Author image not provided
 Xiangyu Zhang

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article11.61
Citation Count1,173
Publication count101
Publication years2003-2018
Available for download81
Average downloads per article340.94
Downloads (cumulative)27,616
Downloads (12 Months)4,614
Downloads (6 Weeks)455
SEARCH
ROLE
Arrow RightAuthor only
· Advisor only
· Other only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


101 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 101
Result page: 1 2 3 4 5 6

Sort by:

1
January 2018 Journal of Systems and Software: Volume 135 Issue C, January 2018
Publisher: Elsevier Science Inc.
Bibliometrics:
Citation Count: 0

We propose a new fault localisation framework to further improve the fault localization technique for WS-BPEL programs.We address the challenging issues when predicate switching is used for WS-BPEL programs.We report on the technical treatment of the backward dynamic slicing technique for WS-BPEL programs.We conduct case studies to investigate the effectiveness ...
Keywords: Business process execution language for web services, Debugging, Fault localisation, Web services

2 published by ACM
December 2017 ACSAC 2017: Proceedings of the 33rd Annual Computer Security Applications Conference
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 37,   Downloads (12 Months): 73,   Downloads (Overall): 73

Full text available: PDFPDF
Android has become a dominant computing platform, and its popularity has coincided with a surge of malware. The incorporation of Security-Enhanced Linux in Android (SEAndroid) is an important security enhancement to the platform. While SEAndroid adds the benefits of mandatory protection that SELinux brought to desktops and servers, the protection ...
Keywords: Policy Analysis, SEAndroid, MAC, Android, DAC

3 published by ACM
December 2017 ACSAC 2017: Proceedings of the 33rd Annual Computer Security Applications Conference
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 20,   Downloads (12 Months): 56,   Downloads (Overall): 56

Full text available: PDFPDF
ARM is the leading processor architecture in the emerging mobile and embedded market. Unfortunately, there has been a myriad of security issues on both mobile and embedded systems. While many countermeasures of such security issues have been proposed in recent years, a majority of applications still cannot be patched or ...

4
October 2017 ASE 2017: Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 8,   Downloads (12 Months): 15,   Downloads (Overall): 15

Full text available: PDFPDF
In the current online advertisement delivery, an ad slot on a publisher's website may go through multiple layers of bidding and reselling until the final ad content is delivered. The publishers have little control on the ads being displayed on their web pages. As a result, website visitors may suffer ...

5 published by ACM
August 2017 ESEC/FSE 2017: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 25,   Downloads (12 Months): 99,   Downloads (Overall): 99

Full text available: PDFPDF
Data provenance tracking determines the set of inputs related to a given output. It enables quality control and problem diagnosis in data engineering. Most existing techniques work by tracking program dependencies. They cannot quantitatively assess the importance of related inputs, which is critical to machine learning algorithms, in which an ...
Keywords: Debugging, Machine Learning, Data Provenance

6 published by ACM
July 2017 ISSTA 2017: Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 10,   Downloads (12 Months): 80,   Downloads (Overall): 80

Full text available: PDFPDF
The rapid growth of Internet of Things (IoT) has been created a number of new platforms recently. Unfortunately, such variety of IoT devices causes platform fragmentation which makes software development on such devices challenging. In particular, existing programs cannot be simply reused on such devices as they rely on certain ...
Keywords: Reverse-engineering, Binary-reuse, Cross-platform, Binary-analysis

7 published by ACM
July 2017 ISSTA 2017: Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 21,   Downloads (12 Months): 94,   Downloads (Overall): 94

Full text available: PDFPDF
Despite significant recent advances, the effectiveness of symbolic execution is limited when used to test complex, real-world software. One of the main scalability challenges is related to constraint solving: large applications and long exploration paths lead to complex constraints, often involving big arrays indexed by symbolic expressions. In this paper, ...
Keywords: Theory of arrays, Constraint solving, Symbolic execution

8
June 2017 Formal Methods in System Design: Volume 50 Issue 2-3, June 2017
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 0

In recent years, string solvers have become an essential component in many formal verification, security analysis, and bug-finding tools. Such solvers typically support a theory of string equations, the length function, and the regular-expression membership predicate. These enable considerable expressive power, which comes at the cost of slow solving time, ...
Keywords: String analysis, String constraint solver, SMT solver

9
May 2017 ICSE '17: Proceedings of the 39th International Conference on Software Engineering
Publisher: IEEE Press
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 40,   Downloads (12 Months): 334,   Downloads (Overall): 334

Full text available: PDFPDF
Many designs have been proposed to improve the automated mobile testing. Despite these improvements, providing appropriate text inputs remains a prominent obstacle, which hinders the large-scale adoption of automated testing approaches. The key challenge is how to automatically produce the most relevant text in a use case context. For example, ...

10 published by ACM
April 2017 VEE '17: Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 13,   Downloads (12 Months): 175,   Downloads (Overall): 175

Full text available: PDFPDF
Recent code reuse attacks are able to circumvent various address space layout randomization (ASLR) techniques by exploiting memory disclosure vulnerabilities. To mitigate sophisticated code reuse attacks, we proposed a light-weight virtual machine, ReRanz, which deployed a novel continuous binary code re-randomization to mitigate memory disclosure oriented attacks. In order to ...
Keywords: re-randomization, shared memory, memory disclosure, ReRanz, virtual machine
Also published in:
September 2017  ACM SIGPLAN Notices - VEE '17: Volume 52 Issue 7, July 2017

11
April 2017 WWW '17: Proceedings of the 26th International Conference on World Wide Web
Publisher: International World Wide Web Conferences Steering Committee
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 14,   Downloads (12 Months): 164,   Downloads (Overall): 164

Full text available: PDFPDF
Web-based malware equipped with stealthy cloaking and obfuscation techniques is becoming more sophisticated nowadays. In this paper, we propose J-FORCE, a crash-free forced JavaScript execution engine to systematically explore possible execution paths and reveal malicious behaviors in such malware. In particular, J-FORCE records branch outcomes and mutates them for further ...
Keywords: malware, security, evasion, javascript

12 published by ACM
December 2016 ACSAC '16: Proceedings of the 32nd Annual Conference on Computer Security Applications
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4,   Downloads (12 Months): 93,   Downloads (Overall): 110

Full text available: PDFPDF
Advanced cyber attacks consist of multiple stages aimed at being stealthy and elusive. Such attack patterns leave their footprints spatio-temporally dispersed across many different logs in victim machines. However, existing log-mining intrusion analysis systems typically target only a single type of log to discover evidence of an attack and therefore ...

13 published by ACM
November 2016 FSE 2016: Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 10,   Downloads (12 Months): 143,   Downloads (Overall): 213

Full text available: PDFPDF
Traditional sensitive data disclosure analysis faces two challenges: to identify sensitive data that is not generated by specific API calls, and to report the potential disclosures when the disclosed data is recognized as sensitive only after the sink operations. We address these issues by developing BidText, a novel static technique ...
Keywords: Sensitive Data Disclosure, Android apps, Bi-directional Text Correlation

14 published by ACM
November 2016 FSE 2016: Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 9,   Downloads (12 Months): 120,   Downloads (Overall): 184

Full text available: PDFPDF
Nowadays, a rapidly increasing number of web users are using Ad-blockers to block online advertisements. Ad-blockers are browser-based software that can block most Ads on the websites, speeding up web browsers and saving bandwidth. Despite these benefits to end users, Ad-blockers could be catastrophic for the economic structure underlying the ...
Keywords: web bots, Ad-blockers, randomization

15 published by ACM
November 2016 FSE 2016: Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 13,   Downloads (12 Months): 80,   Downloads (Overall): 119

Full text available: PDFPDF
Diagnosis of performance problems is an essential part of software development and maintenance. This is in particular a challenging problem to be solved in the production environment where only program binaries are available with limited or zero knowledge of the source code. This problem is compounded by the integration with ...
Keywords: Performance diagnosis, post-development testing

16 published by ACM
November 2016 FSE 2016: Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 26,   Downloads (12 Months): 240,   Downloads (Overall): 361

Full text available: PDFPDF
Python is a popular dynamic language that allows quick software development. However, Python program analysis engines are largely lacking. In this paper, we present a Python predictive analysis. It first collects the trace of an execution, and then encodes the trace and unexecuted branches to symbolic constraints. Symbolic variables are ...
Keywords: Python, Dynamic Language, Debugging, Predictive Analysis

17 published by ACM
November 2016 FSE 2016: Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 21,   Downloads (12 Months): 245,   Downloads (Overall): 334

Full text available: PDFPDF
We propose a novel type inference technique for Python programs. Type inference is difficult for Python programs due to their heavy dependence on external APIs and the dynamic language features. We observe that Python source code often contains a lot of type hints such as attribute accesses and variable names. ...
Keywords: Python, Dynamic Languages, Type Inference, Probabilistic Inference

18 published by ACM
October 2016 OOPSLA 2016: Proceedings of the 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 11,   Downloads (12 Months): 120,   Downloads (Overall): 162

Full text available: PDFPDF
This paper presents Apex, a system that can automatically generate explanations for programming assignment bugs, regarding where the bugs are and how the root causes led to the runtime failures. It works by comparing the passing execution of a correct implementation (provided by the instructor) and the failing execution of ...
Keywords: Computer-Aided Education, Automated Feedback Generation
Also published in:
December 2016  ACM SIGPLAN Notices - OOPSLA '16: Volume 51 Issue 10, October 2016

19
August 2016 WOOT'16: Proceedings of the 10th USENIX Conference on Offensive Technologies
Publisher: USENIX Association
Bibliometrics:
Citation Count: 1

Smartphone apps have changed the way we interact with online services, but highly specialized apps come at a cost to privacy. In this paper we will demonstrate that a passive eavesdropper is capable of identifying finegrained user activities within the wireless network traffic generated by apps. Despite the widespread use ...

20 published by ACM
July 2016 ISSTA 2016: Proceedings of the 25th International Symposium on Software Testing and Analysis
Publisher: ACM
Bibliometrics:
Citation Count: 5
Downloads (6 Weeks): 5,   Downloads (12 Months): 64,   Downloads (Overall): 148

Full text available: PDFPDF
Modern browsers have a highly concurrent page rendering process in order to be more responsive. However, such a concurrent execution model leads to various race issues. In this paper, we present ARROW, a static technique that can automatically, safely, and cost effectively patch certain race issues on client side pages. ...
Keywords: race condition, constraint solving, Automatic repair



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us