2009 |
22 | EE | Ruishan Zhang,
Xinyuan Wang,
Ryan Farley,
Xiaohui Yang,
Xuxian Jiang:
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers.
ASIACCS 2009: 61-69 |
21 | EE | Ruishan Zhang,
Xinyuan Wang,
Xiaohui Yang,
Ryan Farley,
Xuxian Jiang:
An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems.
ISPEC 2009: 59-70 |
2008 |
20 | EE | Ryan Riley,
Xuxian Jiang,
Dongyan Xu:
Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing.
RAID 2008: 1-20 |
19 | EE | Zhi Wang,
Xuxian Jiang,
Weidong Cui,
Xinyuan Wang:
Countering Persistent Kernel Rootkits through Systematic Hook Discovery.
RAID 2008: 21-38 |
18 | EE | Daniel Ramsbrock,
Xinyuan Wang,
Xuxian Jiang:
A First Step towards Live Botmaster Traceback.
RAID 2008: 59-77 |
17 | EE | Xuxian Jiang,
Florian P. Buchholz,
Aaron Walters,
Dongyan Xu,
Yi-Min Wang,
Eugene H. Spafford:
Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach.
IEEE Trans. Parallel Distrib. Syst. 19(7): 890-902 (2008) |
2007 |
16 | EE | Xuxian Jiang,
Xinyuan Wang,
Dongyan Xu:
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction.
ACM Conference on Computer and Communications Security 2007: 128-138 |
15 | EE | Ryan Riley,
Xuxian Jiang,
Dongyan Xu:
An Architectural Approach to Preventing Code Injection Attacks.
DSN 2007: 30-40 |
14 | EE | Xuxian Jiang,
Xinyuan Wang:
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots.
RAID 2007: 198-218 |
13 | EE | Min Xu,
Xuxian Jiang,
Ravi S. Sandhu,
Xinwen Zhang:
Towards a VMM-based usage control framework for OS kernel integrity protection.
SACMAT 2007: 71-80 |
12 | EE | Xuxian Jiang,
Helen J. Wang,
Dongyan Xu,
Yi-Min Wang:
RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization.
SRDS 2007: 209-218 |
2006 |
11 | EE | Xuxian Jiang,
Aaron Walters,
Dongyan Xu,
Eugene H. Spafford,
Florian P. Buchholz,
Yi-Min Wang:
Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach.
ICDCS 2006: 38 |
10 | EE | Yi-Min Wang,
Doug Beck,
Xuxian Jiang,
Roussi Roussev,
Chad Verbowski,
Shuo Chen,
Samuel T. King:
Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities.
NDSS 2006 |
9 | EE | Xuxian Jiang,
Dongyan Xu:
Profiling self-propagating worms via behavioral footprinting.
WORM 2006: 17-24 |
8 | EE | Xuxian Jiang,
Dongyan Xu,
Yi-Min Wang:
Collapsar: A VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention.
J. Parallel Distrib. Comput. 66(9): 1165-1180 (2006) |
2005 |
7 | EE | Xuxian Jiang,
Dongyan Xu,
Helen J. Wang,
Eugene H. Spafford:
Virtual Playgrounds for Worm Behavior Investigation.
RAID 2005: 1-21 |
6 | EE | Paul Ruth,
Xuxian Jiang,
Dongyan Xu,
Sebastien Goasguen:
Virtual Distributed Environments in a Shared Infrastructure.
IEEE Computer 38(5): 63-69 (2005) |
2004 |
5 | EE | Dongyan Xu,
Xuxian Jiang:
Towards an integrated multimedia service hosting overlay.
ACM Multimedia 2004: 96-103 |
4 | EE | Xuxian Jiang,
Dongyan Xu,
Rudolf Eigenmann:
Protection mechanisms for application service hosting platforms.
CCGRID 2004: 656-663 |
3 | EE | Xuxian Jiang,
Dongyan Xu:
VIOLIN: Virtual Internetworking on Overlay Infrastructure.
ISPA 2004: 937-946 |
2 | EE | Xuxian Jiang,
Dongyan Xu:
Collapsar: A VM-Based Architecture for Network Attack Detention Center.
USENIX Security Symposium 2004: 15-28 |
2003 |
1 | EE | Xuxian Jiang,
Dongyan Xu:
SODA: A Service-On-Demand Architecture for Application Service Hosting Utility Platforms.
HPDC 2003: 174-183 |