Follow
Dongliang Mu
Title
Cited by
Cited by
Year
Lemna: Explaining deep learning based security applications
W Guo, D Mu, J Xu, P Su, G Wang, X Xing
proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
3612018
Understanding the reproducibility of crowd-reported security vulnerabilities
D Mu, A Cuevas, L Yang, H Hu, X Xing, B Mao, G Wang
27th USENIX Security Symposium (USENIX Security 18), 919-936, 2018
1222018
Postmortem program analysis with {Hardware-Enhanced}{Post-Crash} artifacts
J Xu, D Mu, X Xing, P Liu, P Chen, B Mao
26th USENIX Security Symposium (USENIX Security 17), 17-32, 2017
592017
Credal: Towards locating a memory corruption vulnerability with your core dump
J Xu, D Mu, P Chen, X Xing, P Wang, P Liu
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
562016
Ptrix: Efficient hardware-assisted fuzzing for cots binary
Y Chen, D Mu, J Xu, Z Sun, W Shen, X Xing, L Lu, B Mao
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
542019
{DEEPVSA}: Facilitating value-set analysis with deep learning for postmortem program analysis
W Guo, D Mu, X Xing, M Du, D Song
28th USENIX Security Symposium (USENIX Security 19), 1787-1804, 2019
392019
GREBE: Unveiling exploitation potential for Linux kernel bugs
Z Lin, Y Chen, Y Wu, D Mu, C Yu, X Xing, K Li
2022 IEEE Symposium on Security and Privacy (SP), 2078-2095, 2022
292022
ROPOB: obfuscating binary code via return oriented programming
D Mu, J Guo, W Ding, Z Wang, B Mao, L Shi
Security and Privacy in Communication Networks: 13th International …, 2018
182018
Min Du, and Dawn Song. 2019. DEEPVSA: Facilitating value-set analysis with deep learning for postmortem program analysis
W Guo, D Mu, X Xing
28th USENIX Security Symposium (USENIX Security 19) 1804, 1787
171787
Characterizing and detecting webassembly runtime bugs
Y Zhang, S Cao, H Wang, Z Chen, X Luo, D Mu, Y Ma, G Huang, X Liu
ACM Transactions on Software Engineering and Methodology 33 (2), 1-29, 2023
142023
POMP++: Facilitating postmortem program diagnosis with value-set analysis
D Mu, Y Du, J Xu, J Xu, X Xing, B Mao, P Liu
IEEE Transactions on Software Engineering 47 (9), 1929-1942, 2019
142019
Renn: Efficient reverse execution with neural-network-assisted alias analysis
D Mu, W Guo, A Cuevas, Y Chen, J Gai, X Xing, B Mao, C Song
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
132019
An in-depth analysis of duplicated linux kernel bug reports
D Mu, Y Wu, Y Chen, Z Lin, C Yu, X Xing, G Wang
Network and Distributed Systems Security Symposium (NDSS), 2022
72022
Diffguard: Obscuring sensitive information in canary based protections
J Zhu, W Zhou, Z Wang, D Mu, B Mao
Security and Privacy in Communication Networks: 13th International …, 2018
72018
Purui Su, Gang Wang, and Xinyu Xing. 2018
W Guo, D Mu, J Xu
Lemna: Explaining deep learning based security applications. In proceedings …, 0
7
Robin: Facilitating the reproduction of configuration-related vulnerability
L Chen, J Guo, Z He, D Mu, B Mao
2021 IEEE 20th International Conference on Trust, Security and Privacy in …, 2021
42021
Mitigating Security Risks in Linux with {KLAUS}: A Method for Evaluating Patch Correctness
Y Wu, Z Lin, Y Chen, DK Le, D Mu, X Xing
32nd USENIX Security Symposium (USENIX Security 23), 4247-4264, 2023
32023
Towards Unveiling Exploitation Potential With Multiple Error Behaviors for Kernel Bugs
Z Liu, Z Lin, Y Chen, Y Wu, Y Zou, D Mu, X Xing
IEEE Transactions on Dependable and Secure Computing 21 (1), 93-109, 2023
22023
Building Adversarial Defense with Non-invertible Data Transformations
W Guo, D Mu, L Chen, J Gai
PRICAI 2019: Trends in Artificial Intelligence: 16th Pacific Rim …, 2019
2019
LEMNA
W Guo, D Mu, J Xu, P Su, G Wang, X Xing
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–20