发表论文
[1] 韩天硕, 龚晓锐, 刘剑. CARDSHARK: Understanding and Stablizing Linux Kernel Concurrency Bugs Against the Odds. Usenix Security. 2024, 第 2 作者null(null): [2] Wang, Xiaoyu, Yang, Xiaobo, Liang, Xueping, Zhang, Xiu, Zhang, Wei, Gong, Xiaorui. Combating alert fatigue with AlertPro: Context-aware alert prioritization using reinforcement learning for multi-step attack detection. COMPUTERS & SECURITY[J]. 2024, 第 6 作者137: http://dx.doi.org/10.1016/j.cose.2023.103583.[3] Xiaobo Xiang, Yue Jiang, Qingli Guo, Xiu Zhang, Xiaorui Gong, Baoxu Liu. AppChainer:investigating the chainability among payloads in android applications. CYBERSECURITY[J]. 2023, 第 5 作者6(4): 1-19, http://lib.cqvip.com/Qikan/Article/Detail?id=7111224299.[4] SANER. 2023, 第 6 作者[5] ESORICS. 2023, 第 6 作者[6] 杨灿, Xu, Zhengzi, Chen, Hongxu, Liu, Yang, 龚晓锐, 刘宝旭. ModX: Binary Level Partially Imported Third-Party Library Detection via Program Modularization and Semantic Matching. ICSE. 2022, 第 5 作者[7] 顾芳铭, 郭青丽, 李炼, 彭峙酿, 林巍, 杨晓波, 龚晓锐. COMRACE: Detecting Data Race Vulnerabilities in COM Objects. Usenix Security. 2022, 第 7 作者[8] ACM CCS. 2021, 通讯作者 [9] 龚晓锐, 张超. 前言. 信息安全学报[J]. 2020, 第 1 作者5(4): 0-0, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20200401&flag=1.[10] 章秀, 刘宝旭, 龚晓锐, 于磊, 宋振宇. Explore-Exploit:一种模拟真实网络渗透场景的安全竞赛. 信息安全学报[J]. 2020, 第 3 作者5(4): 55-71, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20200406&flag=1.[11] Jiang Haofeng, Gong Xiaorui, IEEE. Wi-Fi Secure Access Control System Based on Geo-fence. 2019 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC). 2019, 第 2 作者 通讯作者 744-749, [12] Wang, Yan, Wu, Wei, Zhang, Chao, Xing, Xinyu, Gong, Xiaorui, Zou, Wei. From proof-of-concept to exploitable: (One step towards automatic exploitability assessment). CYBERSECURITY[J]. 2019, 第 5 作者 通讯作者 2(1): http://dx.doi.org/10.1186/s42400-019-0028-9.[13] Luo, Mengxia, Yang, Can, Gong, Xiaorui, Yu, Lei, Chen, S, Choo, KKR, Fu, X, Lou, W, Mohaisen, A. FuncNet: A Euclidean Embedding Approach for Lightweight Cross-platform Binary Recognition. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT I. 2019, 第 3 作者 通讯作者 304: 319-337, [14] 刘宁逸, 龚晓锐, 霍玮, 宋振宇. 网络场景背景流量管理系统的设计与实现. 2nd International Conference on Advances in Energy, Environment and Chemical Science (AEECS 2018). 2018, 第 2 作者[15] 郭璇, 龚晓锐, 汪秋云, 凌辰. 基于攻击指示器的木马检测系统研究与实现. 计算机应用与软件[J]. 2018, 第 2 作者35(8): 320-323, http://lib.cqvip.com/Qikan/Article/Detail?id=676074174.[16] Wang, Yan, Zhang, Chao, Xiang, Xiaobo, Zhao, Zixuan, Li, Wenjie, Gong, Xiaorui, Liu, Bingchang, Chen, Kaixiang, Zou, Wei, ACM. Revery: From Proof-of-Concept to Exploitable (One Step towards Automatic Exploit Generation). PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18). 2018, 第 6 作者 通讯作者 1914-1927, http://dx.doi.org/10.1145/3243734.3243847.[17] Wu Wei, Chen Yueqi, Xu Jun, Xing Xinyu, Gong Xiaorui, Zou Wei, USENIX Assoc. FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities. PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM. 2018, 第 5 作者 通讯作者 781-797, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000485139900046.[18] 杨梅芳, 霍玮, 邹燕燕, 尹嘉伟, 刘宝旭, 龚晓锐, 贾晓启, 邹维. 可编程模糊测试技术. 软件学报[J]. 2018, 第 6 作者29(5): 1258-1274, http://lib.cqvip.com/Qikan/Article/Detail?id=675240626.[19] 霍玮, 戴戈, 史记, 龚晓锐, 贾晓启, 宋振宇, 刘宝旭, 邹维. 基于模式生成的浏览器模糊测试技术. 软件学报[J]. 2018, 第 4 作者29(5): 1275-1287, http://lib.cqvip.com/Qikan/Article/Detail?id=675240627.[20] 张婵娟, 龚晓锐, 宋振宇. DRDoS攻击流量多态克隆过程中流量特征构建方法研究. The 2018 2nd International Conference on Advances in Energy, Environment and Chemical Science (AEECS 2018)[J]. 2018, 第 2 作者[21] 章秀, 刘宝旭, 龚晓锐, 宋振宇. State-of-the-Art: Security Competition in Talent Education. International Conference on Information Security and Cryptology (INSCRYPT 2017). 2017, 第 3 作者[22] 杨广亮, 龚晓锐, 姚刚, 韩心慧. 一个面向Android的隐私泄露检测系统. 计算机工程[J]. 2012, 第 2 作者38(23): 1-6, http://lib.cqvip.com/Qikan/Article/Detail?id=44299671.[23] 韩心慧, 龚晓锐, 诸葛建伟, 邹磊, 邹维. 基于频繁子树挖掘算法的网页木马检测技术. 清华大学学报:自然科学版[J]. 2011, 第 2 作者51(10): 1312-1317, http://lib.cqvip.com/Qikan/Article/Detail?id=39550918.[24] 邹维, 陈昱, 张建宇, 韦韬, 龚晓锐, 韩心慧. 系统安全中的科学问题. 中国信息安全[J]. 2011, 第 5 作者32-35, http://lib.cqvip.com/Qikan/Article/Detail?id=67737883504849494949485055.