The SCEAS System
Navigation Menu

Search the dblp DataBase


Xuxian Jiang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xuxian Jiang, Dongyan Xu, Rudolf Eigenmann
    Protection mechanisms for application service hosting platforms. [Citation Graph (0, 0)][DBLP]
    CCGRID, 2004, pp:656-663 [Conf]
  2. Xuxian Jiang, Dongyan Xu
    SODA: A Service-On-Demand Architecture for Application Service Hosting Utility Platforms. [Citation Graph (0, 0)][DBLP]
    HPDC, 2003, pp:174-183 [Conf]
  3. Xuxian Jiang, Aaron Walters, Dongyan Xu, Eugene H. Spafford, Florian P. Buchholz, Yi-Min Wang
    Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2006, pp:38- [Conf]
  4. Xuxian Jiang, Dongyan Xu
    VIOLIN: Virtual Internetworking on Overlay Infrastructure. [Citation Graph (0, 0)][DBLP]
    ISPA, 2004, pp:937-946 [Conf]
  5. Dongyan Xu, Xuxian Jiang
    Towards an integrated multimedia service hosting overlay. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2004, pp:96-103 [Conf]
  6. Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev, Chad Verbowski, Shuo Chen, Samuel T. King
    Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  7. Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford
    Virtual Playgrounds for Worm Behavior Investigation. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:1-21 [Conf]
  8. Xuxian Jiang, Dongyan Xu
    Collapsar: A VM-Based Architecture for Network Attack Detention Center. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:15-28 [Conf]
  9. Xuxian Jiang, Dongyan Xu
    Profiling self-propagating worms via behavioral footprinting. [Citation Graph (0, 0)][DBLP]
    WORM, 2006, pp:17-24 [Conf]
  10. Paul Ruth, Xuxian Jiang, Dongyan Xu, Sebastien Goasguen
    Virtual Distributed Environments in a Shared Infrastructure. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2005, v:38, n:5, pp:63-69 [Journal]
  11. Xuxian Jiang, Dongyan Xu, Yi-Min Wang
    Collapsar: A VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2006, v:66, n:9, pp:1165-1180 [Journal]
  12. Ryan Riley, Xuxian Jiang, Dongyan Xu
    An Architectural Approach to Preventing Code Injection Attacks. [Citation Graph (0, 0)][DBLP]
    DSN, 2007, pp:30-40 [Conf]
  13. Xuxian Jiang, Xinyuan Wang
    "Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:198-218 [Conf]
  14. Min Xu, Xuxian Jiang, Ravi S. Sandhu, Xinwen Zhang
    Towards a VMM-based usage control framework for OS kernel integrity protection. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:71-80 [Conf]

  15. Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring. [Citation Graph (, )][DBLP]

  16. Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. [Citation Graph (, )][DBLP]

  17. Countering kernel rootkits with lightweight hook protection. [Citation Graph (, )][DBLP]

  18. On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers. [Citation Graph (, )][DBLP]

  19. Mapping kernel objects to enable systematic integrity checking. [Citation Graph (, )][DBLP]

  20. ReFormat: Automatic Reverse Engineering of Encrypted Messages. [Citation Graph (, )][DBLP]

  21. An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems. [Citation Graph (, )][DBLP]

  22. Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution. [Citation Graph (, )][DBLP]

  23. Countering Persistent Kernel Rootkits through Systematic Hook Discovery. [Citation Graph (, )][DBLP]

  24. Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing. [Citation Graph (, )][DBLP]

  25. A First Step towards Live Botmaster Traceback. [Citation Graph (, )][DBLP]

  26. Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory. [Citation Graph (, )][DBLP]

  27. Trojan horse resistant discretionary access control. [Citation Graph (, )][DBLP]

  28. HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity. [Citation Graph (, )][DBLP]

  29. RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization. [Citation Graph (, )][DBLP]

  30. Multi-aspect profiling of kernel rootkit behavior. [Citation Graph (, )][DBLP]

  31. Defeating return-oriented rootkits with "Return-Less" kernels. [Citation Graph (, )][DBLP]

  32. On the billing vulnerabilities of SIP-based VoIP systems. [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.005secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002