Follow
Yang Xiao
Title
Cited by
Cited by
Year
{MVP}: Detecting vulnerabilities using {Patch-Enhanced} vulnerability signatures
Y Xiao, B Chen, C Yu, Z Xu, Z Yuan, F Li, B Liu, Y Liu, W Huo, W Zou, ...
29th USENIX Security Symposium (USENIX Security 20), 1165-1182, 2020
1162020
B2sfinder: Detecting open-source software reuse in cots software
Z Yuan, M Feng, F Li, G Ban, Y Xiao, S Wang, Q Tang, H Su, C Yu, J Xu, ...
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
492019
Asteria-Pro: Enhancing Deep Learning-based Binary Code Similarity Detection by Incorporating Domain Knowledge
S Yang, C Dong, Y Xiao, Y Cheng, Z Shi, Z Li, L Sun
ACM Transactions on Software Engineering and Methodology 33 (1), 1-40, 2023
272023
Open-source license violations of binary software at large scale
M Feng, W Mao, Z Yuan, Y Xiao, G Ban, W Wang, S Wang, Q Tang, J Xu, ...
2019 IEEE 26th International Conference on Software Analysis, Evolution and …, 2019
232019
Viva: Binary level vulnerability identification via partial signature
Y Xiao, Z Xu, W Zhang, C Yu, L Liu, W Zou, Z Yuan, Y Liu, A Piao, W Huo
2021 IEEE International Conference on Software Analysis, Evolution and …, 2021
192021
B2SMatcher: fine-Grained version identification of open-Source software in binary files
G Ban, L Xu, Y Xiao, X Li, Z Yuan, W Huo
Cybersecurity 4, 1-21, 2021
112021
Acetest: Automated constraint extraction for testing deep learning operators
J Shi, Y Xiao, Y Li, Y Li, D Yu, C Yu, H Su, Y Chen, W Huo
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
102023
{RegexScalpel}: Regular Expression Denial of Service ({{{{{ReDoS}}}}}) Defense by {Localize-and-Fix}
Y Li, Y Sun, Z Xu, J Cao, Y Li, R Li, H Chen, SC Cheung, Y Liu, Y Xiao
31st USENIX Security Symposium (USENIX Security 22), 4183-4200, 2022
102022
Towards Practical Binary Code Similarity Detection: Vulnerability Verification via Patch Semantic Analysis
S Yang, Z Xu, Y Xiao, Z Lang, W Tang, Y Liu, Z Shi, H Li, L Sun
ACM Transactions on Software Engineering and Methodology 32 (6), 1-29, 2023
62023
Unleashing the power of pseudo-code for binary code similarity analysis
W Zhang, Z Xu, Y Xiao, Y Xue
Cybersecurity 5 (1), 23, 2022
62022
Scale: Constructing structured natural language comment trees for software vulnerability detection
XC Wen, C Gao, S Gao, Y Xiao, MR Lyu
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software …, 2024
52024
VERJava: Vulnerable Version Identification for Java OSS with a Two-Stage Analysis
Q Sun, L Xu, Y Xiao, F Li, H Su, Y Liu, H Huang, W Huo
2022 IEEE International Conference on Software Maintenance and Evolution …, 2022
52022
NAVRepair: Node-type Aware C/C++ Code Vulnerability Repair
R Wang, Z Li, C Wang, Y Xiao, C Gao
arXiv preprint arXiv:2405.04994, 2024
42024
Learning Program Semantics for Vulnerability Detection via Vulnerability-Specific Inter-procedural Slicing
B Wu, S Liu, Y Xiao, Z Li, J Sun, SW Lin
Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023
42023
Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation
X Wang, C Zhang, Y Li, Z Xu, S Huang, Y Liu, Y Yao, Y Xiao, Y Zou, Y Liu, ...
2023 IEEE Symposium on Security and Privacy (SP), 2427-2443, 2023
42023
LibvDiff: Library Version Difference Guided OSS Version Identification in Binaries
C Dong, S Li, S Yang, Y Xiao, Y Wang, H Li, Z Li, L Sun
Proceedings of the 46th IEEE/ACM International Conference on Software …, 2024
32024
Enhancing OSS Patch Backporting with Semantics
S Yang, Y Xiao, Z Xu, C Sun, C Ji, Y Zhang
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
32023
File hijacking vulnerability: The elephant in the room
C Yu, Y Xiao, J Lu, Y Li, Y Li, L Li, Y Dong, J Wang, J Shi, D Bo, W Huo
Proceedings of the Network and Distributed System Security Symposium, 2024
22024
Detecting {API}{Post-Handling} Bugs Using Code and Description in Patches
M Lin, K Chen, Y Xiao
32nd USENIX Security Symposium (USENIX Security 23), 3709-3726, 2023
22023
Leveraging Semantic Relations in Code and Data to Enhance Taint Analysis of Embedded Systems
J Zhao, Y Li, Y Zou, Z Liang, Y Xiao, Y Li, B Peng, N Zhong, X Wang, ...
33rd USENIX Security Symposium (USENIX Security 24), 7067-7084, 2024
12024
The system can't perform the operation now. Try again later.
Articles 1–20