVIDWISE.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Privacy Guarantees of BLE Contact Tracing: A Case Study on COVIDWISE.
CoRR, 2021

Embedding Code Contexts for Cryptographic API Suggestion: New Methodologies and Comparisons.
CoRR, 2021

Data-Driven Vulnerability Detection and Repair in Java Code.
CoRR, 2021

Multi-location cryptographic code repair with neural-network-based methodologies.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

2020
Tutorial: Principles and Practices of Secure Cryptographic Coding in Java.
Proceedings of the IEEE Secure Development, SecDev 2020, Atlanta, GA, USA, 2020

Deployment-quality and Accessible Solutions for Cryptography Code Development.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

Methodologies for Quantifying (Re-)randomization Security and Timing under JIT-ROP.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Measuring Attack Surface Reduction in the Presence of Code (Re-)Randomization.
CoRR, 2019

Comparative Measurement of Cache Configurations' Impacts on Cache Timing Side-Channel Attacks.
Proceedings of the 12th USENIX Workshop on Cyber Security Experimentation and Test, 2019

Neural Cryptanalysis: Metrics, Methodology, and Applications in CPS Ciphers.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

Poster: Deployment-quality and Accessible Solutions for Cryptography Code Development.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
CHIRON: Deployment-quality Detection of Java Cryptographic Vulnerabilities.
CoRR, 2018


  Loading...