Deep learning-based anomaly detection in cyber-physical systems: Progress and opportunities Y Luo, Y Xiao, L Cheng, G Peng, D Yao ACM Computing Surveys (CSUR) 54 (5), 1-36, 2021 | 290 | 2021 |
Cryptoguard: High precision detection of cryptographic vulnerabilities in massive-sized java projects S Rahaman, Y Xiao, S Afrose, F Shaon, K Tian, M Frantz, M Kantarcioglu, ... Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 160 | 2019 |
Automatic detection of Java cryptographic API misuses: Are we there yet? Y Zhang, MMA Kabir, Y Xiao, D Yao, N Meng IEEE Transactions on Software Engineering 49 (1), 288-303, 2022 | 46 | 2022 |
Neural cryptanalysis: Metrics, methodology, and applications in cps ciphers Y Xiao, Q Hao, DD Yao 2019 IEEE conference on dependable and secure computing (DSC), 1-8, 2019 | 42 | 2019 |
Evaluation of static vulnerability detection tools with Java cryptographic API benchmarks S Afrose, Y Xiao, S Rahaman, BP Miller, D Yao IEEE Transactions on Software Engineering 49 (2), 485-497, 2022 | 37 | 2022 |
Methodologies for quantifying (Re-) randomization security and timing under JIT-ROP S Ahmed, Y Xiao, KZ Snow, G Tan, F Monrose, D Yao Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 30 | 2020 |
Example-based vulnerability detection and repair in java code Y Zhang, Y Xiao, MMA Kabir, D Yao, N Meng Proceedings of the 30th IEEE/ACM International Conference on Program …, 2022 | 27 | 2022 |
Na Meng H Zhong, Y Xiao, S Rahaman, H Cai IEEE International Conference on Software Analysis, 2022 | 27 | 2022 |
Comparative measurement of cache {Configurations’} impacts on cache timing {Side-Channel} attacks X Yu, Y Xiao, K Cameron, DD Yao 12th USENIX Workshop on Cyber Security Experimentation and Test (CSET 19), 2019 | 11 | 2019 |
Danfeng (Daphne) Yao. Cryptoguard: High precision detection of cryptographic vulnerabilities in massive-sized java projects S Rahaman, Y Xiao, S Afrose, F Shaon, K Tian, M Frantz, M Kantarcioglu Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 0 | 11 | |
Industrial experience of finding cryptographic vulnerabilities in large-scale codebases Y Xiao, Y Zhao, N Allen, N Keynes, D Yao, C Cifuentes Digital Threats: Research and Practice 4 (1), 1-18, 2023 | 9 | 2023 |
Privacy guarantees of bluetooth low energy contact tracing: A case study on covidwise S Ahmed, Y Xiao, TT Chung, C Fung, M Yung, DD Yao Computer 55 (2), 54-62, 2022 | 9 | 2022 |
Poster: Precise detection of unprecedented python cryptographic misuses using on-demand analysis M Frantz, Y Xiao, TS Pias, DD Yao The Network and Distributed System Security (NDSS) Symposium, 2022 | 7 | 2022 |
Data-driven vulnerability detection and repair in java code Y Zhang, M Kabir, Y Xiao, N Meng arXiv preprint arXiv:2102.06994, 2021 | 7 | 2021 |
Danfeng, Yao, and Murat Kantarcioglu S Rahaman, Y Xiao, S Afrose, F Shaon, K Tian, M Frantz Cryptoguard: High precision detection of cryptographic vulnerabilities in …, 2018 | 7 | 2018 |
CHIRON: deployment-quality detection of Java cryptographic vulnerabilities S Rahaman, Y Xiao, K Tian, F Shaon, M Kantarcioglu, D Yao arXiv preprint arXiv:1806.06881, 2018 | 6 | 2018 |
Specializing neural networks for cryptographic code completion applications Y Xiao, W Song, J Qi, B Viswanath, P McDaniel, D Yao IEEE Transactions on Software Engineering 49 (6), 3524-3535, 2023 | 5 | 2023 |
Embedding code contexts for cryptographic api suggestion: New methodologies and comparisons Y Xiao, S Ahmed, W Song, X Ge, B Viswanath, D Yao arXiv preprint arXiv:2103.08747, 2021 | 5 | 2021 |
Being the developers’ friend: Our experience developing a high-precision tool for secure coding DD Yao, S Rahaman, Y Xiao, S Afrose, M Frantz, K Tian, N Meng, ... IEEE Security & Privacy 20 (6), 43-52, 2022 | 4 | 2022 |
Measurement of Embedding Choices on Cryptographic API Completion Tasks Y Xiao, W Song, S Ahmed, X Ge, B Viswanath, N Meng, D Yao ACM Transactions on Software Engineering and Methodology 33 (3), 1-30, 2024 | 3 | 2024 |