Publications

  1. [DSN '23] No Free Lunch: On the Increased Code Reuse Attack Surface of Obfuscated Programs
    Naiqian Zhang, Daroc Alden, Dongpeng Xu, Shuai Wang, Trent Jaeger, and Wheeler Ruml
    The 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, June 27--30, 2023. (Acceptance Rate: 47/233=20.2%)
  2. [SPARK '23] Using Planning to Construct Code Reuse Attacks in Obfuscated Programs
    Naiqian Zhang, Daroc Alden, Dongpeng Xu, Shuai Wang, Trent Jaeger, and Wheeler Ruml
    Scheduling and Planning Applications woRKshop (SPARK) in the 33rd International Conference on Automated Planning and Scheduling (ICAPS), Prague, Czech Republic, July 8--13, 2023.
  3. [ISEC '23] WIP: Interdisciplinary Teaching via Hands-on Practice in Cybersecurity
    Qiaoyan Yu, Dean Sullivan, Diliang Chen, Dongpeng Xu, Karen Jin, and Joshua Calzadillas
    The 2023 IEEE Integrated STEM Education Conference, March 11, 2023.
  4. An In-Place Simplification on Mixed Boolean-Arithmetic Expressions
    Binbin Liu, Qilong Zheng, Jing Li, and Dongpeng Xu
    Journal of Security and Communication Networks, 2022.
  5. [EMNLP '21] GraphMR: Graph Neural Network for Mathematical Reasoning
    Weijie Feng, Binbin Liu, Dongpeng Xu, Qilong Zheng, Yun Xu
    The 2021 Conference on Empirical Methods in Natural Language Processing, Virtual Event, November 7--11, 2021. (Acceptance Rate: 650/2540=25.6%)
  6. [ICICS '21] Software Obfuscation with Non-Linear Mixed Boolean-Arithmetic Expressions
    Binbin Liu, Weijie Feng, Qilong Zheng, Jing Li, and Dongpeng Xu
    The 23rd International Conference on Information and Communications Security, Virtual Event, September 17--19, 2021. (Acceptance Rate: 49/202=24.3%)
  7. [DSN '21] Towards Optimal Use of Exception Handling Information for Function Detection
    Chengbin Pang, Ruotong Yu, Dongpeng Xu, Eric Koskinen, Georgios Portokalidis, and Jun Xu
    The 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Virtual Event, June 21--24, 2021. (Acceptance Rate: 48/279=17.2%)
  8. [USENIX Security '21] MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation
    Binbin Liu, Junfu Shen, Jiang Ming, Qilong Zheng, Jing Li, and Dongpeng Xu
    The 30th USENIX Security Symposium, Virtual Event, August 11--13, 2021. (Acceptance Rate: 246/1316=18.7%)
  9. [PLDI '21] Boosting SMT Solver Performance on Mixed-Bitwise-Arithmetic Expressions
    Dongpeng Xu, Binbin Liu, Weijie Feng, Jiang Ming, Jing Li, Qilong Zheng, and Qiaoyan Yu The 42nd ACM SIGPLAN Conference on Programming Language Design and Implementation, Virtual Event, June 20--26, 2021. (Acceptance Rate: 87/319=27.2%)
  10. [TODAES '21] Security Threat Analyses and Attack Models for Approximate Computing Systems: From Hardware and Micro-Architecture Perspectives
    Yellu Pruthvy, Buell Landon, M. Mark, Michel Kinsy, Dongpeng Xu, and Qiaoyan Yu
    Transactions on Design Automation of Electronic Systems, 2021.
  11. [TDSC '20] Generating Effective Software Obfuscation Sequences with Reinforcement Learning
    Huaijin Wang, Shuai Wang, Dongpeng Xu, Xiangyu Zhang, and Xiao Liu
    IEEE Transactions on Dependable and Secure Computing, December 2020.
  12. NeuReduce: Reducing Mixed Boolean-Arithmetic Expressions by Recurrent Neural Network
    Weijie Feng, Binbin Liu, Dongpeng Xu, Qilong Zheng, and Yun Xu
    Findings of the Association for Computational Linguistics: EMNLP 2020, November 2020.
  13. [ICAPS '20] An Adaptive Software Framework for Dementia-care Robots
    Tianyi Gu, Momotaz Begum, Naiqian Zhang, Dongpeng Xu, Sajay Arthanat, Dain LaRoche
    2020 International Conference on Automated Planning and Scheduling, Virtual Event, October 19--30, 2020. (Acceptance Rate: 31.9%)
  14. [CCS '20] VAHunt: Warding Off New Repackaged Android Malware in App-Virtualization's Clothing
    Luman Shi, Jiang Ming, Jianming Fu, Guojun Peng, Dongpeng Xu, Kun Gao, and Xuanchen Pan
    The 27th ACM Conference on Computer and Communications Security, Virtual Event, November 10--12, 2020. (Acceptance Rate: 121/715=16.9%)
  15. [GLSVLSI '20] Blurring Boundaries: A New Way to Secure Approximate Computing Systems
    Pruthvy Yellu, Landon Buell, Dongpeng Xu, and Qiaoyan Yu
    Great Lakes Symposium on VLSI, Virtual Event China, September 2020. (Acceptance Rate: 312/1156=27%)
  16. Caregiver Perspectives on a Smart Home-based Socially Assistive Robot for Individuals with Alzheimer's Disease and Related Dementia
    Sajay Arthanat, Momotaz Begum, Tianyi Gu, Dain LaRoche, Dongpeng Xu, and Naiqian Zhang
    Disability and Rehabilitation: Assistive Technology, Volume 15, 2020.
  17. Model Checking --- Case Study of a Temporary Structures Monitoring System
    Dongpeng Xu, Xiao Yuan, Dinghao Wu, and Chimay J. Anumba
    Book chapter in Cyber Physical Systems in the Built Environment, 2020.
  18. [ASP-DAC '20] Security Threats and Countermeasures for Approximate Arithmetic Computing
    Pruthvy Yellu, Mohammad Mezanur Rahman Monjur, Timothy Kammerer, Dongpeng Xu, and Qiaoyan Yu
    The 25th Asia and South Pacific Design Automation Conference, Beijing, China, January 13--16, 2020. (Acceptance Rate: 32.7%)
  19. Memory Access Integrity: Detecting Fine-grained Memory Access Errors in Binary Code
    Wenjie Li, Dongpeng Xu, Wei Wu, Xiaorui Gong, Xiaobo Xiang, Yan Wang, Fangming Gu, and Qianxiang Zeng
    Journal of Cybersecurity, 2019.
  20. [SPRO '19] MetaHunt: Towards Taming Malware Mutation via Studying the Evolution of Metamorphic Virus
    Li Wang, Dongpeng Xu, Jiang Ming, Yu Fu, and Dinghao Wu
    The 3rd ACM Workshop on Software PROtection, London, UK, November 11--15, 2019.
  21. [CCS '18] VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification
    Dongpeng Xu, Jiang Ming, Yu Fu, and Dinghao Wu
    The 25th ACM Conference on Computer and Communications Security, Toronto, Canada, October 15--19, 2018. (Acceptance Rate: 134/809=16.6%)
  22. MalwareHunt: Semantics-Based Malware Diffing Speedup by Normalized Basic Block Memoization
    Jiang Ming, Dongpeng Xu, and Dinghao Wu
    Journal of Computer Virology and Hacking Techniques, 2017.
  23. [USENIX Security '17] BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking
    Jiang Ming, Dongpeng Xu, Yufei Jiang, and Dinghao Wu
    The 26th USENIX Security Symposium, Vancouver, BC, Canada, August 16--18, 2017. (Acceptance Rate: 85/522=16.3%)
  24. [SP '17] Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping
    Dongpeng Xu, Jiang Ming, and Dinghao Wu
    The 38th IEEE Symposium on Security and Privacy, San Jose, CA, May 22--24, 2017. (Acceptance Rate: 60/457=13%)
  25. [ISC '16] Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method
    Dongpeng Xu, Jiang Ming, and Dinghao Wu
    The 19th Information Security Conference, Honolulu, HI, USA, September 7--9, 2016.
  26. [CCS '15] LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code
    Jiang Ming, Dongpeng Xu, Li Wang, and Dinghao Wu
    The 22nd ACM Conference on Computer and Communications Security, Denver, Colorado, USA, October 12--16, 2015. (Acceptance Rate: 128/646=19.8%)
  27. [IFIP SEC '15] Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference
    Jiang Ming, Dongpeng Xu, and Dinghao Wu
    The 30th IFIP SEC 2015 International Information Security and Privacy Conference, Hamburg, Germany, May 26--28, 2015.
  28. [PAAP '12] An Address-Based Compiling Optimization for FFT on Multi-cluster DSP
    Dongpeng Xu and Qilong Zheng
    The 5th International Symposium on Parallel Architectures, Algorithms and Programming, Taiwan, December 17--20, 2012.
  29. [HPC China '12] A Clustering Algorithm for Multi-cluster DSP Based on Analysis of Memory Address
    Dongpeng Xu and Qilong Zheng
    National Annual Conference on High Performance Computing, Changsha, Hunan, China, October 27--31, 2012.