BinProv: Binary Code Provenance Identification without Disassembly X He, S Wang, Y Xing, P Feng, H Wang, Q Li, S Chen, K Sun The 25th International Symposium on Research in Attacks, Intrusions and …, 2022 | 11 | 2022 |
The devil is in the detail: Generating system call whitelist for Linux seccomp Y Xing, J Cao, K Sun, F Yan, S Wan Future Generation Computer Systems (FGCS) 135, 105-113, 2022 | 5 | 2022 |
Cross Container Attacks: The Bewildered eBPF on Clouds Y He, R Guo, Y Xing, X Che, K Sun, Z Liu, K Xu, Q Li The 32nd USENIX Security Symposium (USENIX Security 23), 5971-5988, 2023 | 2 | 2023 |
A Hybrid System Call Profiling Approach for Container Protection Y Xing, X Wang, S Torabi, Z Zhang, L Lei, K Sun IEEE Transactions on Dependable and Secure Computing (TDSC), 2023 | 2 | 2023 |
Exploring Security Commits in Python S Sun, S Wang, X Wang, Y Xing, E Zhang, K Sun The 39th IEEE International Conference on Software Maintenance and Evolution …, 2023 | 1 | 2023 |
What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check Y Xing, S Wang, S Sun, X He, K Sun, Q Li The 33rd USENIX Security Symposium (USENIX Security 24), 2024 | | 2024 |
SysCap: Profiling and Crosschecking Syscall and Capability Configurations for Docker Images Y Xing, J Cao, X Wang, S Torabi, K Sun, F Yan, Q Li The 10th annual IEEE Conference on Communications and Network Security (IEEE …, 2022 | | 2022 |
Container Security Protection Scheme Based on System Call Restriction Y Xing, F Yan, Y Liu, L Zhang Journal of Wuhan University (Natural Science Edition) 1, 35-43, 2022 | | 2022 |
Research on Cryptographic Algorithm Recognition Based on Behavior Analysis F Yan, Y Xing, S Zhang, Z Yue, Y Zheng The 11th Chinese Conference on Trusted Computing and Information Security …, 2017 | | 2017 |