Computer Science and Engineering, Pennsylvania State University
Verified email at cse.psu.edu
Cited by
Cited by
Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions.
X Xiong, D Tian, P Liu
NDSS, 2011
Shelf: Preserving business continuity and availability in an intrusion recovery system
X Xiong, X Jia, P Liu
Computer Security Applications Conference, 2009. ACSAC'09. Annual, 484-493, 2009
Between mutual trust and mutual distrust: practical fine-grained privilege separation in multithreaded applications
J Wang, X Xiong, P Liu
2015 USENIX Annual Technical Conference (USENIX ATC 15), 361-373, 2015
Cross-layer damage assessment for cyber situational awareness
P Liu, X Jia, S Zhang, X Xiong, YC Jhi, K Bai, J Li
Cyber Situational Awareness, 155-176, 2010
Defeating buffer overflow attacks via virtualization
D Tian, X Xiong, C Hu, P Liu
Computers & Electrical Engineering 40 (6), 1940-1950, 2014
The web interface should be radically refactored
JR Douceur, J Howell, B Parno, M Walfish, X Xiong
Proceedings of the 10th ACM Workshop on Hot Topics in Networks, 10, 2011
SILVER: Fine-grained and transparent protection domain primitives in commodity OS kernel
X Xiong, P Liu
Research in Attacks, Intrusions, and Defenses, 103-122, 2013
Policy-centric protection of OS kernel from vulnerable loadable kernel modules
D Tian, X Xiong, C Hu, P Liu
Information Security Practice and Experience, 317-332, 2011
Availability-sensitive intrusion recovery
S Zhang, X Xiong, X Jia, P Liu
Proceedings of the 1st ACM workshop on Virtual machine security, 43-48, 2009
Integrating offline analysis and online protection to defeat buffer overflow attacks
D Tian, X Xiong, C Hu, P Liu
Information Security, 409-415, 2011
Using purpose capturing signatures to defeat computer virus mutating
X Jia, X Xiong, J Jing, P Liu
Information Security, Practice and Experience, 153-171, 2010
Practical Fine-grained Privilege Separation in Multithreaded Applications
J Wang, X Xiong, P Liu
arXiv preprint arXiv:1305.2553, 2013
Operating Services through Attacks without Messing Up the Machine
P Liu, X Jia, X Xiong, S Zhang, YC Jhi, L Li, SJ Kim
Challenges in Improving the Survivability of Data Centers
S Zhang, X Xiong, P Liu
The system can't perform the operation now. Try again later.
Articles 1–14