Follow
Yang Xiao
Title
Cited by
Cited by
Year
{MVP}: Detecting vulnerabilities using {Patch-Enhanced} vulnerability signatures
Y Xiao, B Chen, C Yu, Z Xu, Z Yuan, F Li, B Liu, Y Liu, W Huo, W Zou, ...
29th USENIX Security Symposium (USENIX Security 20), 1165-1182, 2020
862020
B2sfinder: Detecting open-source software reuse in cots software
Z Yuan, M Feng, F Li, G Ban, Y Xiao, S Wang, Q Tang, H Su, C Yu, J Xu, ...
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
362019
Open-source license violations of binary software at large scale
M Feng, W Mao, Z Yuan, Y Xiao, G Ban, W Wang, S Wang, Q Tang, J Xu, ...
2019 IEEE 26th International Conference on Software Analysis, Evolution and …, 2019
162019
Viva: Binary level vulnerability identification via partial signature
Y Xiao, Z Xu, W Zhang, C Yu, L Liu, W Zou, Z Yuan, Y Liu, A Piao, W Huo
2021 IEEE International Conference on Software Analysis, Evolution and …, 2021
152021
Asteria-Pro: Enhancing Deep Learning-based Binary Code Similarity Detection by Incorporating Domain Knowledge
S Yang, C Dong, Y Xiao, Y Cheng, Z Shi, Z Li, L Sun
ACM Transactions on Software Engineering and Methodology 33 (1), 1-40, 2023
102023
B2SMatcher: fine-Grained version identification of open-Source software in binary files
G Ban, L Xu, Y Xiao, X Li, Z Yuan, W Huo
Cybersecurity 4, 1-21, 2021
102021
{RegexScalpel}: Regular Expression Denial of Service ({{{{{ReDoS}}}}}) Defense by {Localize-and-Fix}
Y Li, Y Sun, Z Xu, J Cao, Y Li, R Li, H Chen, SC Cheung, Y Liu, Y Xiao
31st USENIX Security Symposium (USENIX Security 22), 4183-4200, 2022
82022
Acetest: Automated constraint extraction for testing deep learning operators
J Shi, Y Xiao, Y Li, Y Li, D Yu, C Yu, H Su, Y Chen, W Huo
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
32023
Unleashing the power of pseudo-code for binary code similarity analysis
W Zhang, Z Xu, Y Xiao, Y Xue
Cybersecurity 5 (1), 23, 2022
32022
Learning Program Semantics for Vulnerability Detection via Vulnerability-Specific Inter-procedural Slicing
B Wu, S Liu, Y Xiao, Z Li, J Sun, SW Lin
Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023
12023
Towards Practical Binary Code Similarity Detection: Vulnerability Verification via Patch Semantic Analysis
S Yang, Z Xu, Y Xiao, Z Lang, W Tang, Y Liu, Z Shi, H Li, L Sun
ACM Transactions on Software Engineering and Methodology 32 (6), 1-29, 2023
12023
An Enhanced Vulnerability Detection in Software Using a Heterogeneous Encoding Ensemble
H Sun, Y Liu, Z Ding, Y Xiao, Z Hao, H Zhu
2023 IEEE Symposium on Computers and Communications (ISCC), 1214-1220, 2023
12023
Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation
X Wang, C Zhang, Y Li, Z Xu, S Huang, Y Liu, Y Yao, Y Xiao, Y Zou, Y Liu, ...
2023 IEEE Symposium on Security and Privacy (SP), 2427-2443, 2023
12023
VERJava: Vulnerable Version Identification for Java OSS with a Two-Stage Analysis
Q Sun, L Xu, Y Xiao, F Li, H Su, Y Liu, H Huang, W Huo
2022 IEEE International Conference on Software Maintenance and Evolution …, 2022
12022
SCALE: Constructing Structured Natural Language Comment Trees for Software Vulnerability Detection
XC Wen, C Gao, S Gao, Y Xiao, MR Lyu
arXiv preprint arXiv:2403.19096, 2024
2024
LibvDiff: Library Version Difference Guided OSS Version Identification in Binaries
C Dong, S Li, S Yang, Y Xiao, Y Wang, H Li, Z Li, L Sun
Proceedings of the 46th IEEE/ACM International Conference on Software …, 2024
2024
Software Vulnerability Detection Using an Enhanced Generalization Strategy
H Sun, Z Bu, Y Xiao, C Zhou, Z Hao, H Zhu
International Symposium on Dependable Software Engineering: Theories, Tools …, 2023
2023
Enhancing OSS Patch Backporting with Semantics
S Yang, Y Xiao, Z Xu, C Sun, C Ji, Y Zhang
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
2023
Decompilation Based Deep Binary-Source Function Matching
X Wang, Z Yuan, Y Xiao, L Wang, Y Yao, H Chen, W Huo
International Conference on Science of Cyber Security, 244-260, 2023
2023
Detecting {API}{Post-Handling} Bugs Using Code and Description in Patches
M Lin, K Chen, Y Xiao
32nd USENIX Security Symposium (USENIX Security 23), 3709-3726, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20