Dongyan Xu
Purdue University
H-index: 65
North America-United States
Top articles of Dongyan Xu
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
A Systematic Study of Physical Sensor Attack Hardness | Hyungsub Kim Rwitam Bandyopadhyay Muslum Ozgur Ozmen Z Berkay Celik Antonio Bianchi | 2024/2/30 | |
{PatchVerif}: Discovering Faulty Patches in Robotic Vehicles | Hyungsub Kim Muslum Ozgur Ozmen Z Berkay Celik Antonio Bianchi Dongyan Xu | 2023 | |
SoK: The Long Journey of Exploiting and Defending the Legacy of King Harald Bluetooth | Jianliang Wu Ruoyu Wu Dongyan Xu Dave Tian Antonio Bianchi | 2023/10/17 | |
Fuzzing sgx enclaves via host program mutations | Arslan Khan Muqi Zou Kyungtae Kim Dongyan Xu Antonio Bianchi | 2023/7/3 | |
Ec: Embedded systems compartmentalization via intra-kernel isolation | Arslan Khan Dongyan Xu Dave Jing Tian | 2023/5/21 | |
Low-cost privilege separation with compile time compartmentalization for embedded systems | Arslan Khan Dongyan Xu Dave Jing Tian | 2023/5/21 | |
{ZBCAN}: A {Zero-Byte}{CAN} Defense System | Khaled Serag Rohit Bhatia Akram Faqih Muslum Ozgur Ozmen Vireshwar Kumar | 2023 | |
{ProFactory}: Improving {IoT} Security via Formalized Protocol Customization | Fei Wang Jianliang Wu Yuhong Nan Yousra Aafer Xiangyu Zhang | 2022 | |
Formal model-driven discovery of bluetooth protocol design vulnerabilities | Jianliang Wu Ruoyu Wu Dongyan Xu Dave Jing Tian Antonio Bianchi | 2022/5/22 | |
Reverse engineering and retrofitting robotic aerial vehicle control firmware using dispatch | Taegyu Kim Aolin Ding Sriharsha Etigowni Pengfei Sun Jizhou Chen | 2022/6/27 | |
Windranger: A directed greybox fuzzer driven by deviation basic blocks | Zhengjie Du Yuekang Li Yang Liu Bing Mao | 2022/5/21 | |
{DnD}: A {Cross-Architecture} deep neural network decompiler | Ruoyu Wu Taegyu Kim Dave Jing Tian Antonio Bianchi Dongyan Xu | 2022 | |
PURE Biomanufacturing: Secure, Pandemic-Adaptive Biomanufacturing | IEEE Security & Privacy | Howard D Grimes Gabriela F Ciocarlie Bo Yu Duminda Wijesekera Greg Shannon | 2022/6/2 |
Attacks on can error handling mechanism | Khaled Serag Vireshwar Kumar Z Berkay Celik Rohit Bhatia Mathias Payer | 2022 | |
Shadowauth: Backward-compatible automatic can authentication for legacy ecus | Sungwoo Kim Gisu Yeo Taegyu Kim Junghwan" John" Rhee Yuseok Jeon | 2022/5/30 | |
Policy-based Discovery and Patching of Logic Bugs in Robotic Vehicles | Proceedings of the Workshop on Automotive and Autonomous Vehicle Security (AutoSec) | Hyungsub Kim Muslum Ozgur Ozmen Antonio Bianchi Z Berkay Celik Dongyan Xu | 2022 |
Pgpatch: Policy-guided logic bug patching for robotic vehicles | Hyungsub Kim Muslum Ozgur Ozmen Z Berkay Celik Antonio Bianchi Dongyan Xu | 2022/5/22 | |
{PASAN}: Detecting peripheral access concurrency bugs within {Bare-Metal} embedded applications | Taegyu Kim Vireshwar Kumar Junghwan Rhee Jizhou Chen Kyungtae Kim | 2021 | |
{ATLAS}: A sequence-based learning approach for attack investigation | Abdulellah Alsaheel Yuhong Nan Shiqing Ma Le Yu Gregory Walkup | 2021 | |
{SHARD}:{Fine-Grained} Kernel Specialization with {Context-Aware} Hardening | Muhammad Abubakar Adil Ahmad Pedro Fonseca Dongyan Xu | 2021 |