http://www.csc.ncsu.edu/faculty/jiang/pubs/index.html
Publications
2009
- Daniel Ramsbrock,
Xinyuan Wang, and Xuxian Jiang,
"The Botnet Problem in Internet Security,”
To appear in
Computer And Information Security Handbook,
Morgan Kaufmann, 2009
- Ryan Riley, Xuxian
Jiang, Dongyan Xu, "Multi-Aspect Profiling of Kernel Rootkit Behavior,"
Proceedings of the 4th European Conference on Computer Systems (EuroSys 2009),
Nuremberg, Germany, April 2009 (16.9%).
- Xuxian Jiang,
Xinyuan Wang, Dongyan Xu, "Stealthy Malware Detection and Monitoring
Through VMM-Based `Out of the Box' Semantic View Reconstruction,"
To appear in ACM Transactions on Information and System Security (TISSEC), 2009.
- Xuxian Jiang,
Xingquan Zhu,
"vEye: Behavioral Footprinting for Self-Propagating Worm Detection and
Profiling,"
To appear in Journal of Knowledge and Information Systems,
2009.
- Ruishan Zhang,
Xinyuan Wang, Ryan Farley, Xiaohui Yang, Xuxian Jiang,
“On the Feasibility of Launching the Man-In-The-Middle Attacks on VoIP
from Remote Attackers,"
Proceedings of the 4nd ACM Symposium on InformAtion, Computer and
Communications Security
(ASIACCS
2009), Sydney, Australia, March 2009.
- Junghwan Rhee, Ryan
Riley, Dongyan Xu, Xuxian Jiang, "Defeating Dynamic Data Kernel Rootkit
Attacks via VMM-based Guest Transparent Monitoring,"
Proceedings of 4th International Conference on Availability,
Reliability and Security
(ARES 2009),
Fukuoka, Japan, March 2009 (25%).
2008
- Xinyuan Wang,
Ruishan Zhang, Xiaohui Yang, Xuxian Jiang, Duminda Wijesekera,
"Voice Pharming Attack and the Trust of VoIP,"
Proceedings of the 4th International Conference on Security and
Privacy in Communication Networks (SecureComm 2008),
Istanbul, Turkey, September 2008 (21%).
- Ryan Riley, Xuxian
Jiang, Dongyan Xu,
"Guest-Transparent Prevention of Kernel Rootkits with VMM-based Memory
Shadowing," Proceedings of the 11th International Symposium on
Recent Advances in Intrusion Detection
(RAID 2008),
Boston, MA, September 2008 (25%).Received Best Paper Award
- Zhi Wang, Xuxian
Jiang, Weidong Cui, Xinyuan Wang,
"Countering Persistent Kernel Rootkits Through Systematic Hook
Discovery,"
Proceedings of the 11th International Symposium on Recent Advances
in Intrusion Detection
(RAID 2008),
Boston, MA, September 2008 (25%).
- Daniel Ramsbrock,
Xinyuan Wang, Xuxian Jiang,
"A First Step Toward Live Botmaster Traceback,"
Proceedings of the 11th International Symposium on Recent Advances
in Intrusion Detection
(RAID 2008),
Boston, MA, September 2008 (25%).
- Xuxian Jiang,
Florian Buchholz, AAron Walters, Dongyan Xu, Yi-Min Wang, Eugene H.
Spafford,
"Tracing Worm Break-in and Contaminations via Process
Coloring: A Provenance-Preserving Approach,"IEEE Transactions on
Parallel and Distributed Systems, 19(7), July 2008.
- Zhiqiang Lin, Xuxian
Jiang, Dongyan Xu, Xiangyu Zhang,
"Automatic Protocol Format Reverse Engineering Through Context-Aware
Monitored Execution,"
Proceedings of the 15th Network and Distributed System Security
Symposium (NDSS
2008), San Diego, CA, February 2008 (17.8%).
2007
- Xuxian Jiang,
Xinyuan Wang, Dongyan Xu,
"Stealthy Malware Detection Through VMM-Based 'Out-of-the-Box' Semantic
View
Reconstruction,"
Proceedings of the 14th ACM Conference on Computer and
Communications Security
(CCS 2007),
Alexandria, VA, November 2007 (18%).
- Xuxian Jiang, Helen
J. Wang, Dongyan Xu, Yi-Min Wang,
"RandSys: Thwarting Code Injection Attacks with System Service
Interface Randomization,"
Proceedings of the 26th IEEE International Symposium on Reliable
Distributed Systems (SRDS 2007),
Beijing, China, October 2007 (15%).
- Xuxian Jiang,
Xinyuan Wang,
"'Out-of-the-Box' Monitoring of VM-Based High-Interaction Honeypots,"
Proceedings of the 10th International Symposium on Recent Advances
in Intrusion
Detection (RAID 2007),
Queensland, Australia, September 2007(18.0%).
- Ruishan Zhang,
Xinyuan Wang, Xiaohui Yang, Xuxian Jiang,
"Billing Attacks on SIP-Based VoIP Systems,"
Proceedings of the 1st USENIX Workshop on Offensive Technologies
(WOOT '07, in
conjunction with USENIX
Security 2007),
Boston, MA, August 2007 .
- Ryan Riley, Xuxian
Jiang, Dongyan Xu,
"An Architectural Approach to Preventing Code Injection Attacks,"
Proceedings of the 37th Annual IEEE/IFIP International Conference
on Dependable Systems and Networks (DSN-DCCS
2007),
Edinburgh, UK, June 2007(25.0%).
- Min Xu, Xuxian
Jiang, Ravi Sandhu, Xinwen Zhang,
"Towards a VMM-Based Usage Control Framework for OS Kernel Integrity
Protection,"
Proceedings of the 12th ACM Symposium on Access Control Models and
Technologies (SACMAT
2007),
Sophia Antipolis, France, June 2007(23.8%).
- Zhiqiang Lin, Xuxian
Jiang, Dongyan Xu, Bing Mao, Li Xie,
"AutoPaG: Towards Automated Software Patch Generation with Source Code
Root Cause Identification and Repair,"
Proceedings of the 2nd ACM Symposium on InformAtion, Computer and
Communications Security
(ASIACCS 2007),
Singapore,
March 2007(17.6%).
2006
- Xuxian Jiang,
Dongyan Xu,
"Profiling Self-Propagating Worms via Behavioral Footprinting,"
Proceedings of the 4th ACM Workshop on Recurring Malcode (WORM 2006,
in conjunction with
ACM CCS-13),
Fairfax, VA, November 2006(30%).
- Xuxian Jiang,
Dongyan Xu, Yi-Min Wang,
"Collapsar: A VM-Based Honeyfarm and Reverse Honeyfarm Architecture for
Network Attack Capture and Detention,"
Journal of Parallel and Distributed Computing, Special Issue on
Security In Grid and Distributed Systems, 66(9),
September 2006 (12.2%).
- Xuxian Jiang, AAron
Walters, Florian Buchholz, Dongyan Xu, Yi-Min Wang,
Eugene H. Spafford,
"Provenance-Aware Tracing of Worm Break-in and Contaminations: A
Process Coloring Approach,"the 26th IEEE International
Conference on Distributed
Computing Systems
(ICDCS 2006), Lisboa,
Portugal, July 2006
Proceedings of (13.9%).
- Yi-Min Wang, Doug
Beck, Xuxian Jiang, Roussi Roussev, Chad Verbowski, Shuo Chen, Sam King
"Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That
Exploit Browser Vulnerabilities" ,
Proceedings of the 13th Annual Network and Distributed System
Security Symposium
(NDSS 2006),
San Diego, CA, February 2006(13.6%).
2005
- Xuxian Jiang,
Dongyan Xu, Helen J. Wang, Eugene H. Spafford,
"Virtual Playgrounds for Worm Behavior Investigation,"
Proceedings of the 8th International Symposium on
Recent Advances in Intrusion Detection (RAID 2005),
Seattle, WA, September 2005 (in LNCS
Vol. 3858, Springer) (20%).
- Paul Ruth, Xuxian
Jiang, Dongyan Xu, Sebastien Goasguen,
"Virtual Distributed Environments in a Shared Infrastructure," IEEE
Computer, Special Issue on Virtualization Technologies, May 2005.
2004
- Dongyan Xu, Xuxian
Jiang,
"Towards
an Integrated Multimedia Service Hosting Overlay," Proceedings of
ACM Multimedia 2004, New York, NY, October 2004 (invited).
- Xuxian Jiang,
Dongyan Xu,
"Collapsar: A VM-Based Architecture for Network Attack
Detention Center,"
Proceedings of the 13th USENIX Security Symposium (Security '04),
San Diego, CA, August 2004 (12%).
- Xuxian Jiang,
Dongyan Xu, Rudolf Eigenmann,
"Protection Mechanisms for Application Service
Hosting Platforms," Proceedings of IEEE/ACM Int'l Symposium
on Cluster Computing and the Grid (CCGrid
2004), Chicago, IL, April 2004 (27%).
2003
- Xuxian Jiang,
Dongyan Xu,
"VIOLIN: Virtual Internetworking on OverLay INfrastructure,"
Department of Computer Sciences Technical Report CSD TR 03-027, Purdue
University, July 2003 (in LNCS
Vol. 3358, Springer).
- Xuxian Jiang,
Dongyan Xu,
"vBET: a VM-Based Emulation Testbed," Proceedings of ACM
Workshop on Models, Methods and Tools for Reproducible Network Research
(MoMeTools,
in conjunction with ACM SIGCOMM
2003),
Karlsruhe, Germany, August 2003 (1 out of 3).
- Xuxian Jiang,
Dongyan Xu, "SODA: a
Service-On-Demand
Architecture for Application
Service Hosting Utility Platforms," Proceedings of the
12th IEEE
International Symposium on High Performance Distributed
Computing (HPDC-12),
Seattle, WA, June 2003 (20%).
- Xuxian Jiang, Yu
Dong, Dongyan Xu, Bharat Bhargava, "GnuStream:
a P2P Media Streaming System Prototype," Proceedings of IEEE
International Conference on Multimedia and Expo (ICME 2003),
Baltimore, MD, June 2003.
This material is
presented to ensure timely dissemination of
scholarly and technical work. Copyright and all rights therein are
retained by authors or by other copyright holders. All persons copying
this information are expected to adhere to the terms and constraints
invoked by each author's copyright. These works may not be reposted
without the explicit permission of the copyright holder.
|