Follow
Ya Xiao
Ya Xiao
Ph.D. candidate of Computer Science, Virginia Tech
Verified email at vt.edu
Title
Cited by
Cited by
Year
Deep learning-based anomaly detection in cyber-physical systems: Progress and opportunities
Y Luo, Y Xiao, L Cheng, G Peng, D Yao
ACM Computing Surveys (CSUR) 54 (5), 1-36, 2021
2002021
Cryptoguard: High precision detection of cryptographic vulnerabilities in massive-sized java projects
S Rahaman, Y Xiao, S Afrose, F Shaon, K Tian, M Frantz, M Kantarcioglu, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
1372019
Neural cryptanalysis: Metrics, methodology, and applications in cps ciphers
Y Xiao, Q Hao, DD Yao
2019 IEEE conference on dependable and secure computing (DSC), 1-8, 2019
312019
Automatic detection of Java cryptographic API misuses: Are we there yet?
Y Zhang, MMA Kabir, Y Xiao, D Yao, N Meng
IEEE Transactions on Software Engineering 49 (1), 288-303, 2022
282022
Evaluation of static vulnerability detection tools with Java cryptographic API benchmarks
S Afrose, Y Xiao, S Rahaman, BP Miller, D Yao
IEEE Transactions on Software Engineering 49 (2), 485-497, 2022
272022
Na Meng
H Zhong, Y Xiao, S Rahaman, H Cai
IEEE International Conference on Software Analysis, 2022
262022
Methodologies for quantifying (Re-) randomization security and timing under JIT-ROP
S Ahmed, Y Xiao, KZ Snow, G Tan, F Monrose, D Yao
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
262020
Example-based vulnerability detection and repair in java code
Y Zhang, Y Xiao, MMA Kabir, D Yao, N Meng
Proceedings of the 30th IEEE/ACM International Conference on Program …, 2022
152022
Industrial experience of finding cryptographic vulnerabilities in large-scale codebases
Y Xiao, Y Zhao, N Allen, N Keynes, D Yao, C Cifuentes
Digital Threats: Research and Practice 4 (1), 1-18, 2023
82023
Privacy guarantees of bluetooth low energy contact tracing: A case study on covidwise
S Ahmed, Y Xiao, TT Chung, C Fung, M Yung, DD Yao
Computer 55 (2), 54-62, 2022
82022
Comparative measurement of cache {Configurations’} impacts on cache timing {Side-Channel} attacks
X Yu, Y Xiao, K Cameron, DD Yao
12th USENIX Workshop on Cyber Security Experimentation and Test (CSET 19), 2019
82019
Danfeng, Yao, and Murat Kantarcioglu
S Rahaman, Y Xiao, S Afrose, F Shaon, K Tian, M Frantz
Cryptoguard: High precision detection of cryptographic vulnerabilities in …, 2018
72018
CHIRON: deployment-quality detection of Java cryptographic vulnerabilities
S Rahaman, Y Xiao, K Tian, F Shaon, M Kantarcioglu, D Yao
arXiv preprint arXiv:1806.06881, 2018
62018
Embedding code contexts for cryptographic api suggestion: New methodologies and comparisons
Y Xiao, S Ahmed, W Song, X Ge, B Viswanath, D Yao
arXiv preprint arXiv:2103.08747, 2021
52021
Data-driven vulnerability detection and repair in java code
Y Zhang, M Kabir, Y Xiao, N Meng
arXiv preprint arXiv:2102.06994, 2021
52021
Danfeng (Daphne) Yao
S Rahaman, Y Xiao, S Afrose, F Shaon, K Tian, M Frantz, M Kantarcioglu
CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in …, 2019
52019
Being the developers’ friend: Our experience developing a high-precision tool for secure coding
DD Yao, S Rahaman, Y Xiao, S Afrose, M Frantz, K Tian, N Meng, ...
IEEE Security & Privacy 20 (6), 43-52, 2022
42022
Poster: Precise detection of unprecedented python cryptographic misuses using on-demand analysis
M Frantz, Y Xiao, TS Pias, DD Yao
The Network and Distributed System Security (NDSS) Symposium, 2022
32022
Specializing neural networks for cryptographic code completion applications
Y Xiao, W Song, J Qi, B Viswanath, P McDaniel, D Yao
IEEE Transactions on Software Engineering, 2023
22023
Tutorial: Principles and Practices of Secure Cryptographic Coding in Java
Y Xiao, M Frantz, S Afrose, S Rahaman, D Yao
2020 IEEE Secure Development (SecDev), 5-6, 2020
12020
The system can't perform the operation now. Try again later.
Articles 1–20