关注
Chengcheng Xiang
Chengcheng Xiang
在 ucsd.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Towards continuous access control validation and forensics
C Xiang, Y Wu, B Shen, M Shen, H Huang, T Xu, Y Zhou, C Moore, X Jin, ...
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
472019
ForenVisor: A tool for acquiring and preserving reliable data in cloud live forensics
Z Qi, C Xiang, R Ma, J Li, H Guan, DSL Wei
IEEE Transactions on Cloud Computing 5 (3), 443-456, 2016
472016
Can systems explain permissions better? understanding users' misperceptions under smartphone runtime permission model
B Shen, L Wei, C Xiang, Y Wu, M Shen, Y Zhou, X Jin
30th USENIX Security Symposium (USENIX Security 21), 751-768, 2021
382021
PracExtractor: Extracting Configuration Good Practices from Manuals to Detect Server Misconfigurations
C Xiang, H Huang, A Yoo, Y Zhou, S Pasupathy
2020 USENIX Annual Technical Conference (USENIX ATC 20), 265-280, 2020
232020
An automation-assisted empirical study on lock usage for concurrent programs
R Xin, Z Qi, S Huang, C Xiang, Y Zheng, Y Wang, H Guan
2013 IEEE International Conference on Software Maintenance, 100-109, 2013
142013
A virtualization based monitoring system for mini-intrusive live forensics
X Zhong, C Xiang, M Yu, Z Qi, H Guan
International Journal of Parallel Programming 43, 455-471, 2015
132015
Flexible and extensible runtime verification for Java (Extended Version)
C Xiang, Z Qi, W Binder
International Journal of Software Engineering and Knowledge Engineering 25 …, 2015
62015
Detecting Access Control Misconfigurations with Change Validation
C Xiang
University of California, San Diego, 2021
52021
PYLIVE:On-the-Fly Code Change for Python-based Online Services
H Huang, C Xiang, L Zhong, Y Zhou
2021 USENIX Annual Technical Conference (USENIX ATC 21), 349-363, 2021
32021
Effective Bug Detection with Unused Definitions
L Zhong, C Xiang, H Huang, B Shen, E Mugnier, Y Zhou
Proceedings of the Nineteenth European Conference on Computer Systems, 720-735, 2024
2024
Flexible and Extensible Runtime Verification for Java.
C Xiang, Z Qi, W Binder
SEKE, 595-600, 2015
2015
系统目前无法执行此操作,请稍后再试。
文章 1–11