ForenVisor: A tool for acquiring and preserving reliable data in cloud live forensics Z Qi, C Xiang, R Ma, J Li, H Guan, DSL Wei IEEE Transactions on Cloud Computing 5 (3), 443-456, 2016 | 39 | 2016 |
Towards continuous access control validation and forensics C Xiang, Y Wu, B Shen, M Shen, H Huang, T Xu, Y Zhou, C Moore, X Jin, ... Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 19 | 2019 |
An automation-assisted empirical study on lock usage for concurrent programs R Xin, Z Qi, S Huang, C Xiang, Y Zheng, Y Wang, H Guan 2013 IEEE International Conference on Software Maintenance, 100-109, 2013 | 14 | 2013 |
PracExtractor: Extracting Configuration Good Practices from Manuals to Detect Server Misconfigurations C Xiang, H Huang, A Yoo, Y Zhou, S Pasupathy 2020 USENIX Annual Technical Conference (USENIX ATC 20), 265-280, 2020 | 12 | 2020 |
A virtualization based monitoring system for mini-intrusive live forensics X Zhong, C Xiang, M Yu, Z Qi, H Guan International Journal of Parallel Programming 43 (3), 455-471, 2015 | 12 | 2015 |
Can Systems Explain Permissions Better? Understanding Users' Misperceptions under Smartphone Runtime Permission Model B Shen, L Wei, C Xiang, Y Wu, M Shen, Y Zhou, X Jin 30th USENIX Security Symposium (USENIX Security 21), 751-768, 2021 | 8 | 2021 |
Flexible and extensible runtime verification for Java (Extended Version) C Xiang, Z Qi, W Binder International Journal of Software Engineering and Knowledge Engineering 25 …, 2015 | 5 | 2015 |
Flexible and Extensible Runtime Verification for Java. C Xiang, Z Qi, W Binder SEKE, 595-600, 2015 | 1 | 2015 |
Detecting Access Control Misconfigurations with Change Validation C Xiang University of California, San Diego, 2021 | | 2021 |
PYLIVE:On-the-Fly Code Change for Python-based Online Services H Huang, C Xiang, L Zhong, Y Zhou 2021 USENIX Annual Technical Conference (USENIX ATC 21), 349-363, 2021 | | 2021 |