Jun Xu
Jun Xu
Assistant Professor at The University of Utah
Verified email at - Homepage
Cited by
Cited by
Lemna: Explaining deep learning based security applications
W Guo, D Mu, J Xu, P Su, G Wang, X Xing
proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
Comparing different moving target defense techniques
J Xu, P Guo, M Zhao, RF Erbacher, M Zhu, P Liu
Proceedings of the First ACM Workshop on Moving Target Defense, 97-107, 2014
Savior: Towards bug-driven hybrid testing
Y Chen, P Li, J Xu, S Guo, R Zhou, Y Zhang, T Wei, L Lu
2020 IEEE Symposium on Security and Privacy (SP), 1580-1596, 2020
{FUZE}: Towards Facilitating Exploit Generation for Kernel {Use-After-Free} Vulnerabilities
W Wu, Y Chen, J Xu, X Xing, X Gong, W Zou
27th USENIX Security Symposium (USENIX Security 18), 781-797, 2018
FlashGuard: Leveraging intrinsic flash properties to defend against encryption ransomware
J Huang, J Xu, X Xing, P Liu, MK Qureshi
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
Sok: All you ever wanted to know about x86/x64 binary disassembly but were afraid to ask
C Pang, R Yu, Y Chen, E Koskinen, G Portokalidis, B Mao, J Xu
2021 IEEE symposium on security and privacy (SP), 833-851, 2021
Credal: Towards locating a memory corruption vulnerability with your core dump
J Xu, D Mu, P Chen, X Xing, P Wang, P Liu
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
Roboads: Anomaly detection against sensor and actuator misbehaviors in mobile robots
P Guo, H Kim, N Virani, J Xu, M Zhu, P Liu
2018 48th Annual IEEE/IFIP international conference on dependable systems …, 2018
Postmortem program analysis with {Hardware-Enhanced}{Post-Crash} artifacts
J Xu, D Mu, X Xing, P Liu, P Chen, B Mao
26th USENIX Security Symposium (USENIX Security 17), 17-32, 2017
A Practical Approach for Adaptive Data Structure Layout Randomization
P Chen, J Xu, Z Lin, D Xu, B Mao, P Liu
Computer Security – ESORICS 2015 9326, 69-89, 2015
Ptrix: Efficient hardware-assisted fuzzing for cots binary
Y Chen, D Mu, J Xu, Z Sun, W Shen, X Xing, L Lu, B Mao
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
Pdiff: Semantic-based patch presence testing for downstream kernels
Z Jiang, Y Zhang, J Xu, Q Wen, Z Wang, X Zhang, X Xing, M Yang, Z Yang
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
Exploiting physical dynamics to detect actuator and sensor attacks in mobile robots
P Guo, H Kim, N Virani, J Xu, M Zhu, P Liu
arXiv preprint arXiv:1708.01834, 2017
Dancing with wolves: Towards practical event-driven vmm monitoring
L Deng, P Liu, J Xu, P Chen, Q Zeng
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on …, 2017
From physical to cyber: Escalating protection for personalized auto insurance
L Guan, J Xu, S Wang, X Xing, L Lin, H Huang, P Liu, W Lee
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD …, 2016
Understanding disparate effects of membership inference attacks and their countermeasures
D Zhong, H Sun, J Xu, N Gong, WH Wang
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
Privacy for all: Demystify vulnerability disparity of differential privacy against membership inference attack
B Zhang, R Yu, H Sun, Y Li, J Xu, H Wang
arXiv preprint arXiv:2001.08855, 2020
Debloating Address Sanitizer
Y Zhang, C Pang, G Portokalidis, N Triandopoulos, J Xu
USENIX Security, 2022
What you see is not what you get! thwarting just-in-time rop with chameleon
P Chen, J Xu, Z Hu, X Xing, M Zhu, B Mao, P Liu
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
Towards optimal use of exception handling information for function detection
C Pang, R Yu, D Xu, E Koskinen, G Portokalidis, J Xu
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
The system can't perform the operation now. Try again later.
Articles 1–20