What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jun Xu
Google Scholar
31
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Inspecting Virtual Machine Diversification Inside Virtualization Obfuscation.
Naiqian Zhang
Dongpeng Xu
Jiang Ming
Jun Xu
Qiaoyan Yu
2025
conf/sp
Alleviating the Fear of Losing Alignment in LLM Fine-tuning.
Kang Yang
Guanhong Tao
Xun Chen
Jun Xu
2024
conf/sp
Revisiting Black-box Ownership Verification for Graph Neural Networks.
Ruikai Zhou
Kang Yang
Xiuling Wang
Wendy Hui Wang
Jun Xu
2024
conf/acsac
Sidecar: Leveraging Debugging Extensions in Commodity Processors to Secure Software.
Konstantinos Kleftogiorgos
Patrick Zielinski
Shan Huang
Jun Xu
Georgios Portokalidis
2023
journals/compsec
Generation-based fuzzing? Don't build a new generator, reuse!
Chengbin Pang
Hongbin Liu
Yifan Wang
Neil Zhenqiang Gong
Bing Mao
Jun Xu
2023
journals/popets
Disparate Vulnerability in Link Inference Attacks against Graph Neural Networks.
Da Zhong
Ruotong Yu
Kun Wu
Xiuling Wang
Jun Xu
Wendy Hui Wang
2023
conf/ccs
Profile-guided System Optimizations for Accelerated Greybox Fuzzing.
Yunhang Zhang
Chengbin Pang
Stefan Nagy
Xun Chen
Jun Xu
2023
conf/ccs
SysPart: Automated Temporal System Call Filtering for Binaries.
Vidya Lakshmi Rajagopalan
Konstantinos Kleftogiorgos
Enes Göktas
Jun Xu
Georgios Portokalidis
2023
conf/sp
AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities.
Zheyue Jiang
Yuan Zhang
Jun Xu
Xinqian Sun
Zhuang Liu
Min Yang
2023
conf/sp
AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities.
Zheyue Jiang
Yuan Zhang
Jun Xu
Xinqian Sun
Zhuang Liu
Min Yang
2023
conf/asiaccs
Eliminating Vulnerabilities by Disabling Unwanted Functionality in Binary Programs.
Mohamad Mansouri
Jun Xu
Georgios Portokalidis
2022
conf/uss
Ground Truth for Binary Disassembly is Not Easy.
Chengbin Pang
Tiantai Zhang
Ruotong Yu
Bing Mao
Jun Xu
2022
conf/uss
Debloating Address Sanitizer.
Yuchen Zhang
Chengbin Pang
Georgios Portokalidis
Nikos Triandopoulos
Jun Xu
2022
conf/asiaccs
Understanding Disparate Effects of Membership Inference Attacks and their Countermeasures.
Da Zhong
Haipei Sun
Jun Xu
Neil Zhenqiang Gong
Wendy Hui Wang
2022
conf/ndss
Building Embedded Systems Like It's 1996.
Ruotong Yu
Francesca Del Nin
Yuchen Zhang
Shan Huang
Pallavi Kaliyar
Sarah Zakto
Mauro Conti
Georgios Portokalidis
Jun Xu
2021
conf/sp
SoK: All You Ever Wanted to Know About x86/x64 Binary Disassembly But Were Afraid to Ask.
Chengbin Pang
Ruotong Yu
Yaohui Chen
Eric Koskinen
Georgios Portokalidis
Bing Mao
Jun Xu
2021
conf/dsn
Towards Optimal Use of Exception Handling Information for Function Detection.
Chengbin Pang
Ruotong Yu
Dongpeng Xu
Eric Koskinen
Georgios Portokalidis
Jun Xu
2020
conf/ccs
PDiff: Semantic-based Patch Presence Testing for Downstream Kernels.
Zheyue Jiang
Yuan Zhang
Jun Xu
Qi Wen
Zhenghe Wang
Xiaohan Zhang
Xinyu Xing
Min Yang
Zhemin Yang
2020
conf/sp
SAVIOR: Towards Bug-Driven Hybrid Testing.
Yaohui Chen
Peng Li
Jun Xu
Shengjian Guo
Rundong Zhou
Yulong Zhang
Tao Wei
Long Lu
2020
conf/esorics
HART: Hardware-Assisted Kernel Module Tracing on Arm.
Yunlan Du
Zhenyu Ning
Jun Xu
Zhilong Wang
Yueh-Hsun Lin
Fengwei Zhang
Xinyu Xing
Bing Mao
2019
conf/ccs
PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary.
Yaohui Chen
Dongliang Mu
Jun Xu
Zhichuang Sun
Wenbo Shen
Xinyu Xing
Long Lu
Bing Mao
2018
conf/ccs
LEMNA: Explaining Deep Learning based Security Applications.
Wenbo Guo
Dongliang Mu
Jun Xu
Purui Su
Gang Wang
Xinyu Xing
2018
conf/uss
FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.
Wei Wu
Yueqi Chen
Jun Xu
Xinyu Xing
Xiaorui Gong
Wei Zou
2018
conf/dsn
RoboADS: Anomaly Detection Against Sensor and Actuator Misbehaviors in Mobile Robots.
Pinyao Guo
Hunmin Kim
Nurali Virani
Jun Xu
Minghui Zhu
Peng Liu
2017
conf/ccs
FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware.
Jian Huang
Jun Xu
Xinyu Xing
Peng Liu
Moinuddin K. Qureshi
2017
conf/uss
Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.
Jun Xu
Dongliang Mu
Xinyu Xing
Peng Liu
Ping Chen
Bing Mao
2017
conf/dsn
What You See is Not What You Get! Thwarting Just-in-Time ROP with Chameleon.
Ping Chen
Jun Xu
Zhisheng Hu
Xinyu Xing
Minghui Zhu
Bing Mao
Peng Liu
2016
conf/ccs
CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump.
Jun Xu
Dongliang Mu
Ping Chen
Xinyu Xing
Pei Wang
Peng Liu
2016
conf/ccs
Demo: A Symbolic N-Variant System.
Jun Xu
Pinyao Guo
Bo Chen
Robert F. Erbacher
Ping Chen
Peng Liu
2015
conf/esorics
A Practical Approach for Adaptive Data Structure Layout Randomization.
Ping Chen
Jun Xu
Zhiqiang Lin
Dongyan Xu
Bing Mao
Peng Liu
2014
conf/ccs
Comparing Different Moving Target Defense Techniques.
Jun Xu
Pinyao Guo
Mingyi Zhao
Robert F. Erbacher
Minghui Zhu
Peng Liu
Coauthors
Bing Mao
(8)
Bo Chen
(1)
Chengbin Pang
(6)
Da Zhong
(2)
Dongliang Mu
(4)
Dongpeng Xu
(2)
Dongyan Xu
(1)
Enes Göktas
(1)
Eric Koskinen
(2)
Fengwei Zhang
(1)
Francesca Del Nin
(1)
Gang Wang
(1)
Georgios Portokalidis
(7)
Guanhong Tao
(1)
Haipei Sun
(1)
Hongbin Liu
(1)
Hunmin Kim
(1)
Jian Huang
(1)
Jiang Ming
(1)
Jun Xu
(31)
Kang Yang
(2)
Konstantinos Kleftogiorgos
(2)
Kun Wu
(1)
Long Lu
(2)
Mauro Conti
(1)
Min Yang
(3)
Minghui Zhu
(3)
Mingyi Zhao
(1)
Mohamad Mansouri
(1)
Moinuddin K. Qureshi
(1)
Naiqian Zhang
(1)
Neil Zhenqiang Gong
(2)
Nikos Triandopoulos
(1)
Nurali Virani
(1)
Pallavi Kaliyar
(1)
Patrick Zielinski
(1)
Pei Wang
(1)
Peng Li
(1)
Peng Liu
(8)
Ping Chen
(5)
Pinyao Guo
(3)
Purui Su
(1)
Qi Wen
(1)
Qiaoyan Yu
(1)
Robert F. Erbacher
(2)
Ruikai Zhou
(1)
Rundong Zhou
(1)
Ruotong Yu
(5)
Sarah Zakto
(1)
Shan Huang
(2)
Shengjian Guo
(1)
Stefan Nagy
(1)
Tao Wei
(1)
Tiantai Zhang
(1)
Vidya Lakshmi Rajagopalan
(1)
Wei Wu
(1)
Wei Zou
(1)
Wenbo Guo
(1)
Wenbo Shen
(1)
Wendy Hui Wang
(3)
Xiaohan Zhang
(1)
Xiaorui Gong
(1)
Xinqian Sun
(2)
Xinyu Xing
(9)
Xiuling Wang
(2)
Xun Chen
(2)
Yaohui Chen
(3)
Yifan Wang
(1)
Yuan Zhang
(3)
Yuchen Zhang
(2)
Yueh-Hsun Lin
(1)
Yueqi Chen
(1)
Yulong Zhang
(1)
Yunhang Zhang
(1)
Yunlan Du
(1)
Zhemin Yang
(1)
Zhenghe Wang
(1)
Zhenyu Ning
(1)
Zheyue Jiang
(3)
Zhichuang Sun
(1)
Zhilong Wang
(1)
Zhiqiang Lin
(1)
Zhisheng Hu
(1)
Zhuang Liu
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to