What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Xinyu Xing
Google Scholar
44
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/uss
PATCHAGENT: A Practical Program Repair Agent Mimicking Human Expertise.
Zheng Yu
Ziyi Guo
Yuhang Wu
Jiahao Yu
Meng Xu
Dongliang Mu
Yan Chen
Xinyu Xing
2025
conf/uss
Mind the Inconspicuous: Revealing the Hidden Weakness in Aligned LLMs' Refusal Boundaries.
Jiahao Yu
Haozheng Luo
Jerry Yao-Chieh Hu
Yan Chen
Wenbo Guo
Han Liu
Xinyu Xing
2024
conf/uss
LLM-Fuzzer: Scaling Assessment of Large Language Model Jailbreaks.
Jiahao Yu
Xingwei Lin
Zheng Yu
Xinyu Xing
2024
conf/uss
Take a Step Further: Understanding Page Spray in Linux Kernel Exploitation.
Ziyi Guo
Dang K. Le
Zhenpeng Lin
Kyle Zeng
Ruoyu Wang
Tiffany Bao
Yan Shoshitaishvili
Adam Doupé
Xinyu Xing
2024
conf/uss
ShadowBound: Efficient Heap Memory Protection Through Advanced Metadata Management and Customized Compiler Optimization.
Zheng Yu
Ganxiang Yang
Xinyu Xing
2024
conf/uss
SeaK: Rethinking the Design of a Secure Allocator for OS Kernel.
Zicheng Wang
Yicheng Guang
Yueqi Chen
Zhenpeng Lin
Michael V. Le
Dang K. Le
Dan Williams
Xinyu Xing
Zhongshu Gu
Hani Jamjoom
2024
conf/uss
CAMP: Compiler and Allocator-based Heap Memory Protection.
Zhenpeng Lin
Zheng Yu
Ziyi Guo
Simone Campanoni
Peter A. Dinda
Xinyu Xing
2024
conf/esorics
TGRop: Top Gun of Return-Oriented Programming Automation.
Nanyu Zhong
Yueqi Chen
Yanyan Zou
Xinyu Xing
Jinwei Dong
Bingcheng Xian
Jiaxu Zhao
Menghao Li
Binghong Liu
Wei Huo
2023
conf/ccs
RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections.
Kyle Zeng
Zhenpeng Lin
Kangjie Lu
Xinyu Xing
Ruoyu Wang
Adam Doupé
Yan Shoshitaishvili
Tiffany Bao
2023
conf/uss
PATROL: Provable Defense against Adversarial Policy in Two-player Games.
Wenbo Guo
Xian Wu
Lun Wang
Xinyu Xing
Dawn Song
2023
conf/uss
AIRS: Explanation for Deep Reinforcement Learning based Security Applications.
Jiahao Yu
Wenbo Guo
Qi Qin
Gang Wang
Ting Wang
Xinyu Xing
2023
conf/uss
Mitigating Security Risks in Linux with KLAUS: A Method for Evaluating Patch Correctness.
Yuhang Wu
Zhenpeng Lin
Yueqi Chen
Dang K. Le
Dongliang Mu
Xinyu Xing
2023
conf/sp
From Grim Reality to Practical Solution: Malware Classification in Real-World Noise.
Xian Wu
Wenbo Guo
Jia Yan
Baris Coskun
Xinyu Xing
2023
conf/acsac
TGC: Transaction Graph Contrast Network for Ethereum Phishing Scam Detection.
Sijia Li
Gaopeng Gou
Chang Liu
Gang Xiong
Zhen Li
Junchao Xiao
Xinyu Xing
2022
conf/ccs
DirtyCred: Escalating Privilege in Linux Kernel.
Zhenpeng Lin
Yuhang Wu
Xinyu Xing
2022
conf/uss
Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability.
Kyle Zeng
Yueqi Chen
Haehyun Cho
Xinyu Xing
Adam Doupé
Yan Shoshitaishvili
Tiffany Bao
2022
conf/sp
GREBE: Unveiling Exploitation Potential for Linux Kernel Bugs.
Zhenpeng Lin
Yueqi Chen
Yuhang Wu
Dongliang Mu
Chensheng Yu
Xinyu Xing
Kang Li
2022
conf/ndss
An In-depth Analysis of Duplicated Linux Kernel Bug Reports.
Dongliang Mu
Yuhang Wu
Yueqi Chen
Zhenpeng Lin
Chensheng Yu
Xinyu Xing
Gang Wang
2021
conf/ccs
Facilitating Vulnerability Assessment through PoC Migration.
Jiarun Dai
Yuan Zhang
Hailong Xu
Haiming Lyu
Zicheng Wu
Xinyu Xing
Min Yang
2021
conf/uss
CADE: Detecting and Explaining Concept Drift Samples for Security Applications.
Limin Yang
Wenbo Guo
Qingying Hao
Arridhana Ciptadi
Ali Ahmadzadeh
Xinyu Xing
Gang Wang
2021
conf/uss
Adversarial Policy Training against Deep Reinforcement Learning.
Xian Wu
Wenbo Guo
Hua Wei
Xinyu Xing
2021
conf/ndss
FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data.
Junjie Liang
Wenbo Guo
Tongbo Luo
Vasant G. Honavar
Gang Wang
Xinyu Xing
2020
conf/ccs
PDiff: Semantic-based Patch Presence Testing for Downstream Kernels.
Zheyue Jiang
Yuan Zhang
Jun Xu
Qi Wen
Zhenghe Wang
Xiaohan Zhang
Xinyu Xing
Min Yang
Zhemin Yang
2020
conf/ccs
A Systematic Study of Elastic Objects in Kernel Exploitation.
Yueqi Chen
Zhenpeng Lin
Xinyu Xing
2020
conf/uss
BScout: Direct Whole Patch Presence Test for Java Executables.
Jiarun Dai
Yuan Zhang
Zheyue Jiang
Yingtian Zhou
Junyan Chen
Xinyu Xing
Xiaohan Zhang
Xin Tan
Min Yang
Zhemin Yang
2020
conf/esorics
HART: Hardware-Assisted Kernel Module Tracing on Arm.
Yunlan Du
Zhenyu Ning
Jun Xu
Zhilong Wang
Yueh-Hsun Lin
Fengwei Zhang
Xinyu Xing
Bing Mao
2019
conf/ccs
PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary.
Yaohui Chen
Dongliang Mu
Jun Xu
Zhichuang Sun
Wenbo Shen
Xinyu Xing
Long Lu
Bing Mao
2019
conf/ccs
SLAKE: Facilitating Slab Manipulation for Exploiting Vulnerabilities in the Linux Kernel.
Yueqi Chen
Xinyu Xing
2019
conf/ccs
Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise.
Fucheng Liu
Yu Wen
Dongxue Zhang
Xihe Jiang
Xinyu Xing
Dan Meng
2019
conf/uss
All Your Clicks Belong to Me: Investigating Click Interception on the Web.
Mingxue Zhang
Wei Meng
Sangho Lee
Byoungyoung Lee
Xinyu Xing
2019
conf/uss
KEPLER: Facilitating Control-flow Hijacking Primitive Evaluation for Linux Kernel Vulnerabilities.
Wei Wu
Yueqi Chen
Xinyu Xing
Wei Zou
2019
conf/uss
DEEPVSA: Facilitating Value-set Analysis with Deep Learning for Postmortem Program Analysis.
Wenbo Guo
Dongliang Mu
Xinyu Xing
Min Du
Dawn Song
2019
conf/uss
Towards the Detection of Inconsistencies in Public Security Vulnerability Reports.
Ying Dong
Wenbo Guo
Yueqi Chen
Xinyu Xing
Yuqing Zhang
Gang Wang
2018
conf/ccs
LEMNA: Explaining Deep Learning based Security Applications.
Wenbo Guo
Dongliang Mu
Jun Xu
Purui Su
Gang Wang
Xinyu Xing
2018
conf/uss
FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.
Wei Wu
Yueqi Chen
Jun Xu
Xinyu Xing
Xiaorui Gong
Wei Zou
2018
conf/uss
Understanding the Reproducibility of Crowd-reported Security Vulnerabilities.
Dongliang Mu
Alejandro Cuevas
Limin Yang
Hang Hu
Xinyu Xing
Bing Mao
Gang Wang
2017
conf/ccs
FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware.
Jian Huang
Jun Xu
Xinyu Xing
Peng Liu
Moinuddin K. Qureshi
2017
conf/uss
Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.
Jun Xu
Dongliang Mu
Xinyu Xing
Peng Liu
Ping Chen
Bing Mao
2017
conf/dsn
What You See is Not What You Get! Thwarting Just-in-Time ROP with Chameleon.
Ping Chen
Jun Xu
Zhisheng Hu
Xinyu Xing
Minghui Zhu
Bing Mao
Peng Liu
2017
conf/acsac
Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices.
Le Guan
Shijie Jia
Bo Chen
Fengwei Zhang
Bo Luo
Jingqiang Lin
Peng Liu
Xinyu Xing
Luning Xia
2016
conf/ccs
CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump.
Jun Xu
Dongliang Mu
Ping Chen
Xinyu Xing
Pei Wang
Peng Liu
2015
conf/ccs
UCognito: Private Browsing without Tears.
Meng Xu
Yeongjin Jang
Xinyu Xing
Taesoo Kim
Wenke Lee
2014
conf/ccs
Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising.
Wei Meng
Xinyu Xing
Anmol Sheth
Udi Weinsberg
Wenke Lee
2013
conf/uss
Take This Personally: Pollution Attacks on Personalized Services.
Xinyu Xing
Wei Meng
Dan Doozan
Alex C. Snoeren
Nick Feamster
Wenke Lee
Coauthors
Adam Doupé
(3)
Alejandro Cuevas
(1)
Alex C. Snoeren
(1)
Ali Ahmadzadeh
(1)
Anmol Sheth
(1)
Arridhana Ciptadi
(1)
Baris Coskun
(1)
Bing Mao
(5)
Bingcheng Xian
(1)
Binghong Liu
(1)
Bo Chen
(1)
Bo Luo
(1)
Byoungyoung Lee
(1)
Chang Liu
(1)
Chensheng Yu
(2)
Dan Doozan
(1)
Dan Meng
(1)
Dan Williams
(1)
Dang K. Le
(3)
Dawn Song
(2)
Dongliang Mu
(10)
Dongxue Zhang
(1)
Fengwei Zhang
(2)
Fucheng Liu
(1)
Gang Wang
(7)
Gang Xiong
(1)
Ganxiang Yang
(1)
Gaopeng Gou
(1)
Haehyun Cho
(1)
Hailong Xu
(1)
Haiming Lyu
(1)
Han Liu
(1)
Hang Hu
(1)
Hani Jamjoom
(1)
Haozheng Luo
(1)
Hua Wei
(1)
Jerry Yao-Chieh Hu
(1)
Jia Yan
(1)
Jiahao Yu
(4)
Jian Huang
(1)
Jiarun Dai
(2)
Jiaxu Zhao
(1)
Jingqiang Lin
(1)
Jinwei Dong
(1)
Jun Xu
(9)
Junchao Xiao
(1)
Junjie Liang
(1)
Junyan Chen
(1)
Kang Li
(1)
Kangjie Lu
(1)
Kyle Zeng
(3)
Le Guan
(1)
Limin Yang
(2)
Long Lu
(1)
Lun Wang
(1)
Luning Xia
(1)
Meng Xu
(2)
Menghao Li
(1)
Michael V. Le
(1)
Min Du
(1)
Min Yang
(3)
Minghui Zhu
(1)
Mingxue Zhang
(1)
Moinuddin K. Qureshi
(1)
Nanyu Zhong
(1)
Nick Feamster
(1)
Pei Wang
(1)
Peng Liu
(5)
Peter A. Dinda
(1)
Ping Chen
(3)
Purui Su
(1)
Qi Qin
(1)
Qi Wen
(1)
Qingying Hao
(1)
Ruoyu Wang
(2)
Sangho Lee
(1)
Shijie Jia
(1)
Sijia Li
(1)
Simone Campanoni
(1)
Taesoo Kim
(1)
Tiffany Bao
(3)
Ting Wang
(1)
Tongbo Luo
(1)
Udi Weinsberg
(1)
Vasant G. Honavar
(1)
Wei Huo
(1)
Wei Meng
(3)
Wei Wu
(2)
Wei Zou
(2)
Wenbo Guo
(10)
Wenbo Shen
(1)
Wenke Lee
(3)
Xian Wu
(3)
Xiaohan Zhang
(2)
Xiaorui Gong
(1)
Xihe Jiang
(1)
Xin Tan
(1)
Xingwei Lin
(1)
Xinyu Xing
(44)
Yan Chen
(2)
Yan Shoshitaishvili
(3)
Yanyan Zou
(1)
Yaohui Chen
(1)
Yeongjin Jang
(1)
Yicheng Guang
(1)
Ying Dong
(1)
Yingtian Zhou
(1)
Yu Wen
(1)
Yuan Zhang
(3)
Yueh-Hsun Lin
(1)
Yueqi Chen
(11)
Yuhang Wu
(5)
Yunlan Du
(1)
Yuqing Zhang
(1)
Zhemin Yang
(2)
Zhen Li
(1)
Zheng Yu
(4)
Zhenghe Wang
(1)
Zhenpeng Lin
(9)
Zhenyu Ning
(1)
Zheyue Jiang
(2)
Zhichuang Sun
(1)
Zhilong Wang
(1)
Zhisheng Hu
(1)
Zhongshu Gu
(1)
Zicheng Wang
(1)
Zicheng Wu
(1)
Ziyi Guo
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to