关注
Dongliang Mu
Dongliang Mu
在 hust.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Lemna: Explaining deep learning based security applications
W Guo, D Mu, J Xu, P Su, G Wang, X Xing
proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
3262018
Understanding the reproducibility of crowd-reported security vulnerabilities
D Mu, A Cuevas, L Yang, H Hu, X Xing, B Mao, G Wang
27th USENIX Security Symposium (USENIX Security 18), 919-936, 2018
1112018
Postmortem Program Analysis with {Hardware-Enhanced}{Post-Crash} Artifacts
J Xu, D Mu, X Xing, P Liu, P Chen, B Mao
26th USENIX Security Symposium (USENIX Security 17), 17-32, 2017
522017
Credal: Towards locating a memory corruption vulnerability with your core dump
J Xu, D Mu, P Chen, X Xing, P Wang, P Liu
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
512016
Ptrix: Efficient hardware-assisted fuzzing for cots binary
Y Chen, D Mu, J Xu, Z Sun, W Shen, X Xing, L Lu, B Mao
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
452019
{DEEPVSA}: Facilitating value-set analysis with deep learning for postmortem program analysis
W Guo, D Mu, X Xing, M Du, D Song
28th USENIX Security Symposium (USENIX Security 19), 1787-1804, 2019
402019
GREBE: Unveiling exploitation potential for Linux kernel bugs
Z Lin, Y Chen, Y Wu, D Mu, C Yu, X Xing, K Li
2022 IEEE Symposium on Security and Privacy (SP), 2078-2095, 2022
192022
ROPOB: obfuscating binary code via return oriented programming
D Mu, J Guo, W Ding, Z Wang, B Mao, L Shi
Security and Privacy in Communication Networks: 13th International …, 2018
182018
Renn: Efficient reverse execution with neural-network-assisted alias analysis
D Mu, W Guo, A Cuevas, Y Chen, J Gai, X Xing, B Mao, C Song
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
102019
POMP++: Facilitating postmortem program diagnosis with value-set analysis
D Mu, Y Du, J Xu, J Xu, X Xing, B Mao, P Liu
IEEE Transactions on Software Engineering 47 (9), 1929-1942, 2019
102019
Characterizing and detecting webassembly runtime bugs
Y Zhang, S Cao, H Wang, Z Chen, X Luo, D Mu, Y Ma, G Huang, X Liu
ACM Transactions on Software Engineering and Methodology 33 (2), 1-29, 2023
72023
Diffguard: Obscuring sensitive information in canary based protections
J Zhu, W Zhou, Z Wang, D Mu, B Mao
Security and Privacy in Communication Networks: 13th International …, 2018
62018
An In-depth Analysis of Duplicated Linux Kernel Bug Reports.
D Mu, Y Wu, Y Chen, Z Lin, C Yu, X Xing, G Wang
NDSS, 2022
52022
Mitigating Security Risks in Linux with {KLAUS}: A Method for Evaluating Patch Correctness
Y Wu, Z Lin, Y Chen, DK Le, D Mu, X Xing
32nd USENIX Security Symposium (USENIX Security 23), 4247-4264, 2023
22023
Robin: Facilitating the reproduction of configuration-related vulnerability
L Chen, J Guo, Z He, D Mu, B Mao
2021 IEEE 20th International Conference on Trust, Security and Privacy in …, 2021
22021
Towards Unveiling Exploitation Potential With Multiple Error Behaviors for Kernel Bugs
Z Liu, Z Lin, Y Chen, Y Wu, Y Zou, D Mu, X Xing
IEEE Transactions on Dependable and Secure Computing, 2023
2023
Building Adversarial Defense with Non-invertible Data Transformations
W Guo, D Mu, L Chen, J Gai
PRICAI 2019: Trends in Artificial Intelligence: 16th Pacific Rim …, 2019
2019
LEMNA
W Guo, D Mu, J Xu, P Su, G Wang, X Xing
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
2018
系统目前无法执行此操作,请稍后再试。
文章 1–18