Seguir
Dongliang Mu
Dongliang Mu
Dirección de correo verificada de hust.edu.cn - Página principal
Título
Citado por
Citado por
Año
Lemna: Explaining deep learning based security applications
W Guo, D Mu, J Xu, P Su, G Wang, X Xing
proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
3342018
Understanding the reproducibility of crowd-reported security vulnerabilities
D Mu, A Cuevas, L Yang, H Hu, X Xing, B Mao, G Wang
27th USENIX Security Symposium (USENIX Security 18), 919-936, 2018
1172018
Postmortem Program Analysis with {Hardware-Enhanced}{Post-Crash} Artifacts
J Xu, D Mu, X Xing, P Liu, P Chen, B Mao
26th USENIX Security Symposium (USENIX Security 17), 17-32, 2017
532017
Credal: Towards locating a memory corruption vulnerability with your core dump
J Xu, D Mu, P Chen, X Xing, P Wang, P Liu
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
522016
Ptrix: Efficient hardware-assisted fuzzing for cots binary
Y Chen, D Mu, J Xu, Z Sun, W Shen, X Xing, L Lu, B Mao
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
452019
{DEEPVSA}: Facilitating value-set analysis with deep learning for postmortem program analysis
W Guo, D Mu, X Xing, M Du, D Song
28th USENIX Security Symposium (USENIX Security 19), 1787-1804, 2019
442019
GREBE: Unveiling exploitation potential for Linux kernel bugs
Z Lin, Y Chen, Y Wu, D Mu, C Yu, X Xing, K Li
2022 IEEE Symposium on Security and Privacy (SP), 2078-2095, 2022
222022
ROPOB: obfuscating binary code via return oriented programming
D Mu, J Guo, W Ding, Z Wang, B Mao, L Shi
Security and Privacy in Communication Networks: 13th International …, 2018
182018
Characterizing and detecting webassembly runtime bugs
Y Zhang, S Cao, H Wang, Z Chen, X Luo, D Mu, Y Ma, G Huang, X Liu
ACM Transactions on Software Engineering and Methodology 33 (2), 1-29, 2023
112023
Renn: Efficient reverse execution with neural-network-assisted alias analysis
D Mu, W Guo, A Cuevas, Y Chen, J Gai, X Xing, B Mao, C Song
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
102019
POMP++: Facilitating postmortem program diagnosis with value-set analysis
D Mu, Y Du, J Xu, J Xu, X Xing, B Mao, P Liu
IEEE Transactions on Software Engineering 47 (9), 1929-1942, 2019
102019
Diffguard: Obscuring sensitive information in canary based protections
J Zhu, W Zhou, Z Wang, D Mu, B Mao
Security and Privacy in Communication Networks: 13th International …, 2018
72018
An In-depth Analysis of Duplicated Linux Kernel Bug Reports.
D Mu, Y Wu, Y Chen, Z Lin, C Yu, X Xing, G Wang
NDSS, 2022
52022
Mitigating Security Risks in Linux with {KLAUS}: A Method for Evaluating Patch Correctness
Y Wu, Z Lin, Y Chen, DK Le, D Mu, X Xing
32nd USENIX Security Symposium (USENIX Security 23), 4247-4264, 2023
32023
Robin: Facilitating the reproduction of configuration-related vulnerability
L Chen, J Guo, Z He, D Mu, B Mao
2021 IEEE 20th International Conference on Trust, Security and Privacy in …, 2021
32021
Towards Unveiling Exploitation Potential With Multiple Error Behaviors for Kernel Bugs
Z Liu, Z Lin, Y Chen, Y Wu, Y Zou, D Mu, X Xing
IEEE Transactions on Dependable and Secure Computing, 2023
2023
Building Adversarial Defense with Non-invertible Data Transformations
W Guo, D Mu, L Chen, J Gai
PRICAI 2019: Trends in Artificial Intelligence: 16th Pacific Rim …, 2019
2019
LEMNA
W Guo, D Mu, J Xu, P Su, G Wang, X Xing
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
2018
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–18