Dongyan Xu [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Kernel-Supported Cost-Effective Audit Logging for Causality Tracking UsenixATCBoston-2018 - Boston, USA
Securing Real-Time Microcontroller Systems through Customized Memory View Switching. NDSS-2018 - san diego,usa
Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images. NDSS-2018 - san diego,usa
MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation. NDSS-2018 - san diego,usa
MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning usenixsecurity-2017 - vancouver,canada
Self Destructing Exploit Executions via Input Perturbation NDSS-2017 - california,usa
Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images USENIX-2016 - austin,usa
Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic WOOT-2016 - austin,usa
ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting NDSS-2016 - california,usa
Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows ACSAC-2015 - los angeles,usa
P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions NDSS-2015 - san diego,usa
DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse usenix-2014 - san diego,usa
X-Force: Force-Executing Binary Programs for Security Applications usenix-2014 - san diego,usa
SPIDER: Stealthy Binary Program Instrumentation and Debugging Via Hardware Virtualization ACSAC-2013 - New Orleans, USA
Process Out-Grafting: An Efficient Out-of-VM Approach for Fine-Grained Process Execution Monitoring Confrence-on-computer-communications-security-2011 - Chicago, USA
Collapsar: A Vm-Based Architecture For Network Attack Detention Center 13th USENIX Security Symposium-2004 - San Diego, USA Security