Selected Publications
Journal Publications
-
Sahan Gamage, Ardalan Kangarlou, Ramana Kompella, Dongyan Xu,
"Protocol Responsibility Offloading to Improve TCP Throughput in Virtualized Environments",
ACM Transactions on Computer Systems (TOCS), accepted 2013.
-
Bo Sang, Jianfeng Zhan, Gang Lu, Haing Wang, Dongyan Xu, Lei Wang, Zhihong Zhang,
"Precise, Scalable, and Online Request Tracing for Multi-tier Services of Black
Boxes", IEEE Transactions on Parallel and Distributed Systems (TPDS), 23(6),
2012.
-
Ardalan Kangarlou, Patrick Eugster, Dongyan Xu,
"VNsnap: Taking Snapshots of Virtual Networked Infrastructures in the
Cloud",
IEEE Transactions on Services Computing (TSC), Special Issue on Cloud
Computing, 5(4), 2012.
-
Ardalan Kangarlou, Ulas Kozat, Pradeep Padala, Bob Lantz, Ken
Igarashi, Dongyan Xu,
"In-Network Live Snapshot Service for Recovering Virtual
Infrastructures",
IEEE Network, Special Issue on Cloud
Computing, 25(4), 2011.
-
Ryan Riley, Xuxian Jiang, Dongyan Xu,
"An Architectural Approach to Preventing Code Injection Attacks",
IEEE Transactions on Dependable and Secure
Computing (TDSC), Special Issue on DSN 2007, 7(4), 2010.
-
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu,
"Reverse Engineering Input Syntactic Structure from Program
Execution and Its Applications",
IEEE Transactions on Software Engineering
(TSE), 36(5),
2010.
-
Xuxian Jiang, Xinyuan Wang, Dongyan Xu,
"Stealthy Malware Detection and Monitoring
Through VMM-Based `Out of the Box' Semantic View Reconstruction",
ACM Transactions on Information and System
Security
(TISSEC), Special Issue on CCS 2007, 13(2), 2010.
-
Xuxian Jiang, Florian Buchholz, AAron Walters, Dongyan Xu, Yi-Min Wang,
Eugene H. Spafford,
"Tracing Worm Break-in and Contaminations via Process
Coloring: A Provenance-Preserving Approach",
IEEE Transactions on Parallel and Distributed Systems (TPDS),
19(7), 2008.
-
Hiroshi Yamauchi, Dongyan Xu,
"Portable Virtual Cycle Accounting for Large-Scale Distributed
Cycle Sharing Systems", Parallel Computing, Special Issue on
Large-Scale Grid,
33(4-5), 2007.
-
Xuxian Jiang, Dongyan Xu, Yi-Min Wang,
"Collapsar: A VM-Based Honeyfarm and Reverse Honeyfarm Architecture
for Network Attack Capture and Detention",
Journal of Parallel and Distributed Computing,
Special Issue on Security In Grid and Distributed Systems, 66(9),
2006 (12.2%).
-
Dongyan Xu, Sunil Kulkarni, Catherine Rosenberg, Heung-Keung Chai,
"Analysis of a CDN-P2P Hybrid Architecture for Cost-Effective
Streaming Distribution",
ACM/Springer Multimedia Systems Journal, 11(4), 2006.
-
Jen-Yeu Chen, Gopal Pandurangan, Dongyan Xu,
"Robust Computation of Aggregates in
Wireless Sensor Networks: Distributed Randomized Algorithms and
Analysis", IEEE
Transactions on Parallel and Distributed Systems, 17(9), 2006.
-
Mohamed Hefeeda, Ahsan Habib, Dongyan Xu, Bharat Bhargava,
Boyan Botev,
"CollectCast: A Peer-to-Peer Service for Media Streaming",
ACM/Springer Multimedia Systems Journal, 11(1), 2005.
-
Paul Ruth, Xuxian Jiang, Dongyan Xu, Sebastien Goasguen,
"Virtual Distributed Environments in a Shared Infrastructure",
IEEE Computer, Special Issue on Virtualization Technologies, May 2005.
-
Ahsan Habib, Dongyan Xu, Mikhail Atallah, Bharat
Bhargava, and John Chuang, "A Tree-Based Forward
Digest Protocol
to Verify Data
Integrity in Distributed Media Streaming" (short paper), IEEE
Transactions on
Knowledge and Data Engineering, 17(7), 2005.
-
Baochun Li, Dongyan Xu and Klara Nahrstedt, "An Integrated
Runtime QoS-Aware Middleware
Framework for Distributed Multimedia Applications", ACM/Springer
Multimedia Systems
Journal, Special Issue on Multimedia Middleware, 8(5), 2002
(Preliminary version also appeared in ACM Multimedia Middleware Workshop 2001).
-
Dongyan Xu, Klara Nahrstedt, Duangdao Wichadakul, "QoS and Contention Aware
Multi-Resource
Reservation", Cluster Computing, the Journal of
Networks, Software Tools and
Applications,
4(2), Springer, 2001 (Preliminary version also appeared in IEEE HPDC
2000).
-
Klara Nahrstedt, Dongyan Xu, Duangdao Wichadakul, Baochun Li, "QoS-Aware Middleware for
Ubiquitous and Heterogeneous Environments", IEEE Communications Magazine, 39(11),
2001.
-
Dongyan Xu, Klara Nahrstedt, Duangdao Wichadakul, "MeGaDiP: A
Wide-Area Media Gateway Discovery
Protocol", Information Sciences, Special Issue on Intelligent Multimedia Computing and
Networking, 141(1-2), Elsevier Science, 2002.
Technical Reports
-
Cong Xu, Sahan Gamage, Pawan N. Rao, Ardalan Kangarlou,
Ramana R. Kompella,
Dongyan Xu,
"vSlicer: Latency-Aware Virtual Machine Scheduling via
Differentiated-Frequency CPU Slicing",
Department of Computer Science Technical Report TR 12-001,
Purdue University, January 2012.
-
Sahan Gamage, Ardalan Kangarlou, Ramana Kompella, Dongyan Xu,
"Opportunistic Flooding to Improve TCP Transmit Performance in
Virtualized
Clouds", Department of Computer Science Technical Report TR 11-014,
Purdue University, April 2011.
-
Ardalan Kangarlou, Sahan Gamage, Ramana Kompella, Dongyan Xu
"vSnoop: Improving TCP Throughput in Virtualized Environments via
Acknowledgment Offload",
Department of Computer Science Technical Report TR 10-003, Purdue
University, April 2010.
-
Ardalan Kangarlou, Dongyan Xu, Patrick Eugster,
"VNsnap: Taking Snapshots of Virtual Networked Environments with
Minimal Downtime", CERIAS Technical Report TR 2008-11, Purdue
University, April 2008.
-
Ryan Riley, Xuxian Jiang, Dongyan Xu,
"Guest-Transparent Prevention of Kernel
Rootkits with VMM-based Memory
Shadowing", CERIAS Technical Report TR 2001-146, Purdue University,
January 2008.
-
Paul Ruth, Junghwan Rhee, Dongyan Xu, Rick Kennell, Sebastien Goasguen,
"Enabling Autonomic Adaptation of Virtual Computational Environments in
a Shared Distributed Infrastructure",
Department of
Computer
Science
Technical Report CSD TR 06-004, Purdue University, January 2006.
-
Xuxian Jiang, Dongyan Xu, Yi-Min Wang,
"Collapsar: A VM-Based Honeyfarm and Reverse Honeyfarm
Architecture for Network Attack Capture and Detention",
Department of
Computer
Science
Technical Report CSD TR 06-001, Purdue University, December 2005.
-
Xuxian Jiang, AAron Walters, Florian Buchholz, Dongyan Xu, Yi-Min Wang,
Eugene H. Spafford,
"Provenance-Aware Tracing of Worm Break-in and Contaminations: A
Process Coloring Approach",
Department of
Computer
Science
Technical Report CSD TR 05-028, Purdue University, May 2005.
-
Xuxian Jiang, Dongyan Xu,
"Behavioral Footprinting: a New Dimension to Characterize Self-Propagating Worms",
Department of
Computer
Science
Technical Report CSD TR 05-027, Purdue University, January 2005.
-
Xuxian Jiang, Dongyan Xu,
"CyberTrap: Detecting and Quarantining Scanning Worms in Enterprise Networks",
Department of
Computer
Science
Technical Report CSD TR 04-0xx, Purdue University, August 2004.
-
Xuxian Jiang, Dongyan Xu,
"BaitTrap: A Catering Honeypot Framework",
Department of
Computer
Science
Technical Report CSD TR 04-0xx, Purdue University, August 2004.
-
Xuxian Jiang, Dongyan Xu, Shan Lei, Paul Ruth, Jianzhong Sun,
"Worm Meets Beehive",
Department of
Computer
Science
Technical Report CSD TR 04-025, Purdue University, May 2004.
-
Xuxian Jiang, Dongyan Xu,
"VIOLIN: Virtual Internetworking on OverLay INfrastructure", Department of
Computer Science Technical Report CSD TR 03-027, Purdue University, July 2003.
Conference and Workshop Publications
-
Zhui Deng, Xiangyu Zhang, Dongyan Xu,
"BISTRO: Binary Component Extraction and Embedding for Software Security Applications,"
Proceedings of the 18th European Symposium on Research in Computer Security
(ESORICS 2013), Egham, UK, September 2013 (17.8%) (Technical Report).
-
Cong Xu, Sahan Gamage, Hui Lu, Ramana Kompella, Dongyan Xu,
"vTurbo: Accelerating Virtual Machine I/O Processing Using
Designated Turbo-Sliced Core,"
Proceedings of the USENIX Annual Technical Conference
(USENIX ATC 2013), San Jose, CA, June 2013 (14.2%).
-
Sahan Gamage, Ramana Kompella, Dongyan Xu,
"vPipe: One Pipe to Connect Them All!"
Proceedings of the 5th USENIX Workshop on Hot Topics in Cloud Computing
(HotCloud 2013), San Jose, CA, June 2013 (28.4%).
-
Zhongshu Gu, William Sumner, Zhui Deng, Xiangyu Zhang, Dongyan Xu,
"DRIP: A Framework for Purifying Trojaned Kernel Drivers,"
Proceedings of the 43rd IEEE/IFIP International Conference on
Dependable Systems and Networks
(DSN-PDS
2013), Budapest, Hungary, June 2013 (22.1%).
-
Brendan Saltaformaggio, Dongyan Xu, Xiangyu Zhang,
"BusMonitor: A Hypervisor-Based Solution for Memory Bus Covert Channels,"
Proceedings of the 6th European Workshop on Systems Security
(EuroSec
2013, in conjunction with EuroSys'13), Prague, Czech Republic, April 2013 (29.6%).
-
Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu,
"High Accuracy Attack Provenance via Binary-based Execution Partition,"
Proceedings of the 20th Network and Distributed System Security
Symposium (NDSS 2013),
San Diego, CA, February 2013 (18.8%).
-
Zhui Deng, Dongyan Xu, Xiangyu Zhang, Xuxian Jiang,
"IntroLib: Efficient and Transparent Library Call Introspection for Malware Forensics,"
Proceedings of the 12th Annual DFRWS Digital Forensics Conference (DFRWS 2012), Washington, DC, August
2012 (29.8%).
-
Cong Xu, Sahan Gamage, Pawan N. Rao, Ardalan
Kangarlou, Ramana R. Kompella,
Dongyan Xu,
"vSlicer: Latency-Aware Virtual Machine Scheduling via
Differentiated-Frequency CPU Slicing," Proceedings of the 21st ACM Symposium on
High-Performance Parallel and Distributed Computing (HPDC
2012), Delft, the Netherlands, June 2012 (16.1%).
Nominee for Best Paper and Best Presentation Awards
-
Ping Chen, Dongyan Xu, Bing Mao,
"CloudER: A Framework for Automatic Software Vulnerability Location and
Patching in the Cloud," Short Paper in
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
(ASIACCS 2012), Seoul,
Korea, May 2012 (30% full+short).
-
Zhiqiang Lin, Junghwan Rhee, Chao Wu, Xiangyu Zhang, Dongyan Xu,
"DIMSUM: Discovering Semantic Data of Interest from Un-mappable Memory with
Confidence," Proceedings of the 19th Network and Distributed System Security
Symposium (NDSS 2012),
San Diego, CA, February 2012 (17.8%).
-
Deepa Srinivasan, Zhi Wang, Xuxian Jiang, Dongyan Xu,
"Process Out-Grafting: An Efficient 'Out-of-VM' Approach for
Fine-Grained Process Execution Monitoring,"
Proceedings of the
ACM Conference on Computer and Communications Security
(CCS 2011),
Chicago, IL, October 2011 (14.0%).
-
Sahan Gamage, Ardalan Kangarlou, Ramana Kompella, Dongyan Xu,
"Opportunistic Flooding to Improve TCP Transmit Performance in
Virtualized Clouds," Proceedings of the
ACM Symposium on Cloud Computing
(SOCC 2011),
Cascais, Portugal, October 2011 (16.8%).Paper
of Distinction
-
Zhongshu Gu, Zhui Deng, Dongyan Xu, Xuxian Jiang,
"Process Implanting: A New Active Introspection Framework for
Virtualization,"
Proceedings of the IEEE Symposium on Reliable Distributed Systems
(SRDS 2011), Madrid,
Spain, October 2011 (26.1%).
-
Junghwan Rhee, Zhiqiang Lin, Dongyan Xu,
"Characterizing Kernel Malware Behavior with Kernel Data Access Patterns,"
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011), Hong Kong,
China, March 2011 (16.1%).
-
Zhiqiang Lin, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu, Xuxian Jiang,
"SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures,"
Proceedings of the 18th Network and Distributed System Security
Symposium (NDSS 2011), San Diego,
CA, February 2011 (20%).
-
Ardalan Kangarlou, Sahan Gamage, Ramana Kompella, Dongyan Xu,
"vSnoop: Improving TCP Throughput in Virtualized Environments via
Acknowledgment Offload,"
Proceedings of the ACM/IEEE Supercomputing Conference 2010
(SC10), New Orleans,
LA, November 2010 (20%).Best Student
Paper Finalist
-
Sina Bahram, Xuxian Jiang, Zhi Wang, Mike Grace, Jinku Li, Deepa
Srinivasan, Junghwan Rhee, Dongyan Xu, "DKSM:
Subverting Virtual Machine
Introspection for Fun and Profit," Proceedings of the 29th IEEE
International Symposium on Reliable Distributed Systems (SRDS
2010), New Delhi, India, October 2010 (22.6%).
-
Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jiang,
"Kernel Malware Analysis with Un-tampered and Temporal Views of
Dynamic Kernel Memory,"
Proceedings of the 13th International Symposium on Recent Advances in
Intrusion Detection
(RAID 2010), Ottawa, Canada,
September
2010 (23.1%).
-
Tao Bao, Yunhui Zheng, Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu, "Strict
Control Dependence and its Effect on Dynamic Information Flow
Analyses,"
Proceedings of the International Symposium on Software
Testing and Analysis (ISSTA
2010), Trento, Italy, July 2010 (23%).
-
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu,
"Reuse-Oriented Camouflaging Trojan: Vulnerability Detection and
Attack Construction,"
Proceedings of the 40th IEEE/IFIP International Conference on
Dependable Systems and Networks
(DSN-DCCS
2010), Chicago, IL, June 2010 (23.2%).
-
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu,
"Automatic Reverse Engineering of Data Structures from Binary
Execution,"
Proceedings of the 17th Network and Distributed System Security
Symposium
(NDSS
2010), San Diego, CA, February 2010 (15.4%).
-
Zhiqiang Lin, Ryan Riley, Dongyan Xu,
"Polymorphing Software by Randomizing Data Structure Layout,"
Proceedings of SIG SIDAR Conference on
Detection of Intrusions and Malware and Vulnerability Assessment
(DIMVA
2009), Milan, Italy, July 2009 (29.5%).
-
Ardalan Kangarlou, Patrick Eugster, Dongyan Xu,
"VNsnap: Taking Snapshots of Virtual Networked Environments with Minimal
Downtime,"
Proceedings of the 39th IEEE/IFIP International Conference on
Dependable
Systems and Networks
(DSN-DCCS
2009), Estoril, Portugal, June 2009 (19.6%).
-
Ryan Riley, Xuxian Jiang, Dongyan Xu,
"Multi-Aspect Profiling of Kernel Rootkit Behavior,"
Proceedings of the 4th European Conference on Computer Systems
(EuroSys
2009),
Nuremberg, Germany, April 2009 (16.9%).
-
Junghwan Rhee, Ryan Riley, Xuxian Jiang, Dongyan Xu,
"Defeating Dynamic Data Kernel Rootkit Attacks via VMM-based Guest
Transparent Monitoring",
Proceedings of 4th International Conference on Availability,
Reliability and Security
(ARES 2009),
Fukuoka, Japan, March 2009 (25%).
-
Ryan Riley, Xuxian Jiang, Dongyan Xu,
"Guest-Transparent
Prevention of Kernel Rootkits with VMM-based Memory Shadowing",
Proceedings of 11th International Symposium on Recent Advances in Intrusion
Detection
(RAID 2008),
Boston, MA, September 2008 (25%).
Best Paper Award
-
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu,
"Convicting Exploitable Software Vulnerabilities: An Efficient Input
Provenance Based
Approach",
Proceedings of the 38th IEEE/IFIP International Conference on
Dependable
Systems and Networks
(DSN-DCCS
2008),
Anchorage, AK, June 2008 (23%).
-
Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Xiangyu Zhang,
"Automatic Protocol Format Reverse Engineering through Context-Aware
Monitored Execution",
Proceedings of the 15th Network and Distributed System Security
Symposium (NDSS
2008), San Diego, CA, February 2008 (17.8%).
-
Ardalan Kangarlou, Paul Ruth, Dongyan Xu, Patrick Eugster, "Taking Snapshots of Virtual Networked
Environments",
Proceedings of IEEE International Workshop on
Virtualization Technology in Distributed Computing
(VTDC 2007, in
conjunction with SC07), Reno,
NV, November 2007.
-
Xuxian Jiang, Xinyuan Wang, Dongyan Xu,
"Stealthy Malware Detection Through VMM-Based "Out-of-the-Box"
Semantic View Reconstruction",
Proceedings of ACM Conference on Computer and Communications Security
(CCS
2007), Alexandria, VA, November 2007 (18%).
-
Xuxian Jiang, Helen J. Wang, Dongyan Xu, Yi-Min Wang,
"RandSys: Thwarting Code Injection Attacks with System Service
Interface Randomization",
Proceedings of IEEE International Symposium on Reliable Distributed Systems
(SRDS
2007), Beijing, China, October 2007 (15%).
-
Ryan Riley, Xuxian Jiang, Dongyan Xu,
"An Architectural Approach to Preventing Code Injection Attacks",
Proceedings of the 37th IEEE/IFIP International Conference on
Dependable
Systems and Networks
(DSN-DCCS
2007),
Edinburgh, UK, June 2007 (25%).
-
Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Bing Mao, Li Xie,
"AutoPaG: Towards Automated Software Patch Generation with Source
Code Root Cause Identification and Repair",
Proceedings of ACM Symposium on InformAtion, Computer and
Communications Security
(ASIACCS
2007),
Singapore, March 2007 (17.6%).
-
Xuxian Jiang, Dongyan Xu,
"Profiling Self-Propagating Worms via Behavioral Footprinting",
Proceedings of ACM Workshop on Recurring Malcode
(WORM
2006, in conjunction with
ACM CCS-13), Fairfax, VA,
November 2006 (30%).
-
Xuxian Jiang, AAron Walters, Florian Buchholz, Dongyan Xu, Yi-Min Wang,
Eugene H. Spafford,
"Provenance-Aware Tracing of Worm Break-in and Contaminations: A
Process Coloring Approach",
Proceedings of IEEE International Conference on Distributed
Computing Systems
(ICDCS 2006), Lisboa, Portugal,
July 2006 (13.9%).
-
Dongyan Xu, Paul Ruth, Junghwan Rhee, Rick Kennell, Sebastien Goasguen,
"Short Paper: Autonomic Adaptation of Virtual Distributed Environments
in a Multi-Domain Infrastructure",
Proceedings of IEEE International Symposium on High Performance
Distributed Computing, "Hot Topics" Session
(HPDC-15),
Paris, France, June 2006 (6/43).
Talk given
by Ryan
Riley
.