Login / Signup
Jun Xu
Publication Activity (10 Years)
Years Active: 1999-2008
Publications (10 Years): 0
</>
Publications
</>
XiaoFeng Wang
,
Zhuowei Li
,
Jong Youl Choi
,
Jun Xu
,
Michael K. Reiter
,
Chongkyung Kil
Fast and Black-box Exploit Detection and Signature Generation for Commodity Software.
ACM Trans. Inf. Syst. Secur.
12 (2) (2008)
Mithun Acharya
,
Tao Xie
,
Jian Pei
,
Jun Xu
Mining API patterns as partial orders from source code: from usage scenarios to specifications.
ESEC/SIGSOFT FSE
(2007)
Emre Can Sezer
,
Peng Ning
,
Chongkyung Kil
,
Jun Xu
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities.
CCS
(2007)
XiaoFeng Wang
,
Zhuowei Li
,
Jun Xu
,
Michael K. Reiter
,
Chongkyung Kil
,
Jong Youl Choi
Packet vaccine: black-box exploit detection and signature generation.
CCS
(2006)
Yan Zhai
,
Peng Ning
,
Jun Xu
Integrating IDS Alert Correlation and OS-Level Dependency Tracking.
ISI
(2006)
Shuo Chen
,
Jun Xu
,
Zbigniew T. Kalbarczyk
,
Ravishankar K. Iyer
Security Vulnerabilities: From Analysis to Detection and Masking Techniques.
Proc. IEEE
94 (2) (2006)
Mithun Acharya
,
Tanu Sharma
,
Jun Xu
,
Tao Xie
Effective Generation of Interface Robustness Properties for Static Analysis.
ASE
(2006)
Mithun Acharya
,
Tao Xie
,
Jun Xu
Mining Interface Specifications for Generating Checkable Robustness Properties.
ISSRE
(2006)
Chongkyung Kil
,
Jinsuk Jun
,
Christopher Bookholt
,
Jun Xu
,
Peng Ning
Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software.
ACSAC
(2006)
Shuo Chen
,
Jun Xu
,
Nithin Nakka
,
Zbigniew Kalbarczyk
,
Ravishankar K. Iyer
Defeating Memory Corruption Attacks via Pointer Taintedness Detection.
DSN
(2005)
Shuo Chen
,
Jun Xu
,
Emre Can Sezer
Non-Control-Data Attacks Are Realistic Threats.
USENIX Security Symposium
(2005)
Jun Xu
,
Peng Ning
,
Chongkyung Kil
,
Yan Zhai
,
Christopher Bookholt
Automatic diagnosis and response to memory corruption vulnerabilities.
CCS
(2005)
Nithin Nakka
,
Zbigniew Kalbarczyk
,
Ravishankar K. Iyer
,
Jun Xu
An Architectural Framework for Providing Reliability and Security Support.
DSN
(2004)
Shuo Chen
,
Jun Xu
,
Zbigniew Kalbarczyk
,
Ravishankar K. Iyer
,
Keith Whisnant
Modeling and evaluating the security threats of transient errors in firewall software.
Perform. Evaluation
56 (1-4) (2004)
Frank Castaneda
,
Emre Can Sezer
,
Jun Xu
WORM vs. WORM: preliminary study of an active counter-attack mechanism.
WORM
(2004)
Ravishankar K. Iyer
,
Shuo Chen
,
Jun Xu
,
Zbigniew Kalbarczyk
Security Vulnerabilities - From Data Analysis to Protection Mechanisms.
WORDS Fall
(2003)
Jun Xu
,
Zbigniew Kalbarczyk
,
Ravishankar K. Iyer
Transparent Runtime Randomization for Security.
SRDS
(2003)
Shuo Chen
,
Zbigniew Kalbarczyk
,
Jun Xu
,
Ravishankar K. Iyer
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities.
DSN
(2003)
Shuo Chen
,
Jun Xu
,
Ravishankar K. Iyer
,
Keith Whisnant
Evaluating the Security Threat of Firewall Data Corruption Caused by Transient Errors.
DSN
(2002)
David T. Stott
,
Neil A. Speirs
,
Zbigniew Kalbarczyk
,
Saurabh Bagchi
,
Jun Xu
,
Ravishankar K. Iyer
Comparing Fail-Sailence Provided by Process Duplication versus Internal Error Detection for DHCP Server.
IPDPS
(2001)
Jun Xu
,
Shuo Chen
,
Zbigniew Kalbarczyk
,
Ravishankar K. Iyer
An Experimental Study of Security Vulnerabilities Caused by Errors.
DSN
(2001)
Jun Xu
,
Zbigniew Kalbarczyk
,
Ravishankar K. Iyer
Networked Windows NT System Field Failure Data Analysis.
PRDC
(1999)