Follow
Yunlong Xing
Title
Cited by
Cited by
Year
BinProv: Binary Code Provenance Identification without Disassembly
X He, S Wang, Y Xing, P Feng, H Wang, Q Li, S Chen, K Sun
The 25th International Symposium on Research in Attacks, Intrusions and …, 2022
112022
The devil is in the detail: Generating system call whitelist for Linux seccomp
Y Xing, J Cao, K Sun, F Yan, S Wan
Future Generation Computer Systems (FGCS) 135, 105-113, 2022
52022
Cross Container Attacks: The Bewildered eBPF on Clouds
Y He, R Guo, Y Xing, X Che, K Sun, Z Liu, K Xu, Q Li
The 32nd USENIX Security Symposium (USENIX Security 23), 5971-5988, 2023
22023
A Hybrid System Call Profiling Approach for Container Protection
Y Xing, X Wang, S Torabi, Z Zhang, L Lei, K Sun
IEEE Transactions on Dependable and Secure Computing (TDSC), 2023
22023
Exploring Security Commits in Python
S Sun, S Wang, X Wang, Y Xing, E Zhang, K Sun
The 39th IEEE International Conference on Software Maintenance and Evolution …, 2023
12023
What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check
Y Xing, S Wang, S Sun, X He, K Sun, Q Li
The 33rd USENIX Security Symposium (USENIX Security 24), 2024
2024
SysCap: Profiling and Crosschecking Syscall and Capability Configurations for Docker Images
Y Xing, J Cao, X Wang, S Torabi, K Sun, F Yan, Q Li
The 10th annual IEEE Conference on Communications and Network Security (IEEE …, 2022
2022
Container Security Protection Scheme Based on System Call Restriction
Y Xing, F Yan, Y Liu, L Zhang
Journal of Wuhan University (Natural Science Edition) 1, 35-43, 2022
2022
Research on Cryptographic Algorithm Recognition Based on Behavior Analysis
F Yan, Y Xing, S Zhang, Z Yue, Y Zheng
The 11th Chinese Conference on Trusted Computing and Information Security …, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–9