Xunchao Hu
Xunchao Hu
Deepbits Technology Inc.
Verified email at - Homepage
Cited by
Cited by
Code injection attacks on html5-based mobile apps: Characterization, detection and mitigation
X Jin, X Hu, K Ying, W Du, H Yin, GN Peri
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
vfGuard: Strict Protection for Virtual Function Calls in COTS C++ Binaries.
A Prakash, X Hu, H Yin
NDSS, 2015
Make it work, make it right, make it fast: building a platform-neutral whole-system dynamic binary analysis platform
A Henderson, A Prakash, LK Yan, X Hu, X Wang, R Zhou, H Yin
Proceedings of the 2014 international symposium on software testing and …, 2014
Extract Me If You Can: Abusing PDF Parsers in Malware Detectors
C Carmony, M Zhang, X Hu, AV Bhaskar, H Yin
The Network and Distributed System Security Symposium 2016, 2016
DECAF: A Platform-Neutral Whole-System Dynamic Binary Analysis Platform
A Henderson, LK Yan, X Hu, A Prakash, H Yin, S McCamant
IEEE Transactions on Software Engineering, 2016
Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysis
S Zhu, X Hu, Z Qian, Z Shafiq, H Yin
The Network and Distributed System Security Symposium (NDSS) 2018, 2018
A performance comparison of the ad hoc network protocols
Q Feng, Z Cai, J Yang, X Hu
2009 Second International Workshop on Computer Science and Engineering 2 …, 2009
JSForce: A Forced Execution Engine for Malicious JavaScript Detection
X Hu, Y Cheng, Y Duan, A Henderson, H Yin
13th EAI International Conference on Security and Privacy in Communication …, 2017
{DeepDi}: Learning a relational graph convolutional network model on instructions for fast and accurate disassembly
S Yu, Y Qu, X Hu, H Yin
31st USENIX Security Symposium (USENIX Security 22), 2709-2725, 2022
Chaser: An enhanced fault injection tool for tracing soft errors in mpi applications
Q Guan, X Hu, T Grove, B Fang, H Jiang, H Yin, N DeBadeleben
2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020
Semantics-Preserving Dissection of JavaScript Exploits via Dynamic JS-Binary Analysis
X Hu, A Prakash, J Wang, R Zhou, Y Cheng, H Yin
the 19th Symposium on Research in Attacks, Intrusions and Defenses, 2016
ChaffyScript: Vulnerability-Agnostic Defense of JavaScript Exploits via Memory Perturbation
X Hu, B Testa, H Yin
Security and Privacy in Communication Networks: 15th EAI International …, 2019
An Extensible Dynamic Analysis Framework for IoT Devices
X Hu, Y Zheng, H Yin
Blackhat USA Arsenal 2018, 2018
DECAF-FSEFI: A Fine-grained, Accountable, Flexible, and Efficient Soft Error Fault Injection Framework for Profiling Application Vulnerability
X Hu, Q Guan, H Yin, N DeBardeleben
the 13th Workshop on Silicon Errors in Logic System Effects (SELSE-13), 2017
Detection, Diagnosis and Mitigation of Malicious Javascript with Enriched Javascript Executions
X Hu
Syracuse University, 2017
Poster: Automatic Dissection of JavaScript Exploits through Dynamic JS-Binary Analysis
X Hu, A Prakash, J Wang, R Zhou, H Yin
36th IEEE Symposium on Security and Privacy, 2015
On the Correctness of Metadata-based SBOM Generation: A Differential Analysis Approach
S Yu, W Song, X Hu, H Yin
The system can't perform the operation now. Try again later.
Articles 1–17