Follow
xinyu xing
xinyu xing
Verified email at northwestern.edu - Homepage
Title
Cited by
Year
ShadowBound: Efficient Heap Memory Protection Through Advanced Metadata Management and Customized Compiler Optimization
Z Yu, G Yang, X Xing
arXiv preprint arXiv:2406.02023, 2024
2024
CAMP: Compiler and Allocator-based Heap Memory Protection
Z Lin, Z Yu, Z Guo, S Campanoni, P Dinda, X Xing
arXiv preprint arXiv:2406.02737, 2024
2024
Take a Step Further: Understanding Page Spray in Linux Kernel Exploitation
Z Guo, DK Le, Z Lin, K Zeng, R Wang, T Bao, Y Shoshitaishvili, A Doupé, ...
arXiv preprint arXiv:2406.02624, 2024
2024
Enhancing Jailbreak Attack Against Large Language Models through Silent Tokens
J Yu, H Luo, J Yao-Chieh, W Guo, H Liu, X Xing
arXiv preprint arXiv:2405.20653, 2024
2024
RICE: Breaking Through the Training Bottlenecks of Reinforcement Learning with Explanation
Z Cheng, X Wu, J Yu, S Yang, G Wang, X Xing
arXiv preprint arXiv:2405.03064, 2024
2024
Statemask: Explaining deep reinforcement learning through state mask
Z Cheng, X Wu, J Yu, W Sun, W Guo, X Xing
Advances in Neural Information Processing Systems 36, 2024
32024
BandFuzz: A Practical Framework for Collaborative Fuzzing with Reinforcement Learning
W Shi, H Li, J Yu, W Guo, X Xing
2024
TGC: Transaction Graph Contrast Network for Ethereum Phishing Scam Detection
S Li, G Gou, C Liu, G Xiong, Z Li, J Xiao, X Xing
Proceedings of the 39th Annual Computer Security Applications Conference …, 2023
2023
Assessing prompt injection risks in 200+ custom gpts
J Yu, Y Wu, D Shu, M Jin, X Xing
arXiv preprint arXiv:2311.11538, 2023
172023
RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections
K Zeng, Z Lin, K Lu, X Xing, R Wang, A Doupé, Y Shoshitaishvili, T Bao
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
12023
Gptfuzzer: Red teaming large language models with auto-generated jailbreak prompts
J Yu, X Lin, X Xing
arXiv preprint arXiv:2309.10253, 2023
982023
Explaining Deep Learning Based Security Applications
W Guo, J Xu, G Wang, X Xing
AI Embedded Assurance for Cyber Systems, 219-246, 2023
2023
From grim reality to practical solution: Malware classification in real-world noise
X Wu, W Guo, J Yan, B Coskun, X Xing
2023 IEEE Symposium on Security and Privacy (SP), 2602-2619, 2023
42023
Towards Unveiling Exploitation Potential With Multiple Error Behaviors for Kernel Bugs
Z Liu, Z Lin, Y Chen, Y Wu, Y Zou, D Mu, X Xing
IEEE Transactions on Dependable and Secure Computing 21 (1), 93-109, 2023
12023
{PATROL}: Provable Defense against Adversarial Policy in Two-player Games
W Guo, X Wu, L Wang, X Xing, D Song
32nd USENIX Security Symposium (USENIX Security 23), 3943-3960, 2023
22023
Mitigating Security Risks in Linux with {KLAUS}: A Method for Evaluating Patch Correctness
Y Wu, Z Lin, Y Chen, DK Le, D Mu, X Xing
32nd USENIX Security Symposium (USENIX Security 23), 4247-4264, 2023
32023
{AIRS}: Explanation for Deep Reinforcement Learning based Security Applications
J Yu, W Guo, Q Qin, G Wang, T Wang, X Xing
32nd USENIX Security Symposium (USENIX Security 23), 7375-7392, 2023
32023
DeJITLeak: eliminating JIT-induced timing side-channel leaks
Q Qin, JA JiYang, F Song, T Chen, X Xing
Proceedings of the 30th ACM Joint European Software Engineering Conference …, 2022
72022
Dirtycred: Escalating privilege in linux kernel
Z Lin, Y Wu, X Xing
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
212022
GREBE: Unveiling exploitation potential for Linux kernel bugs
Z Lin, Y Chen, Y Wu, D Mu, C Yu, X Xing, K Li
2022 IEEE Symposium on Security and Privacy (SP), 2078-2095, 2022
242022
The system can't perform the operation now. Try again later.
Articles 1–20