Towards continuous access control validation and forensics C Xiang, Y Wu, B Shen, M Shen, H Huang, T Xu, Y Zhou, C Moore, X Jin, ... Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 53 | 2019 |
Can systems explain permissions better? understanding users' misperceptions under smartphone runtime permission model B Shen, L Wei, C Xiang, Y Wu, M Shen, Y Zhou, X Jin 30th USENIX Security Symposium (USENIX Security 21), 751-768, 2021 | 51 | 2021 |
ForenVisor: A tool for acquiring and preserving reliable data in cloud live forensics Z Qi, C Xiang, R Ma, J Li, H Guan, DSL Wei IEEE Transactions on Cloud Computing 5 (3), 443-456, 2016 | 51 | 2016 |
PracExtractor: Extracting Configuration Good Practices from Manuals to Detect Server Misconfigurations C Xiang, H Huang, A Yoo, Y Zhou, S Pasupathy 2020 USENIX Annual Technical Conference (USENIX ATC 20), 265-280, 2020 | 30 | 2020 |
A virtualization based monitoring system for mini-intrusive live forensics X Zhong, C Xiang, M Yu, Z Qi, H Guan International Journal of Parallel Programming 43, 455-471, 2015 | 14 | 2015 |
An automation-assisted empirical study on lock usage for concurrent programs R Xin, Z Qi, S Huang, C Xiang, Y Zheng, Y Wang, H Guan 2013 IEEE International Conference on Software Maintenance, 100-109, 2013 | 14 | 2013 |
Flexible and extensible runtime verification for Java (Extended Version) C Xiang, Z Qi, W Binder International Journal of Software Engineering and Knowledge Engineering 25 …, 2015 | 7 | 2015 |
PYLIVE:On-the-Fly Code Change for Python-based Online Services H Huang, C Xiang, L Zhong, Y Zhou 2021 USENIX Annual Technical Conference (USENIX ATC 21), 349-363, 2021 | 6 | 2021 |
Detecting Access Control Misconfigurations with Change Validation C Xiang University of California, San Diego, 2021 | 5 | 2021 |
Effective bug detection with unused definitions L Zhong, C Xiang, H Huang, B Shen, E Mugnier, Y Zhou Proceedings of the Nineteenth European Conference on Computer Systems, 720-735, 2024 | 2 | 2024 |
Flexible and Extensible Runtime Verification for Java. C Xiang, Z Qi, W Binder SEKE, 595-600, 2015 | | 2015 |