dblp.uni-trier.dewww.uni-trier.de

Xuxian Jiang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
22EERuishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui Yang, Xuxian Jiang: On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers. ASIACCS 2009: 61-69
21EERuishan Zhang, Xinyuan Wang, Xiaohui Yang, Ryan Farley, Xuxian Jiang: An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems. ISPEC 2009: 59-70
2008
20EERyan Riley, Xuxian Jiang, Dongyan Xu: Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing. RAID 2008: 1-20
19EEZhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang: Countering Persistent Kernel Rootkits through Systematic Hook Discovery. RAID 2008: 21-38
18EEDaniel Ramsbrock, Xinyuan Wang, Xuxian Jiang: A First Step towards Live Botmaster Traceback. RAID 2008: 59-77
17EEXuxian Jiang, Florian P. Buchholz, Aaron Walters, Dongyan Xu, Yi-Min Wang, Eugene H. Spafford: Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach. IEEE Trans. Parallel Distrib. Syst. 19(7): 890-902 (2008)
2007
16EEXuxian Jiang, Xinyuan Wang, Dongyan Xu: Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. ACM Conference on Computer and Communications Security 2007: 128-138
15EERyan Riley, Xuxian Jiang, Dongyan Xu: An Architectural Approach to Preventing Code Injection Attacks. DSN 2007: 30-40
14EEXuxian Jiang, Xinyuan Wang: "Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots. RAID 2007: 198-218
13EEMin Xu, Xuxian Jiang, Ravi S. Sandhu, Xinwen Zhang: Towards a VMM-based usage control framework for OS kernel integrity protection. SACMAT 2007: 71-80
12EEXuxian Jiang, Helen J. Wang, Dongyan Xu, Yi-Min Wang: RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization. SRDS 2007: 209-218
2006
11EEXuxian Jiang, Aaron Walters, Dongyan Xu, Eugene H. Spafford, Florian P. Buchholz, Yi-Min Wang: Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach. ICDCS 2006: 38
10EEYi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev, Chad Verbowski, Shuo Chen, Samuel T. King: Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. NDSS 2006
9EEXuxian Jiang, Dongyan Xu: Profiling self-propagating worms via behavioral footprinting. WORM 2006: 17-24
8EEXuxian Jiang, Dongyan Xu, Yi-Min Wang: Collapsar: A VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention. J. Parallel Distrib. Comput. 66(9): 1165-1180 (2006)
2005
7EEXuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford: Virtual Playgrounds for Worm Behavior Investigation. RAID 2005: 1-21
6EEPaul Ruth, Xuxian Jiang, Dongyan Xu, Sebastien Goasguen: Virtual Distributed Environments in a Shared Infrastructure. IEEE Computer 38(5): 63-69 (2005)
2004
5EEDongyan Xu, Xuxian Jiang: Towards an integrated multimedia service hosting overlay. ACM Multimedia 2004: 96-103
4EEXuxian Jiang, Dongyan Xu, Rudolf Eigenmann: Protection mechanisms for application service hosting platforms. CCGRID 2004: 656-663
3EEXuxian Jiang, Dongyan Xu: VIOLIN: Virtual Internetworking on Overlay Infrastructure. ISPA 2004: 937-946
2EEXuxian Jiang, Dongyan Xu: Collapsar: A VM-Based Architecture for Network Attack Detention Center. USENIX Security Symposium 2004: 15-28
2003
1EEXuxian Jiang, Dongyan Xu: SODA: A Service-On-Demand Architecture for Application Service Hosting Utility Platforms. HPDC 2003: 174-183

Coauthor Index

1Doug Beck [10]
2Florian P. Buchholz [11] [17]
3Shuo Chen [10]
4Weidong Cui [19]
5Rudolf Eigenmann [4]
6Ryan Farley [21] [22]
7Sebastien Goasguen [6]
8Samuel T. King [10]
9Daniel Ramsbrock [18]
10Ryan Riley [15] [20]
11Roussi Roussev [10]
12Paul Ruth [6]
13Ravi S. Sandhu [13]
14Eugene H. Spafford [7] [11] [17]
15Chad Verbowski [10]
16Aaron Walters [11] [17]
17Helen J. Wang [7] [12]
18Xinyuan Wang [14] [16] [18] [19] [21] [22]
19Yi-Min Wang [8] [10] [11] [12] [17]
20Zhi Wang [19]
21Dongyan Xu [1] [2] [3] [4] [5] [6] [7] [8] [9] [11] [12] [15] [16] [17] [20]
22Min Xu [13]
23Xiaohui Yang [21] [22]
24Ruishan Zhang [21] [22]
25Xinwen Zhang [13]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)