Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions. X Xiong, D Tian, P Liu NDSS, 2011 | 114 | 2011 |
Between mutual trust and mutual distrust: practical fine-grained privilege separation in multithreaded applications J Wang, X Xiong, P Liu 2015 USENIX Annual Technical Conference (USENIX ATC 15), 361-373, 2015 | 34 | 2015 |
Shelf: Preserving business continuity and availability in an intrusion recovery system X Xiong, X Jia, P Liu Computer Security Applications Conference, 2009. ACSAC'09. Annual, 484-493, 2009 | 32 | 2009 |
Cross-layer damage assessment for cyber situational awareness P Liu, X Jia, S Zhang, X Xiong, YC Jhi, K Bai, J Li Cyber Situational Awareness, 155-176, 2010 | 21 | 2010 |
Defeating buffer overflow attacks via virtualization D Tian, X Xiong, C Hu, P Liu Computers & Electrical Engineering 40 (6), 1940-1950, 2014 | 12 | 2014 |
SILVER: Fine-grained and transparent protection domain primitives in commodity OS kernel X Xiong, P Liu Research in Attacks, Intrusions, and Defenses, 103-122, 2013 | 11 | 2013 |
The web interface should be radically refactored JR Douceur, J Howell, B Parno, M Walfish, X Xiong Proceedings of the 10th ACM Workshop on Hot Topics in Networks, 10, 2011 | 9 | 2011 |
Policy-centric protection of OS kernel from vulnerable loadable kernel modules D Tian, X Xiong, C Hu, P Liu Information Security Practice and Experience, 317-332, 2011 | 7 | 2011 |
Availability-sensitive intrusion recovery S Zhang, X Xiong, X Jia, P Liu Proceedings of the 1st ACM workshop on Virtual machine security, 43-48, 2009 | 4 | 2009 |
Integrating offline analysis and online protection to defeat buffer overflow attacks D Tian, X Xiong, C Hu, P Liu Information Security, 409-415, 2011 | 3 | 2011 |
Using purpose capturing signatures to defeat computer virus mutating X Jia, X Xiong, J Jing, P Liu Information Security, Practice and Experience, 153-171, 2010 | 3 | 2010 |
Practical Fine-grained Privilege Separation in Multithreaded Applications J Wang, X Xiong, P Liu arXiv preprint arXiv:1305.2553, 2013 | 1 | 2013 |
Operating Services through Attacks without Messing Up the Machine P Liu, X Jia, X Xiong, S Zhang, YC Jhi, L Li, SJ Kim | | |
Challenges in Improving the Survivability of Data Centers S Zhang, X Xiong, P Liu | | |