default search action
Xinming Ou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i5]Shashwat Kumar, Francis Hahn, Xinming Ou, Dmitry B. Goldgof, Lawrence O. Hall, Jay Ligatti, S. Raj Rajagopalan, Armin Ziaie Tabari:
A Preliminary Study on Using Large Language Models in Software Pentesting. CoRR abs/2401.17459 (2024) - 2023
- [j8]Soumyadeep Hore, Fariha Moomtaheen, Ankit Shah, Xinming Ou:
Towards Optimal Triage and Mitigation of Context-Sensitive Cyber Vulnerabilities. IEEE Trans. Dependable Secur. Comput. 20(2): 1270-1285 (2023) - [c53]Shashwat Kumar, Francis Hahn, Xinming Ou, Anoop Singhal:
Security Analysis of Trust on the Controller in the Matter Protocol Specification. CNS 2023: 1-6 - [c52]Armin Ziaie Tabari, Guojun Liu, Xinming Ou, Anoop Singhal:
Revealing Human Attacker Behaviors Using an Adaptive Internet of Things Honeypot Ecosystem. IFIP Int. Conf. Digital Forensics 2023: 73-90 - 2021
- [c51]Anwesh Tuladhar, Daniel Lende, Jay Ligatti, Xinming Ou:
An Analysis of the Role of Situated Learning in Starting a Security Culture in a Software Company. SOUPS @ USENIX Security Symposium 2021: 617-632 - [i4]Armin Ziaie Tabari, Xinming Ou, Anoop Singhal:
What are Attackers after on IoT Devices? An approach based on a multi-phased multi-faceted IoT honeypot ecosystem and data clustering. CoRR abs/2112.10974 (2021) - 2020
- [c50]Armin Ziaie Tabari, Xinming Ou:
A Multi-phased Multi-faceted IoT Honeypot Ecosystem. CCS 2020: 2121-2123 - [c49]Dewan Chaulagain, Prabesh Poudel, Prabesh Pathak, Sankardas Roy, Doina Caragea, Guojun Liu, Xinming Ou:
Hybrid Analysis of Android Apps for Security Vetting using Deep Learning. CNS 2020: 1-9 - [c48]Xiaodong Yu, Fengguo Wei, Xinming Ou, Michela Becchi, Tekin Bicer, Danfeng Daphne Yao:
GPU-Based Static Data-Flow Analysis for Fast and Scalable Android App Vetting. IPDPS 2020: 274-284 - [c47]Hernan M. Palombo, Armin Ziaie Tabari, Daniel Lende, Jay Ligatti, Xinming Ou:
An Ethnographic Understanding of Software (In)Security and a Co-Creation Model to Improve Secure Software Development. SOUPS @ USENIX Security Symposium 2020: 205-220 - [e5]Jay Ligatti, Xinming Ou, Jonathan Katz, Giovanni Vigna:
CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020. ACM 2020, ISBN 978-1-4503-7089-9 [contents] - [e4]Jay Ligatti, Xinming Ou:
AISec@CCS 2020: Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security, Virtual Event, USA, 13 November 2020. ACM 2020, ISBN 978-1-4503-8094-2 [contents] - [e3]Jay Ligatti, Xinming Ou, Wouter Lueks, Paul Syverson:
WPES'20: Proceedings of the 19th Workshop on Privacy in the Electronic Society, Virtual Event, USA, November 9, 2020. ACM 2020, ISBN 978-1-4503-8086-7 [contents] - [i3]Armin Ziaie Tabari, Xinming Ou:
A First Step Towards Understanding Real-world Attacks on IoT Devices. CoRR abs/2003.01218 (2020) - [i2]Yuping Li, Jiyong Jang, Xinming Ou:
Topology-Aware Hashing for Effective Control Flow Graph Similarity Analysis. CoRR abs/2004.06563 (2020)
2010 – 2019
- 2019
- [c46]Yuping Li, Jiyong Jang, Xinming Ou:
Topology-Aware Hashing for Effective Control Flow Graph Similarity Analysis. SecureComm (1) 2019: 278-298 - 2018
- [j7]Fengguo Wei, Sankardas Roy, Xinming Ou, Robby:
Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps. ACM Trans. Priv. Secur. 21(3): 14:1-14:32 (2018) - [c45]Fengguo Wei, Xingwei Lin, Xinming Ou, Ting Chen, Xiaosong Zhang:
JN-SAF: Precise and Efficient NDK/JNI-aware Inter-language Static Analysis Framework for Security Vetting of Android Applications with Native Code. CCS 2018: 1137-1150 - [c44]Yaohui Chen, Yuping Li, Long Lu, Yueh-Hsun Lin, Hayawardh Vijayakumar, Zhi Wang, Xinming Ou:
InstaGuard: Instantly Deployable Hot-patches for Vulnerable System Programs on Android. NDSS 2018 - [c43]Alexander Paulsen, Anis Yazidi, Boning Feng, Xinming Ou:
A Population-Based Incremental Learning Approach to Network Hardening. SoMeT 2018: 941-953 - 2017
- [j6]Sathya Chandran Sundaramurthy, Michael Wesch, Xinming Ou, John McHugh, S. Raj Rajagopalan, Alexandru G. Bardas:
Humans Are Dynamic - Our Tools Should Be Too. IEEE Internet Comput. 21(3): 40-46 (2017) - [c42]Jordan DeLoach, Doina Caragea, Xinming Ou:
Android Malware Detection with Weak Ground Truth Data. AAAI 2017: 4915-4916 - [c41]Hamed Okhravi, Xinming Ou:
MTD 2017: Fourth ACM Workshop on Moving Target Defense (MTD). CCS 2017: 2637-2638 - [c40]Fengguo Wei, Yuping Li, Sankardas Roy, Xinming Ou, Wu Zhou:
Deep Ground Truth Analysis of Current Android Malware. DIMVA 2017: 252-276 - [c39]Alexandru G. Bardas, Sathya Chandran Sundaramurthy, Xinming Ou, Scott A. DeLoach:
MTD CBITS: Moving Target Defense for Cloud-Based IT Systems. ESORICS (1) 2017: 167-186 - [c38]Xiaolong Wang, Richard Habeeb, Xinming Ou, Siddharth Amaravadi, John Hatcliff, Masaaki Mizuno, Mitchell L. Neilsen, S. Raj Rajagopalan, Srivatsan Varadarajan:
Enhanced Security of Building Automation Systems Through Microkernel-Based Controller Platforms. ICDCS Workshops 2017: 37-44 - [c37]Yuping Li, Jiyong Jang, Xin Hu, Xinming Ou:
Android Malware Clustering Through Malicious Payload Mining. RAID 2017: 192-214 - [e2]Hamed Okhravi, Xinming Ou:
Proceedings of the 2017 Workshop on Moving Target Defense, MTD@CCS 2017, Dallas, TX, USA, October 30, 2017. ACM 2017, ISBN 978-1-4503-5176-8 [contents] - [i1]Yuping Li, Jiyong Jang, Xin Hu, Xinming Ou:
Android Malware Clustering through Malicious Payload Mining. CoRR abs/1707.04795 (2017) - 2016
- [j5]Hussain M. J. Almohri, Layne T. Watson, Danfeng Yao, Xinming Ou:
Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming. IEEE Trans. Dependable Secur. Comput. 13(4): 474-487 (2016) - [c36]Jordan DeLoach, Doina Caragea, Xinming Ou:
Android malware detection with weak ground truth data. IEEE BigData 2016: 3457-3464 - [c35]Xinming Ou:
A Bottom-Up Approach to Applying Graphical Models in Security Analysis. GraMSec@CSF 2016: 1-24 - [c34]Sathya Chandran Sundaramurthy, John McHugh, Xinming Ou, Michael Wesch, Alexandru G. Bardas, S. Raj Rajagopalan:
Turning Contradictions into Innovations or: How We Learned to Stop Whining and Improve Security Operations. SOUPS 2016: 237-251 - 2015
- [j4]Su Zhang, Xinming Ou, Doina Caragea:
Predicting Cyber Risks through National Vulnerability Database. Inf. Secur. J. A Glob. Perspect. 24(4-6): 194-206 (2015) - [c33]Sankardas Roy, Jordan DeLoach, Yuping Li, Nic Herndon, Doina Caragea, Xinming Ou, Venkatesh Prasad Ranganath, Hongmin Li, Nicolais Guevara:
Experimental Study with Real-world Data for Android App Security Analysis using Machine Learning. ACSAC 2015: 81-90 - [c32]Rui Zhuang, Alexandru G. Bardas, Scott A. DeLoach, Xinming Ou:
A Theory of Cyber Attacks: A Step Towards Analyzing MTD Systems. MTD@CCS 2015: 11-20 - [c31]Xiaolong Wang, Masaaki Mizuno, Mitchell L. Neilsen, Xinming Ou, S. Raj Rajagopalan, Will G. Boldwin, Bryan Phillips:
Secure RTOS Architecture for Building Automation. CPS-SPC@CCS 2015: 79-90 - [c30]Justin Paupore, Earlence Fernandes, Atul Prakash, Sankardas Roy, Xinming Ou:
Practical Always-on Taint Tracking on Mobile Devices. HotOS 2015 - [c29]Su Zhang, Xinwen Zhang, Xinming Ou, Liqun Chen, Nigel Edwards, Jing Jin:
Assessing Attack Surface with Component-Based Package Dependency. NSS 2015: 405-417 - [c28]Sathya Chandran Sundaramurthy, Alexandru G. Bardas, Jacob Case, Xinming Ou, Michael Wesch, John McHugh, S. Raj Rajagopalan:
A Human Capital Model for Mitigating Security Analyst Burnout. SOUPS 2015: 347-359 - 2014
- [j3]Sathya Chandran Sundaramurthy, John McHugh, Xinming Simon Ou, S. Raj Rajagopalan, Michael Wesch:
An Anthropological Approach to Studying CSIRTs. IEEE Secur. Priv. 12(5): 52-60 (2014) - [c27]Rui Zhuang, Scott A. DeLoach, Xinming Ou:
Towards a Theory of Moving Target Defense. MTD@CCS 2014: 31-40 - [c26]Su Zhang, Xinwen Zhang, Xinming Ou:
After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across IaaS cloud. AsiaCCS 2014: 317-328 - [c25]Fengguo Wei, Sankardas Roy, Xinming Ou, Robby:
Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps. CCS 2014: 1329-1341 - [c24]Rui Zhuang, Scott A. DeLoach, Xinming Ou:
A model for analyzing the effect of moving target defenses on enterprise networks. CISR 2014: 73-76 - [c23]Ian Unruh, Alexandru G. Bardas, Rui Zhuang, Xinming Ou, Scott A. DeLoach:
Compiling Abstract Specifications into Concrete Systems - Bringing Order to the Cloud. LISA 2014: 17-34 - [p3]Yi Cheng, Julia Deng, Jason H. Li, Scott A. DeLoach, Anoop Singhal, Xinming Ou:
Metrics of Security. Cyber Defense and Situational Awareness 2014: 263-295 - 2013
- [j2]John Homer, Su Zhang, Xinming Ou, David Schmidt, Yanhui Du, S. Raj Rajagopalan, Anoop Singhal:
Aggregating vulnerability metrics in enterprise networks using attack graphs. J. Comput. Secur. 21(4): 561-597 (2013) - [c22]Justin Yackoski, Jason H. Li, Scott A. DeLoach, Xinming Ou:
Mission-oriented moving target defense based on cryptographically strong network dynamics. CSIIRW 2013: 57 - [c21]Loai Zomlot, Sathya Chandran Sundaramurthy, Doina Caragea, Xinming Ou:
Aiding Intrusion Analysis Using Machine Learning. ICMLA (2) 2013: 40-47 - [e1]Ehab Al-Shaer, Xinming Ou, Geoffrey G. Xie:
Automated Security Management [papers from SafeConfig 2012, Baltimore Inner Harbor, MD, USA]. Springer 2013, ISBN 978-3-319-01432-6 [contents] - 2012
- [c20]Dan Moor, Siva Raj Rajagopalan, Sathya Chandran Sundaramurthy, Xinming Ou:
Investigative response modeling and predictive data collection. eCrime Researchers Summit 2012: 1-6 - [c19]Alexandru G. Bardas, Loai Zomlot, Sathya Chandran Sundaramurthy, Xinming Ou, S. Raj Rajagopalan, Marc R. Eisenbarth:
Classification of UDP Traffic for DDoS Detection. LEET 2012 - [c18]Torben Amtoft, Josiah Dodds, Zhi Zhang, Andrew W. Appel, Lennart Beringer, John Hatcliff, Xinming Ou, Andrew Cousino:
A Certificate Infrastructure for Machine-Checked Proofs of Conditional Information Flow. POST 2012: 369-389 - 2011
- [b1]Xinming Ou, Anoop Singhal:
Quantitative Security Risk Assessment of Enterprise Networks. Springer Briefs in Computer Science, Springer 2011, ISBN 978-1-4614-1859-7, pp. i-xiii, 1-28 - [c17]Heqing Huang, Su Zhang, Xinming Ou, Atul Prakash, Karem A. Sakallah:
Distilling critical attack graph surface iteratively through minimum-cost SAT solving. ACSAC 2011: 31-40 - [c16]Loai Zomlot, Sathya Chandran Sundaramurthy, Kui Luo, Xinming Ou, Siva Raj Rajagopalan:
Prioritizing intrusion analysis using Dempster-Shafer theory. AISec 2011: 59-70 - [c15]Scott A. DeLoach, Xinming Ou, Rui Zhuang, Su Zhang:
Model-driven, Moving-Target Defense for Enterprise Network Security. Models@run.time@Dagstuhl 2011: 137-161 - [c14]Su Zhang, Doina Caragea, Xinming Ou:
An Empirical Study on Using the National Vulnerability Database to Predict Software Vulnerabilities. DEXA (1) 2011: 217-231 - [c13]Su Zhang, Xinming Ou, John Homer:
Effective Network Vulnerability Assessment through Model Abstraction. DIMVA 2011: 17-34 - 2010
- [c12]Peng Xie, Jason H. Li, Xinming Ou, Peng Liu, Renato Levy:
Using Bayesian networks for cyber security analysis. DSN 2010: 211-220 - [p2]Paul Barford, Marc Dacier, Thomas G. Dietterich, Matt Fredrikson, Jonathon T. Giffin, Sushil Jajodia, Somesh Jha, Jason H. Li, Peng Liu, Peng Ning, Xinming Ou, Dawn Song, Laura Strater, Vipin Swarup, George P. Tadda, C. Wang, John Yen:
Cyber SA: Situational Awareness for Cyber Defense. Cyber Situational Awareness 2010: 3-13 - [p1]Jason H. Li, Xinming Ou, Siva Raj Rajagopalan:
Uncertainty and Risk Management in Cyber Situational Awareness. Cyber Situational Awareness 2010: 51-68
2000 – 2009
- 2009
- [j1]John Homer, Xinming Ou:
SAT-solving approaches to context-aware enterprise network security management. IEEE J. Sel. Areas Commun. 27(3): 315-322 (2009) - [c11]Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja Sakthivelmurugan:
An Empirical Approach to Modeling Uncertainty in Intrusion Analysis. ACSAC 2009: 494-503 - [c10]Anoop Singhal, Xinming Ou:
Techniques for enterprise network security metrics. CSIIRW 2009: 25 - 2008
- [c9]Reginald E. Sawilla, Xinming Ou:
Identifying Critical Attack Assets in Dependency Attack Graphs. ESORICS 2008: 18-34 - [c8]John Homer, Ashok Varikuti, Xinming Ou, Miles A. McQueen:
Improving Attack Graph Visualization through Data Reduction and Attack Grouping. VizSEC 2008: 68-79 - 2006
- [c7]Xinming Ou, Wayne F. Boyer, Miles A. McQueen:
A scalable approach to attack graph generation. CCS 2006: 336-345 - 2005
- [c6]K. Rustan M. Leino, Madan Musuvathi, Xinming Ou:
A Two-Tier Technique for Supporting Quantifiers in a Lazily Proof-Explicating Theorem Prover. TACAS 2005: 334-348 - [c5]Xinming Ou, Sudhakar Govindavajhala, Andrew W. Appel:
MulVAL: A Logic-based Network Security Analyzer. USENIX Security Symposium 2005 - 2004
- [c4]Xinming Ou, Gang Tan, Yitzhak Mandelbaum, David Walker:
Dynamic Typing with Dependent Types. IFIP TCS 2004: 437-450 - 2003
- [c3]Cormac Flanagan, Rajeev Joshi, Xinming Ou, James B. Saxe:
Theorem Proving Using Lazy Proof Explication. CAV 2003: 355-367 - 2000
- [c2]Wei Liu, Min Wu, Xinming Ou, Weimin Zheng, Meiming Shen:
Design of an I/O Balancing File System on Web Server Clusters. ICPP Workshops 2000: 119-126 - [c1]Wei Liu, Weimin Zheng, Meiming Shen, Xinming Ou, Min Wu:
An Effective File Migration Algorithm in Cluster File Systems. ICPP Workshops 2000: 329-336
Coauthor Index
aka: Siva Raj Rajagopalan
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint