default search action
Jun Xu 0003
Person information
- affiliation: Google Inc., Mountain View, CA, USA
- affiliation (former): North Carolina State University, Raleigh, NC, USA
- affiliation (former): University of Illinois at Urbana-Champaign, IL, USA
Other persons with the same name
- Jun Xu — disambiguation page
- Jun Xu 0001 — Renmin University of China, School of Information, Beijing Key Laboratory of Big Data Management and Analysis Methods, China (and 4 more)
- Jun Erik Xu (aka: Jun Xu 0002) — Hughes Network Systems, Germantown, MD, USA (and 1 more)
- Jun Xu 0004 — Marvell Semiconductor (and 1 more)
- Jun Xu 0005 — Nanjing University of Information Science & Technology, China (and 1 more)
- Jun Xu 0006 — Southern Cross University, Gold Coast, NSW, Australia
- Jun Xu 0007 — University of Texas Health Science Center, Houston, TX, USA (and 1 more)
- Jun Xu 0008 — Tsinghua University, Department of Automation, Beijing, China
- Jun Xu 0009 — New Jersey Institute of Technology, Newark, NJ, USA
- Jun Xu 0010 — Tsinghua University, Department of Computing Science & Technology, Beijing, China
- Jun Xu 0011 — Fudan University, The State Key Lab of ASIC & System, China
- Jun Xu 0012 — Fudan University, Department of Computer Science, China
- Jun Xu 0013 — Nanjing University, Institute of VLSI Design, China
- Jun (Jim) Xu (aka: Jun Xu 0014) — Georgia Institute of Technology, Atlanta, GA, USA (and 1 more)
- Jun Xu 0015 — Western Digital Corp, Singapore (and 1 more)
- Jun Xu 0016 — Jinan University, Institute of Industrial Economics, Guangzhou, China
- Jun Xu 0017 — Sun Yat-Sen University, Research Center for Drug Discovery, Guangzhou, China
- Jun Xu 0018 — Xi'an Jiaotong University, School of Mechanical Engineering, China (and 1 more)
- Jun Xu 0019 — Nankai University, College of Computer Science, TKLNDST, Tianjin, China (and 1 more)
- Jun Xu 0020 — Institute of Geographical Science and Natural Resources Research, Beijing, China (and 1 more)
- Jun Xu 0021 — Wuhan University, Electronic Information School, China (and 1 more)
- Jun Xu 0022 — Chinese Academy of Sciences, Institute of Information Engineering, State Key State Laboratory of Information Security, Beijing, China (and 1 more)
- Jun Xu 0023 — Shenzhen University, College of Computer Science and Software Engineering, China (and 2 more)
- Jun Xu 0024 — Stevens Institute of Technology, Hoboken, NJ, USA (and 1 more)
- Jun Xu 0025 — University of Central Florida, Department of Computer Science, Orlando, FL, USA
- Jun Xu 0026 — Shanghai University of Electric Power, College of Automation Engineering (and 1 more)
- Jun Xu 0027 — Harbin Institute of Technology, Research Center for Social Computing and Information Retrieval, China
- Jun Xu 0028 — Yunnan University, School of Information Science and Engineering, Kunming, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2000 – 2009
- 2008
- [j3]XiaoFeng Wang, Zhuowei Li, Jong Youl Choi, Jun Xu, Michael K. Reiter, Chongkyung Kil:
Fast and Black-box Exploit Detection and Signature Generation for Commodity Software. ACM Trans. Inf. Syst. Secur. 12(2): 11:1-11:35 (2008) - 2007
- [c19]Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu:
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities. CCS 2007: 562-572 - [c18]Mithun Acharya, Tao Xie, Jian Pei, Jun Xu:
Mining API patterns as partial orders from source code: from usage scenarios to specifications. ESEC/SIGSOFT FSE 2007: 25-34 - 2006
- [j2]Shuo Chen, Jun Xu, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer:
Security Vulnerabilities: From Analysis to Detection and Masking Techniques. Proc. IEEE 94(2): 407-418 (2006) - [c17]Chongkyung Kil, Jinsuk Jun, Christopher Bookholt, Jun Xu, Peng Ning:
Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software. ACSAC 2006: 339-348 - [c16]XiaoFeng Wang, Zhuowei Li, Jun Xu, Michael K. Reiter, Chongkyung Kil, Jong Youl Choi:
Packet vaccine: black-box exploit detection and signature generation. CCS 2006: 37-46 - [c15]Yan Zhai, Peng Ning, Jun Xu:
Integrating IDS Alert Correlation and OS-Level Dependency Tracking. ISI 2006: 272-284 - [c14]Mithun Acharya, Tao Xie, Jun Xu:
Mining Interface Specifications for Generating Checkable Robustness Properties. ISSRE 2006: 311-320 - [c13]Mithun Acharya, Tanu Sharma, Jun Xu, Tao Xie:
Effective Generation of Interface Robustness Properties for Static Analysis. ASE 2006: 293-296 - 2005
- [c12]Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Christopher Bookholt:
Automatic diagnosis and response to memory corruption vulnerabilities. CCS 2005: 223-234 - [c11]Shuo Chen, Jun Xu, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Defeating Memory Corruption Attacks via Pointer Taintedness Detection. DSN 2005: 378-387 - [c10]Shuo Chen, Jun Xu, Emre Can Sezer:
Non-Control-Data Attacks Are Realistic Threats. USENIX Security Symposium 2005 - 2004
- [j1]Shuo Chen, Jun Xu, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Keith Whisnant:
Modeling and evaluating the security threats of transient errors in firewall software. Perform. Evaluation 56(1-4): 53-72 (2004) - [c9]Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Jun Xu:
An Architectural Framework for Providing Reliability and Security Support. DSN 2004: 585-594 - [c8]Frank Castaneda, Emre Can Sezer, Jun Xu:
WORM vs. WORM: preliminary study of an active counter-attack mechanism. WORM 2004: 83-93 - 2003
- [b1]Jun Xu:
Software and Hardware Techniques for Masking Security Vulnerabilities. University of Illinois Urbana-Champaign, USA, 2003 - [c7]Shuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishankar K. Iyer:
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities. DSN 2003: 605-614 - [c6]Jun Xu, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Transparent Runtime Randomization for Security. SRDS 2003: 260- - [c5]Ravishankar K. Iyer, Shuo Chen, Jun Xu, Zbigniew Kalbarczyk:
Security Vulnerabilities - From Data Analysis to Protection Mechanisms. WORDS Fall 2003: 331-338 - 2002
- [c4]Shuo Chen, Jun Xu, Ravishankar K. Iyer, Keith Whisnant:
Evaluating the Security Threat of Firewall Data Corruption Caused by Transient Errors. DSN 2002: 495-504 - 2001
- [c3]Jun Xu, Shuo Chen, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
An Experimental Study of Security Vulnerabilities Caused by Errors. DSN 2001: 421-432 - [c2]David T. Stott, Neil A. Speirs, Zbigniew Kalbarczyk, Saurabh Bagchi, Jun Xu, Ravishankar K. Iyer:
Comparing Fail-Sailence Provided by Process Duplication versus Internal Error Detection for DHCP Server. IPDPS 2001: 31
1990 – 1999
- 1999
- [c1]Jun Xu, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Networked Windows NT System Field Failure Data Analysis. PRDC 1999: 178-185
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-28 21:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint