Login / Signup
Jun Xu
ORCID
Publication Activity (10 Years)
Years Active: 2014-2023
Publications (10 Years): 39
Top Topics
Anomaly Detection
Code Reuse
Moving Target Defense
Linux Kernel
Top Venues
CoRR
USENIX Security Symposium
CCS
DSN
</>
Publications
</>
Zheyue Jiang
,
Yuan Zhang
,
Jun Xu
,
Xinqian Sun
,
Zhuang Liu
,
Min Yang
AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities.
SP
(2023)
Jinghan Sun
,
Shaobo Li
,
Jun Xu
,
Jian Huang
The Security War in File Systems: An Empirical Study from A Vulnerability-centric Perspective.
ACM Trans. Storage
19 (4) (2023)
Chengbin Pang
,
Hongbin Liu
,
Yifan Wang
,
Neil Zhenqiang Gong
,
Bing Mao
,
Jun Xu
Generation-based fuzzing? Don't build a new generator, reuse!
Comput. Secur.
129 (2023)
Chengbin Pang
,
Tiantai Zhang
,
Ruotong Yu
,
Bing Mao
,
Jun Xu
Ground Truth for Binary Disassembly is Not Easy.
USENIX Security Symposium
(2022)
Ruotong Yu
,
Francesca Del Nin
,
Yuchen Zhang
,
Shan Huang
,
Pallavi Kaliyar
,
Sarah Zakto
,
Mauro Conti
,
Georgios Portokalidis
,
Jun Xu
Building Embedded Systems Like It's 1996.
NDSS
(2022)
Yuchen Zhang
,
Chengbin Pang
,
Georgios Portokalidis
,
Nikos Triandopoulos
,
Jun Xu
Debloating Address Sanitizer.
USENIX Security Symposium
(2022)
Ruotong Yu
,
Francesca Del Nin
,
Yuchen Zhang
,
Shan Huang
,
Pallavi Kaliyar
,
Sarah Zakto
,
Mauro Conti
,
Georgios Portokalidis
,
Jun Xu
Building Embedded Systems Like It's 1996.
CoRR
(2022)
Zijian Song
,
Jun Xu
,
Zhiwei Li
,
Dingfeng Ye
An Efficient Key Recovery Attack Against NTRUReEncrypt from AsiaCCS 2015.
INDOCRYPT
(2022)
Chengbin Pang
,
Ruotong Yu
,
Dongpeng Xu
,
Eric Koskinen
,
Georgios Portokalidis
,
Jun Xu
Towards Optimal Use of Exception Handling Information for Function Detection.
CoRR
(2021)
Yuandong Cyrus Liu
,
Chengbin Pang
,
Daniel Dietsch
,
Eric Koskinen
,
Ton-Chanh Le
,
Georgios Portokalidis
,
Jun Xu
Proving LTL Properties of Bitvector Programs and Decompiled Binaries.
APLAS
(2021)
Yuandong Cyrus Liu
,
Chengbin Pang
,
Daniel Dietsch
,
Eric Koskinen
,
Ton-Chanh Le
,
Georgios Portokalidis
,
Jun Xu
Source-Level Bitwise Branching for Temporal Verification of Lifted Binaries.
CoRR
(2021)
Chengbin Pang
,
Ruotong Yu
,
Yaohui Chen
,
Eric Koskinen
,
Georgios Portokalidis
,
Bing Mao
,
Jun Xu
SoK: All You Ever Wanted to Know About x86/x64 Binary Disassembly But Were Afraid to Ask.
IEEE Symposium on Security and Privacy
(2021)
Yifan Wang
,
Yuchen Zhang
,
Chengbin Pang
,
Peng Li
,
Nikolaos Triandopoulos
,
Jun Xu
Facilitating Parallel Fuzzing with mutually-exclusive Task Distribution.
CoRR
(2021)
Dongliang Mu
,
Yunlan Du
,
Jianhao Xu
,
Jun Xu
,
Xinyu Xing
,
Bing Mao
,
Peng Liu
POMP++: Facilitating Postmortem Program Diagnosis with Value-Set Analysis.
IEEE Trans. Software Eng.
47 (9) (2021)
Yifan Wang
,
Yuchen Zhang
,
Chengbin Pang
,
Peng Li
,
Nikolaos Triandopoulos
,
Jun Xu
Facilitating Parallel Fuzzing with Mutually-Exclusive Task Distribution.
SecureComm (2)
(2021)
Chengbin Pang
,
Ruotong Yu
,
Dongpeng Xu
,
Eric Koskinen
,
Georgios Portokalidis
,
Jun Xu
Towards Optimal Use of Exception Handling Information for Function Detection.
DSN
(2021)
Sijia Geng
,
Yuekang Li
,
Yunlan Du
,
Jun Xu
,
Yang Liu
,
Bing Mao
An Empirical Study on Benchmarks of Artificial Software Vulnerabilities.
CoRR
(2020)
Yunlan Du
,
Zhenyu Ning
,
Jun Xu
,
Zhilong Wang
,
Yueh-Hsun Lin
,
Fengwei Zhang
,
Xinyu Xing
,
Bing Mao
HART: Hardware-Assisted Kernel Module Tracing on Arm.
ESORICS (1)
(2020)
Yaohui Chen
,
Peng Li
,
Jun Xu
,
Shengjian Guo
,
Rundong Zhou
,
Yulong Zhang
,
Tao Wei
,
Long Lu
SAVIOR: Towards Bug-Driven Hybrid Testing.
IEEE Symposium on Security and Privacy
(2020)
Zheyue Jiang
,
Yuan Zhang
,
Jun Xu
,
Qi Wen
,
Zhenghe Wang
,
Xiaohan Zhang
,
Xinyu Xing
,
Min Yang
,
Zhemin Yang
PDiff: Semantic-based Patch Presence Testing for Downstream Kernels.
CCS
(2020)
Chengbin Pang
,
Ruotong Yu
,
Yaohui Chen
,
Eric Koskinen
,
Georgios Portokalidis
,
Bing Mao
,
Jun Xu
SoK: All You Ever Wanted to Know About x86/x64 Binary Disassembly But Were Afraid to Ask.
CoRR
(2020)
Yaohui Chen
,
Dongliang Mu
,
Jun Xu
,
Zhichuang Sun
,
Wenbo Shen
,
Xinyu Xing
,
Long Lu
,
Bing Mao
PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary.
CoRR
(2019)
Yaohui Chen
,
Peng Li
,
Jun Xu
,
Shengjian Guo
,
Rundong Zhou
,
Yulong Zhang
,
Tao Wei
,
Long Lu
SAVIOR: Towards Bug-Driven Hybrid Testing.
CoRR
(2019)
Yaohui Chen
,
Dongliang Mu
,
Jun Xu
,
Zhichuang Sun
,
Wenbo Shen
,
Xinyu Xing
,
Long Lu
,
Bing Mao
PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary.
AsiaCCS
(2019)
Pinyao Guo
,
Hunmin Kim
,
Nurali Virani
,
Jun Xu
,
Minghui Zhu
,
Peng Liu
RoboADS: Anomaly Detection Against Sensor and Actuator Misbehaviors in Mobile Robots.
DSN
(2018)
Pinyao Guo
,
Hunmin Kim
,
Nurali Virani
,
Jun Xu
,
Minghui Zhu
,
Peng Liu
Nonlinear Unknown Input and State Estimation Algorithm in Mobile Robots.
CoRR
(2018)
Wei Wu
,
Yueqi Chen
,
Jun Xu
,
Xinyu Xing
,
Xiaorui Gong
,
Wei Zou
FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.
USENIX Security Symposium
(2018)
Wenbo Guo
,
Dongliang Mu
,
Jun Xu
,
Purui Su
,
Gang Wang
,
Xinyu Xing
LEMNA: Explaining Deep Learning based Security Applications.
CCS
(2018)
Ping Chen
,
Zhisheng Hu
,
Jun Xu
,
Minghui Zhu
,
Peng Liu
Feedback control can make data structure layout randomization more cost-effective under zero-day attacks.
Cybersecur.
1 (1) (2018)
Jian Huang
,
Jun Xu
,
Xinyu Xing
,
Peng Liu
,
Moinuddin K. Qureshi
FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware.
CCS
(2017)
Jun Xu
,
Dongliang Mu
,
Xinyu Xing
,
Peng Liu
,
Ping Chen
,
Bing Mao
Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.
USENIX Security Symposium
(2017)
Dingfeng Ye
,
Peng Liu
,
Jun Xu
Towards Practical Obfuscation of General Circuits.
IACR Cryptol. ePrint Arch.
2017 (2017)
Ping Chen
,
Jun Xu
,
Zhisheng Hu
,
Xinyu Xing
,
Minghui Zhu
,
Bing Mao
,
Peng Liu
What You See is Not What You Get! Thwarting Just-in-Time ROP with Chameleon.
DSN
(2017)
Liang Deng
,
Peng Liu
,
Jun Xu
,
Ping Chen
,
Qingkai Zeng
Dancing with Wolves: Towards Practical Event-driven VMM Monitoring.
VEE
(2017)
Pinyao Guo
,
Hunmin Kim
,
Nurali Virani
,
Jun Xu
,
Minghui Zhu
,
Peng Liu
Exploiting Physical Dynamics to Detect Actuator and Sensor Attacks in Mobile Robots.
CoRR
(2017)
Jun Xu
,
Pinyao Guo
,
Bo Chen
,
Robert F. Erbacher
,
Ping Chen
,
Peng Liu
Demo: A Symbolic N-Variant System.
MTD@CCS
(2016)
Le Guan
,
Jun Xu
,
Shuai Wang
,
Xinyu Xing
,
Lin Lin
,
Heqing Huang
,
Peng Liu
,
Wenke Lee
From Physical to Cyber: Escalating Protection for Personalized Auto Insurance.
SenSys
(2016)
Jun Xu
,
Dongliang Mu
,
Ping Chen
,
Xinyu Xing
,
Pei Wang
,
Peng Liu
CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump.
CCS
(2016)
Le Guan
,
Jun Xu
,
Shuai Wang
,
Xinyu Xing
,
Lin Lin
,
Heqing Huang
,
Peng Liu
,
Wenke Lee
Exploiting Insurance Telematics for Fun and Profit.
CoRR
(2016)
Ping Chen
,
Jun Xu
,
Jun Wang
,
Peng Liu
Instantly Obsoleting the Address-code Associations: A New Principle for Defending Advanced Code Reuse Attack.
CoRR
(2015)
Ping Chen
,
Jun Xu
,
Zhiqiang Lin
,
Dongyan Xu
,
Bing Mao
,
Peng Liu
A Practical Approach for Adaptive Data Structure Layout Randomization.
ESORICS (1)
(2015)
Jun Xu
,
Pinyao Guo
,
Mingyi Zhao
,
Robert F. Erbacher
,
Minghui Zhu
,
Peng Liu
Comparing Different Moving Target Defense Techniques.
MTD@CCS
(2014)