{BinSim}: Trace-based semantic binary diffing via system call sliced segment equivalence checking J Ming, D Xu, Y Jiang, D Wu 26th USENIX Security Symposium (USENIX Security 17), 253-270, 2017 | 137 | 2017 |
Loop: Logic-oriented opaque predicate detection in obfuscated binary code J Ming, D Xu, L Wang, D Wu Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015 | 107 | 2015 |
Cryptographic function detection in obfuscated binaries via bit-precise symbolic loop mapping D Xu, J Ming, D Wu 2017 IEEE Symposium on Security and Privacy (SP), 921-937, 2017 | 98 | 2017 |
Generalized dynamic opaque predicates: A new control flow obfuscation method D Xu, J Ming, D Wu Information Security: 19th International Conference, ISC 2016, Honolulu, HI …, 2016 | 63 | 2016 |
VMHunt: A verifiable approach to partially-virtualized binary code simplification D Xu, J Ming, Y Fu, D Wu Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 61 | 2018 |
Caregiver perspectives on a smart home-based socially assistive robot for individuals with Alzheimer’s disease and related dementia S Arthanat, M Begum, T Gu, DP LaRoche, D Xu, N Zhang Disability and Rehabilitation: Assistive Technology 15 (7), 789-798, 2020 | 50 | 2020 |
Memoized semantics-based binary diffing with application to malware lineage inference J Ming, D Xu, D Wu IFIP International Information Security and Privacy Conference, 416-430, 2015 | 47 | 2015 |
MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation B Liu, J Shen, J Ming, Q Zheng, J Li, D Xu USENIX Security 2021, 2021 | 29 | 2021 |
Vahunt: Warding off new repackaged android malware in app-virtualization's clothing L Shi, J Ming, J Fu, G Peng, D Xu, K Gao, X Pan Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020 | 24 | 2020 |
Boosting SMT solver performance on mixed-bitwise-arithmetic expressions D Xu, B Liu, W Feng, J Ming, Q Zheng, J Li, Q Yu Proceedings of the 42nd ACM SIGPLAN International Conference on Programming …, 2021 | 21 | 2021 |
Security threats and countermeasures for approximate arithmetic computing P Yellu, MR Monjur, T Kammerer, D Xu, Q Yu 2020 25th Asia and South Pacific design automation conference (ASP-DAC), 259-264, 2020 | 16 | 2020 |
Neureduce: Reducing mixed boolean-arithmetic expressions by recurrent neural network W Feng, B Liu, D Xu, Q Zheng, Y Xu Findings of the Association for Computational Linguistics: EMNLP 2020, 635-644, 2020 | 15 | 2020 |
Security threat analyses and attack models for approximate computing systems: From hardware and micro-architecture perspectives P Yellu, L Buell, M Mark, MA Kinsy, D Xu, Q Yu ACM Transactions on Design Automation of Electronic Systems (TODAES) 26 (4 …, 2021 | 13 | 2021 |
MalwareHunt: semantics-based malware diffing speedup by normalized basic block memoization J Ming, D Xu, D Wu Journal of computer virology and hacking techniques 13, 167-178, 2017 | 13 | 2017 |
Towards optimal use of exception handling information for function detection C Pang, R Yu, D Xu, E Koskinen, G Portokalidis, J Xu 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021 | 12 | 2021 |
Generating effective software obfuscation sequences with reinforcement learning H Wang, S Wang, D Xu, X Zhang, X Liu IEEE Transactions on Dependable and Secure Computing 19 (3), 1900-1917, 2020 | 11 | 2020 |
GraphMR: Graph neural network for mathematical reasoning W Feng, B Liu, D Xu, Q Zheng, Y Xu Proceedings of the 2021 Conference on Empirical Methods in Natural Language …, 2021 | 8 | 2021 |
Software obfuscation with non-linear mixed boolean-arithmetic expressions B Liu, W Feng, Q Zheng, J Li, D Xu Information and Communications Security: 23rd International Conference …, 2021 | 8 | 2021 |
Blurring boundaries: A new way to secure approximate computing systems P Yellu, L Buell, D Xu, Q Yu Proceedings of the 2020 on Great Lakes Symposium on VLSI, 327-332, 2020 | 8 | 2020 |
MetaHunt: Towards taming malware mutation via studying the evolution of metamorphic virus L Wang, D Xu, J Ming, Y Fu, D Wu Proceedings of the 3rd ACM Workshop on Software Protection, 15-26, 2019 | 8 | 2019 |