Jun Xu
Stevens Institute of Technology
H-index: 16
North America-United States
Top articles of Jun Xu
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Aem: Facilitating cross-version exploitability assessment of linux kernel vulnerabilities | Zheyue Jiang Yuan Zhang Jun Xu Xinqian Sun Zhuang Liu | 2023/5/21 | |
Profile-guided System Optimizations for Accelerated Greybox Fuzzing | Yunhang Zhang Chengbin Pang Stefan Nagy Xun Chen Jun Xu | 2023/11/15 | |
SysPart: Automated Temporal System Call Filtering for Binaries | Vidya Lakshmi Rajagopalan Konstantinos Kleftogiorgos Enes Göktas Jun Xu Georgios Portokalidis | 2023/11/15 | |
Disparate Vulnerability in Link Inference Attacks against Graph Neural Networks | Proceedings on Privacy Enhancing Technologies | Da Zhong Ruotong Yu Kun Wu Xiuling Wang Jun Xu | 2023 |
The Security War in File Systems: An Empirical Study from A Vulnerability-centric Perspective | ACM Transactions on Storage | Jinghan Sun Shaobo Li Jun Xu Jian Huang | 2023/10/3 |
Eliminating Vulnerabilities by Disabling Unwanted Functionality in Binary Programs | Mohamad Mansouri Jun Xu Georgios Portokalidis | 2023/7/10 | |
Generation-based fuzzing? Don’t build a new generator, reuse! | Computers & Security | Chengbin Pang Hongbin Liu Yifan Wang Neil Zhenqiang Gong Bing Mao | 2023/6/1 |
On the dual nature of necessity in use of Rust unsafe code | Yuchen Zhang Ashish Kundu Georgios Portokalidis Jun Xu | 2023/11/30 | |
Building embedded systems like it's 1996 | arXiv preprint arXiv:2203.06834 | Ruotong Yu Francesca Del Nin Yuchen Zhang Shan Huang Pallavi Kaliyar | 2022/3/14 |
Ground truth for binary disassembly is not easy | Chengbin Pang Tiantai Zhang Ruotong Yu Bing Mao Jun Xu | 2022 | |
Towards understanding the runtime performance of rust | Yuchen Zhang Yunhang Zhang Georgios Portokalidis Jun Xu | 2022/10/10 | |
Debloating Address Sanitizer | Yuchen Zhang Chengbin Pang Georgios Portokalidis Nikos Triandopoulos Jun Xu | 2022/8 | |
Understanding disparate effects of membership inference attacks and their countermeasures | Da Zhong Haipei Sun Jun Xu Neil Gong Wendy Hui Wang | 2022/5/30 | |
Proving LTL Properties of Bitvector Programs and Decompiled Binaries (Extended) | arXiv e-prints | Yuandong Cyrus Liu Chengbin Pang Daniel Dietsch Eric Koskinen Ton-Chanh Le | 2021/5 |
Facilitating parallel fuzzing with mutually-exclusive task distribution | Yifan Wang Yuchen Zhang Chenbin Pang Peng Li Nikolaos Triandopoulos | 2021 | |
Vall-nut: Principled anti-grey box-fuzzing | Yuekang Li Guozhu Meng Jun Xu Cen Zhang Hongxu Chen | 2021/10/25 | |
Towards optimal use of exception handling information for function detection | Chengbin Pang Ruotong Yu Dongpeng Xu Eric Koskinen Georgios Portokalidis | 2021/6/21 | |
Sok: All you ever wanted to know about x86/x64 binary disassembly but were afraid to ask | Chengbin Pang Ruotong Yu Yaohui Chen Eric Koskinen Georgios Portokalidis | 2021/5/24 | |
An empirical study on benchmarks of artificial software vulnerabilities | arXiv preprint arXiv:2003.09561 | Sijia Geng Yuekang Li Yunlan Du Jun Xu Yang Liu | 2020/3/21 |
Privacy for all: Demystify vulnerability disparity of differential privacy against membership inference attack | arXiv preprint arXiv:2001.08855 | Bo Zhang Ruotong Yu Haipei Sun Yanying Li Jun Xu | 2020/1/24 |