Search Results - "Xu, Dongpeng"

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    Cryptographic Function Detection in Obfuscated Binaries via Bit-Precise Symbolic Loop Mapping by Dongpeng Xu, Jiang Ming, Dinghao Wu

    “…Cryptographic functions have been commonly abused by malware developers to hide malicious behaviors, disguise destructive payloads, and bypass network-based…”
    Get full text
    Conference Proceeding
  2. 2

    Memory access integrity: detecting fine-grained memory access errors in binary code by Li, Wenjie, Xu, Dongpeng, Wu, Wei, Gong, Xiaorui, Xiang, Xiaobo, Wang, Yan, gu, Fangming, Zeng, Qianxiang

    Published in Cybersecurity (Singapore) (07-06-2019)
    “…As one of the most notorious programming errors, memory access errors still hurt modern software security. Particularly, they are hidden deeply in important…”
    Get full text
    Journal Article
  3. 3

    Regulation of Network Condensation Based on Fitness Ordered Access Strategy by Xu, Dongpeng

    Published in Indonesian journal of computer science (24-04-2024)
    “…      The condensation in complex networks disclose the underlying mechanism of the monopoly in socioeconomic system, which can help us to design and access…”
    Get full text
    Journal Article
  4. 4

    INCENTIVE EFFECT AND EMOTION REGULATION OF INFORMATION TECHNOLOGY ON INNOVATION BEHAVIOR by Zhao, Xincheng, Liu, Qian, Xu, Dongpeng, Yang, Yile

    “…Abstract Background This paper attempts to explain the impact mechanism of information technology on enterprise innovation ability, in order to put forward…”
    Get full text
    Journal Article
  5. 5

    Generating Effective Software Obfuscation Sequences With Reinforcement Learning by Wang, Huaijin, Wang, Shuai, Xu, Dongpeng, Zhang, Xiangyu, Liu, Xiao

    “…Obfuscation is a prevalent security technique which transforms syntactic representation of a program to a complicated form, but still keeps program semantics…”
    Get full text
    Journal Article
  6. 6

    An In-Place Simplification on Mixed Boolean-Arithmetic Expressions by Liu, Binbin, Zheng, Qilong, Li, Jing, Xu, Dongpeng

    Published in Security and communication networks (14-09-2022)
    “…Mixed Boolean-arithmetic (MBA) expression, which involves both bitwise operations (e.g., NOT, AND, and OR) and arithmetic operations (e.g., +, −, and ∗), is a…”
    Get full text
    Journal Article
  7. 7

    Caregiver perspectives on a smart home-based socially assistive robot for individuals with Alzheimer's disease and related dementia by Arthanat, Sajay, Begum, Momotaz, Gu, Tianyi, LaRoche, Dain P., Xu, Dongpeng, Zhang, Naiqian

    “…Purpose: Innovative assistive technology can address aging-in-place and caregiving needs of individuals with Alzheimer's disease and related dementia (ADRD)…”
    Get full text
    Journal Article
  8. 8

    No Free Lunch: On the Increased Code Reuse Attack Surface of Obfuscated Programs by Zhang, Naiqian, Alden, Daroc, Xu, Dongpeng, Wang, Shuai, Jaeger, Trent, Ruml, Wheeler

    “…Obfuscation has been widely employed to protect software from the malicious reverse analysis. However, its security risks have not previously been studied in…”
    Get full text
    Conference Proceeding
  9. 9

    An Address-Based Compiling Optimization for FFT on Multi-cluster DSP by Dongpeng Xu, Qilong Zheng

    “…This paper presents a compiling optimization for FFT program on multi-cluster DSP based on analysis of memory address. We transform the loops in order to…”
    Get full text
    Conference Proceeding
  10. 10

    Towards Optimal Use of Exception Handling Information for Function Detection by Pang, Chengbin, Yu, Ruotong, Xu, Dongpeng, Koskinen, Eric, Portokalidis, Georgios, Xu, Jun

    “…Function entry detection is critical for security of binary code. Conventional methods heavily rely on patterns, inevitably missing true functions and…”
    Get full text
    Conference Proceeding
  11. 11

    Opaque Predicate: Attack and Defense in Obfuscated Binary Code by Xu, Dongpeng

    Published 01-01-2018
    “…An opaque predicate is a predicate whose value is known to the obfuscator but is difficult to deduce. It can be seamlessly applied together with other…”
    Get full text
    Dissertation
  12. 12

    MalwareHunt: semantics-based malware diffing speedup by normalized basic block memoization by Ming, Jiang, Xu, Dongpeng, Wu, Dinghao

    “…The key challenge of software reverse engineering is that the source code of the program under investigation is typically not available. Identifying…”
    Get full text
    Journal Article
  13. 13

    Security Threats and Countermeasures for Approximate Arithmetic Computing by Yellu, Pruthvy, Monjur, Mezanur Rahman, Kammerer, Timothy, Xu, Dongpeng, Yu, Qiaoyan

    “…Approximate computing (AC) emerges as a promising approach for energy-accuracy trade-off in compute-intensive applications. However, recent work reveals that…”
    Get full text
    Conference Proceeding
  14. 14

    Towards Optimal Use of Exception Handling Information for Function Detection by Pang, Chengbin, Yu, Ruotong, Xu, Dongpeng, Koskinen, Eric, Portokalidis, Georgios, Xu, Jun

    Published 07-04-2021
    “…Function entry detection is critical for security of binary code. Conventional methods heavily rely on patterns, inevitably missing true functions and…”
    Get full text
    Journal Article
  15. 15

    Multi-dimensional, light-controlled switch of fluorescence resonance energy transfer based on orderly assembly of 0D dye@micro-micelles and 2D ultrathin-layered nanosheets by Li, Zhixiong, Liang, Ruizheng, Xu, Simin, Liu, Wendi, Yan, Dongpeng, Wei, Min, Evans, David G., Duan, Xue

    Published in Nano research (01-12-2016)
    “…Fluorescence resonance energy transfer (FRET) systems have broad applications in visual detection, intelligent materials, and biological imaging, all of which…”
    Get full text
    Journal Article