|
Search the dblp DataBase
Xuxian Jiang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Xuxian Jiang, Dongyan Xu, Rudolf Eigenmann
Protection mechanisms for application service hosting platforms. [Citation Graph (0, 0)][DBLP] CCGRID, 2004, pp:656-663 [Conf]
- Xuxian Jiang, Dongyan Xu
SODA: A Service-On-Demand Architecture for Application Service Hosting Utility Platforms. [Citation Graph (0, 0)][DBLP] HPDC, 2003, pp:174-183 [Conf]
- Xuxian Jiang, Aaron Walters, Dongyan Xu, Eugene H. Spafford, Florian P. Buchholz, Yi-Min Wang
Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach. [Citation Graph (0, 0)][DBLP] ICDCS, 2006, pp:38- [Conf]
- Xuxian Jiang, Dongyan Xu
VIOLIN: Virtual Internetworking on Overlay Infrastructure. [Citation Graph (0, 0)][DBLP] ISPA, 2004, pp:937-946 [Conf]
- Dongyan Xu, Xuxian Jiang
Towards an integrated multimedia service hosting overlay. [Citation Graph (0, 0)][DBLP] ACM Multimedia, 2004, pp:96-103 [Conf]
- Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev, Chad Verbowski, Shuo Chen, Samuel T. King
Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. [Citation Graph (0, 0)][DBLP] NDSS, 2006, pp:- [Conf]
- Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford
Virtual Playgrounds for Worm Behavior Investigation. [Citation Graph (0, 0)][DBLP] RAID, 2005, pp:1-21 [Conf]
- Xuxian Jiang, Dongyan Xu
Collapsar: A VM-Based Architecture for Network Attack Detention Center. [Citation Graph (0, 0)][DBLP] USENIX Security Symposium, 2004, pp:15-28 [Conf]
- Xuxian Jiang, Dongyan Xu
Profiling self-propagating worms via behavioral footprinting. [Citation Graph (0, 0)][DBLP] WORM, 2006, pp:17-24 [Conf]
- Paul Ruth, Xuxian Jiang, Dongyan Xu, Sebastien Goasguen
Virtual Distributed Environments in a Shared Infrastructure. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2005, v:38, n:5, pp:63-69 [Journal]
- Xuxian Jiang, Dongyan Xu, Yi-Min Wang
Collapsar: A VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention. [Citation Graph (0, 0)][DBLP] J. Parallel Distrib. Comput., 2006, v:66, n:9, pp:1165-1180 [Journal]
- Ryan Riley, Xuxian Jiang, Dongyan Xu
An Architectural Approach to Preventing Code Injection Attacks. [Citation Graph (0, 0)][DBLP] DSN, 2007, pp:30-40 [Conf]
- Xuxian Jiang, Xinyuan Wang
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots. [Citation Graph (0, 0)][DBLP] RAID, 2007, pp:198-218 [Conf]
- Min Xu, Xuxian Jiang, Ravi S. Sandhu, Xinwen Zhang
Towards a VMM-based usage control framework for OS kernel integrity protection. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:71-80 [Conf]
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring. [Citation Graph (, )][DBLP]
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. [Citation Graph (, )][DBLP]
Countering kernel rootkits with lightweight hook protection. [Citation Graph (, )][DBLP]
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers. [Citation Graph (, )][DBLP]
Mapping kernel objects to enable systematic integrity checking. [Citation Graph (, )][DBLP]
ReFormat: Automatic Reverse Engineering of Encrypted Messages. [Citation Graph (, )][DBLP]
An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems. [Citation Graph (, )][DBLP]
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution. [Citation Graph (, )][DBLP]
Countering Persistent Kernel Rootkits through Systematic Hook Discovery. [Citation Graph (, )][DBLP]
Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing. [Citation Graph (, )][DBLP]
A First Step towards Live Botmaster Traceback. [Citation Graph (, )][DBLP]
Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory. [Citation Graph (, )][DBLP]
Trojan horse resistant discretionary access control. [Citation Graph (, )][DBLP]
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity. [Citation Graph (, )][DBLP]
RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization. [Citation Graph (, )][DBLP]
Multi-aspect profiling of kernel rootkit behavior. [Citation Graph (, )][DBLP]
Defeating return-oriented rootkits with "Return-Less" kernels. [Citation Graph (, )][DBLP]
On the billing vulnerabilities of SIP-based VoIP systems. [Citation Graph (, )][DBLP]
Search in 0.005secs, Finished in 0.008secs
|