Dongpeng Xu
Title
Cited by
Cited by
Year
Loop: Logic-oriented opaque predicate detection in obfuscated binary code
J Ming, D Xu, L Wang, D Wu
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
702015
Cryptographic function detection in obfuscated binaries via bit-precise symbolic loop mapping
D Xu, J Ming, D Wu
2017 IEEE Symposium on Security and Privacy (SP), 921-937, 2017
642017
Binsim: Trace-based semantic binary diffing via system call sliced segment equivalence checking
J Ming, D Xu, Y Jiang, D Wu
26th {USENIX} Security Symposium ({USENIX} Security 17), 253-270, 2017
602017
Generalized dynamic opaque predicates: A new control flow obfuscation method
D Xu, J Ming, D Wu
International Conference on Information Security, 323-342, 2016
412016
VMHunt: A verifiable approach to partially-virtualized binary code simplification
D Xu, J Ming, Y Fu, D Wu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
362018
Memoized semantics-based binary diffing with application to malware lineage inference
J Ming, D Xu, D Wu
IFIP International Information Security and Privacy Conference, 416-430, 2015
322015
MalwareHunt: semantics-based malware diffing speedup by normalized basic block memoization
J Ming, D Xu, D Wu
Journal of Computer Virology and Hacking Techniques 13 (3), 167-178, 2017
82017
MetaHunt: Towards Taming Malware Mutation via Studying the Evolution of Metamorphic Virus
L Wang, D Xu, J Ming, Y Fu, D Wu
Proceedings of the 3rd ACM Workshop on Software Protection, 15-26, 2019
52019
VAHunt: Warding Off New Repackaged Android Malware in App-Virtualization's Clothing
L Shi, J Ming, J Fu, G Peng, D Xu, K Gao, X Pan
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
42020
Security threats and countermeasures for approximate arithmetic computing
P Yellu, MR Monjur, T Kammerer, D Xu, Q Yu
2020 25th Asia and South Pacific Design Automation Conference (ASP-DAC), 259-264, 2020
42020
NeuReduce: Reducing Mixed Boolean-Arithmetic Expressions by Recurrent Neural Network
W Feng, B Liu, D Xu, Q Zheng, Y Xu
Proceedings of the 2020 Conference on Empirical Methods in Natural Language …, 2020
32020
Caregiver perspectives on a smart home-based socially assistive robot for individuals with Alzheimer’s disease and related dementia
S Arthanat, M Begum, T Gu, DP LaRoche, D Xu, N Zhang
Disability and Rehabilitation: Assistive Technology 15 (7), 789-798, 2020
32020
MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation
B Liu, J Shen, J Ming, Q Zheng, J Li, D Xu
30th {USENIX} Security Symposium ({USENIX} Security 21), 2021
22021
Memory access integrity: detecting fine-grained memory access errors in binary code
W Li, D Xu, W Wu, X Gong, X Xiang, Y Wang, Q Zeng
Cybersecurity 2 (1), 1-18, 2019
22019
Opaque Predicate: Attack and Defense in Obfuscated Binary Code
D Xu
22018
An address-based compiling Optimization for FFT on multi-cluster DSP
D Xu, Q Zheng
2012 Fifth International Symposium on Parallel Architectures, Algorithms and …, 2012
22012
Generating Effective Software Obfuscation Sequences with Reinforcement Learning
H Wang, S Wang, D Xu, X Zhang, X Liu
IEEE Transactions on Dependable and Secure Computing, 2020
12020
Blurring boundaries: A new way to secure approximate computing systems
P Yellu, L Buell, D Xu, Q Yu
Proceedings of the 2020 on Great Lakes Symposium on VLSI, 327-332, 2020
12020
GraphMR: Graph Neural Network for Mathematical Reasoning
W Feng, B Liu, D Xu, Q Zheng, Y Xu
Proceedings of the 2021 Conference on Empirical Methods in Natural Language …, 2021
2021
Software Obfuscation with Non-Linear Mixed Boolean-Arithmetic Expressions
B Liu, W Feng, Q Zheng, J Li, D Xu
International Conference on Information and Communications Security, 276-292, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–20