Search Results - "Xu, Dongpeng"
-
1
Cryptographic Function Detection in Obfuscated Binaries via Bit-Precise Symbolic Loop Mapping
Published in 2017 IEEE Symposium on Security and Privacy (SP) (01-05-2017)“…Cryptographic functions have been commonly abused by malware developers to hide malicious behaviors, disguise destructive payloads, and bypass network-based…”
Get full text
Conference Proceeding -
2
Memory access integrity: detecting fine-grained memory access errors in binary code
Published in Cybersecurity (Singapore) (07-06-2019)“…As one of the most notorious programming errors, memory access errors still hurt modern software security. Particularly, they are hidden deeply in important…”
Get full text
Journal Article -
3
Regulation of Network Condensation Based on Fitness Ordered Access Strategy
Published in Indonesian journal of computer science (24-04-2024)“… The condensation in complex networks disclose the underlying mechanism of the monopoly in socioeconomic system, which can help us to design and access…”
Get full text
Journal Article -
4
INCENTIVE EFFECT AND EMOTION REGULATION OF INFORMATION TECHNOLOGY ON INNOVATION BEHAVIOR
Published in The international journal of neuropsychopharmacology (08-07-2022)“…Abstract Background This paper attempts to explain the impact mechanism of information technology on enterprise innovation ability, in order to put forward…”
Get full text
Journal Article -
5
Generating Effective Software Obfuscation Sequences With Reinforcement Learning
Published in IEEE transactions on dependable and secure computing (01-05-2022)“…Obfuscation is a prevalent security technique which transforms syntactic representation of a program to a complicated form, but still keeps program semantics…”
Get full text
Journal Article -
6
An In-Place Simplification on Mixed Boolean-Arithmetic Expressions
Published in Security and communication networks (14-09-2022)“…Mixed Boolean-arithmetic (MBA) expression, which involves both bitwise operations (e.g., NOT, AND, and OR) and arithmetic operations (e.g., +, −, and ∗), is a…”
Get full text
Journal Article -
7
Caregiver perspectives on a smart home-based socially assistive robot for individuals with Alzheimer's disease and related dementia
Published in Disability and rehabilitation: Assistive technology (02-10-2020)“…Purpose: Innovative assistive technology can address aging-in-place and caregiving needs of individuals with Alzheimer's disease and related dementia (ADRD)…”
Get full text
Journal Article -
8
No Free Lunch: On the Increased Code Reuse Attack Surface of Obfuscated Programs
Published in 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (01-06-2023)“…Obfuscation has been widely employed to protect software from the malicious reverse analysis. However, its security risks have not previously been studied in…”
Get full text
Conference Proceeding -
9
An Address-Based Compiling Optimization for FFT on Multi-cluster DSP
Published in 2012 Fifth International Symposium on Parallel Architectures, Algorithms and Programming (01-12-2012)“…This paper presents a compiling optimization for FFT program on multi-cluster DSP based on analysis of memory address. We transform the loops in order to…”
Get full text
Conference Proceeding -
10
Towards Optimal Use of Exception Handling Information for Function Detection
Published in 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (01-06-2021)“…Function entry detection is critical for security of binary code. Conventional methods heavily rely on patterns, inevitably missing true functions and…”
Get full text
Conference Proceeding -
11
Opaque Predicate: Attack and Defense in Obfuscated Binary Code
Published 01-01-2018“…An opaque predicate is a predicate whose value is known to the obfuscator but is difficult to deduce. It can be seamlessly applied together with other…”
Get full text
Dissertation -
12
MalwareHunt: semantics-based malware diffing speedup by normalized basic block memoization
Published in Journal of Computer Virology and Hacking Techniques (01-08-2017)“…The key challenge of software reverse engineering is that the source code of the program under investigation is typically not available. Identifying…”
Get full text
Journal Article -
13
Security Threats and Countermeasures for Approximate Arithmetic Computing
Published in 2020 25th Asia and South Pacific Design Automation Conference (ASP-DAC) (01-01-2020)“…Approximate computing (AC) emerges as a promising approach for energy-accuracy trade-off in compute-intensive applications. However, recent work reveals that…”
Get full text
Conference Proceeding -
14
Towards Optimal Use of Exception Handling Information for Function Detection
Published 07-04-2021“…Function entry detection is critical for security of binary code. Conventional methods heavily rely on patterns, inevitably missing true functions and…”
Get full text
Journal Article -
15
Multi-dimensional, light-controlled switch of fluorescence resonance energy transfer based on orderly assembly of 0D dye@micro-micelles and 2D ultrathin-layered nanosheets
Published in Nano research (01-12-2016)“…Fluorescence resonance energy transfer (FRET) systems have broad applications in visual detection, intelligent materials, and biological imaging, all of which…”
Get full text
Journal Article