Seguir
Ya Xiao
Ya Xiao
Ph.D. candidate of Computer Science, Virginia Tech
Dirección de correo verificada de vt.edu
Título
Citado por
Citado por
Año
Deep learning-based anomaly detection in cyber-physical systems: Progress and opportunities
Y Luo, Y Xiao, L Cheng, G Peng, D Yao
ACM Computing Surveys (CSUR) 54 (5), 1-36, 2021
2062021
Cryptoguard: High precision detection of cryptographic vulnerabilities in massive-sized java projects
S Rahaman, Y Xiao, S Afrose, F Shaon, K Tian, M Frantz, M Kantarcioglu, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
1392019
Neural cryptanalysis: Metrics, methodology, and applications in cps ciphers
Y Xiao, Q Hao, DD Yao
2019 IEEE conference on dependable and secure computing (DSC), 1-8, 2019
322019
Automatic detection of Java cryptographic API misuses: Are we there yet?
Y Zhang, MMA Kabir, Y Xiao, D Yao, N Meng
IEEE Transactions on Software Engineering 49 (1), 288-303, 2022
302022
Evaluation of static vulnerability detection tools with Java cryptographic API benchmarks
S Afrose, Y Xiao, S Rahaman, BP Miller, D Yao
IEEE Transactions on Software Engineering 49 (2), 485-497, 2022
282022
Na Meng
H Zhong, Y Xiao, S Rahaman, H Cai
IEEE International Conference on Software Analysis, 2022
262022
Methodologies for quantifying (Re-) randomization security and timing under JIT-ROP
S Ahmed, Y Xiao, KZ Snow, G Tan, F Monrose, D Yao
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
262020
Example-based vulnerability detection and repair in java code
Y Zhang, Y Xiao, MMA Kabir, D Yao, N Meng
Proceedings of the 30th IEEE/ACM International Conference on Program …, 2022
152022
Industrial experience of finding cryptographic vulnerabilities in large-scale codebases
Y Xiao, Y Zhao, N Allen, N Keynes, D Yao, C Cifuentes
Digital Threats: Research and Practice 4 (1), 1-18, 2023
82023
Privacy guarantees of bluetooth low energy contact tracing: A case study on covidwise
S Ahmed, Y Xiao, TT Chung, C Fung, M Yung, DD Yao
Computer 55 (2), 54-62, 2022
82022
Comparative measurement of cache {Configurations’} impacts on cache timing {Side-Channel} attacks
X Yu, Y Xiao, K Cameron, DD Yao
12th USENIX Workshop on Cyber Security Experimentation and Test (CSET 19), 2019
82019
Danfeng, Yao, and Murat Kantarcioglu
S Rahaman, Y Xiao, S Afrose, F Shaon, K Tian, M Frantz
Cryptoguard: High precision detection of cryptographic vulnerabilities in …, 2018
72018
CHIRON: deployment-quality detection of Java cryptographic vulnerabilities
S Rahaman, Y Xiao, K Tian, F Shaon, M Kantarcioglu, D Yao
arXiv preprint arXiv:1806.06881, 2018
62018
Embedding code contexts for cryptographic api suggestion: New methodologies and comparisons
Y Xiao, S Ahmed, W Song, X Ge, B Viswanath, D Yao
arXiv preprint arXiv:2103.08747, 2021
52021
Data-driven vulnerability detection and repair in java code
Y Zhang, M Kabir, Y Xiao, N Meng
arXiv preprint arXiv:2102.06994, 2021
52021
Danfeng (Daphne) Yao
S Rahaman, Y Xiao, S Afrose, F Shaon, K Tian, M Frantz, M Kantarcioglu
CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in …, 2019
52019
Being the developers’ friend: Our experience developing a high-precision tool for secure coding
DD Yao, S Rahaman, Y Xiao, S Afrose, M Frantz, K Tian, N Meng, ...
IEEE Security & Privacy 20 (6), 43-52, 2022
42022
Poster: Precise detection of unprecedented python cryptographic misuses using on-demand analysis
M Frantz, Y Xiao, TS Pias, DD Yao
The Network and Distributed System Security (NDSS) Symposium, 2022
32022
Specializing neural networks for cryptographic code completion applications
Y Xiao, W Song, J Qi, B Viswanath, P McDaniel, D Yao
IEEE Transactions on Software Engineering, 2023
22023
Multi-location cryptographic code repair with neural-network-based methodologies
Y Xiao
Proceedings of the 29th ACM Joint Meeting on European Software Engineering …, 2021
12021
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20