Publications

My Publication Word Cloud

COPYRIGHT: The following materials are copyrighted by the corresponding publishers (e.g., ACM, IEEE, Springer Verlag). You can download them only if you accept and obey the terms and restrictions defined by the respective publishers. The online version may be older than the printed version available at the respective publisher’s website.

You can also find my publications at Google Scholar and DBLP.


Go to: Patent | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | Before 2015


2024

Shaofei Li, Feng Dong, Ding Li, Xusheng Xiao, Haoyu Wang, Fei Shao, Jiedong Chen, Yao Guo, and Xiangqun Chen
NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation
In Proceedings of the Network and Distributed System Security Symposium (NDSS 2024), San Diego, California, USA, Feb-Mar 2024. [PDF]

Haodong Li, Guosheng Xu, Liu Wang, Xusheng Xiao, Xiapu Luo, Guohai Xu, and Haoyu Wang
MalCertain: Enhancing Deep Neural Network Based Android Malware Detection by Tackling Prediction Uncertainty
In Proceedings of the IEEE/ACM International Conference on Software Engineering (ICSE 2024), Lisbon, Portugal, April 2024. [PDF]

2023

Feng Dong, Shaofei Li, Peng Jiang, Ding Li, Haoyu Wang, Liangyi Huang, Xusheng Xiao, Jiedong Chen, Xiapu Luo, Yao Guo, and Xiangqun Chen
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools
In Proceedings of the 30th ACM Conference on Computer and Communications Security (CCS 2023), Copenhagen, Denmark, Nov 2023. [PDF]

Pengcheng Fang, Zhenhua Zou, Xusheng Xiao, and Zhuotao Liu
iSyn: Semi-Automated Smart Contract Synthesis from Legal Financial Agreements
In Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2023), Seattle, WA, USA, July 2023. [PDF]

Feng Dong, Liu Wang, Xu Nie, Fei Shao, Haoyu Wang, Ding Li, Xiapu Luo, and Xusheng Xiao
DISTDET: A Cost-Effective Distributed Cyber Threat Detection System
In Proceedings of the USENIX Security Symposium (USENIX Security 2023), Anaheim, CA, USA, May 2023. [PDF]

Zhaohan Xi, Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Xiapu Luo, Xusheng Xiao, Fenglong Ma, and Ting Wang
On the Security Risks of Knowledge Graph Reasoning
In Proceedings of the USENIX Security Symposium (USENIX Security 2023), Anaheim, CA, USA, May 2023. [PDF]

Shi Meng, Liu Wang, Shenao Wang, Kailong Wang, Xusheng Xiao, Guangdong Bai, and Haoyu Wang
WeMinT: Tainting Sensitive Data Leaks in WeChat Mini-Programs
In Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering (ASE 2023), Kirchberg, Luxembourg, Sep 2023. [PDF]

Le Yu, Haoyu Wang, Xiapu Luo, Tao Zhang, Kang Liu, Jiachi Chen, Hao Zhou, Yutian Tang, and Xusheng Xiao
Towards Automatically Localizing Function Errors in Mobile Apps with User Reviews
IEEE Transactions on Software Engineering, 49(4): 1464-1486, 2023. [PDF]

Zhongyu Ouyang, Shifu Hou, Shang Ma, Chaoran Chen, Chunhui Zhang, Toby Li, Xusheng Xiao, Chuxu Zhang, and Yanfang Ye
Prompt Learning Unlocked for App Promotion in the Wild
In Proceedings of the NeurIPS 2023 Workshop: New Frontiers in Graph Learning (GLFrontiers 2023), New Orleans, Louisiana, USA, Dec 2023. [PDF]

Yi Liu, Yun Ma, Xusheng Xiao, Tao Xie, and Xuanzhe Liu
LegoDroid : Flexible Android Apps Decomposition and Instant Installation
Science China Information Sciences, 66 (4): 1-19, 2023. [PDF]

2022

Shao Yang, Yuehan Wang, Yuan Yao, Haoyu Wang, Yanfang (Fanny) Ye, and Xusheng Xiao
DescribeCtx: Context-Aware Description Synthesis for Sensitive Behaviors in Mobile Apps
In Proceedings of the IEEE/ACM International Conference on Software Engineering (ICSE 2022), Pittsburgh, PA, May 2022. [PDF][Project Website]

Changlin Liu, Hanlin Wang, Tianming Liu, Diandian Gu, Yun Ma, Haoyu Wang, and Xusheng Xiao
Promal: Precise Window Transition Graphs for Android via Synergy of Program Analysis and Machine Learning
In Proceedings of the IEEE/ACM International Conference on Software Engineering (ICSE 2022), Pittsburgh, PA, May 2022. [PDF][Project Website]

Zhiqiang Xu, Pengcheng Fang, Changlin Liu, Xusheng Xiao, Yu Wen, and Dan Meng
DepComm: Graph Summarization on System Audit Logs for Attack Investigation
In Proceedings of the IEEE Symposium on Security and Privacy (IEEE S & P 2022), San Francisco, CA, USA, May 2022. [PDF][Project Website]

Pengcheng Fang*, Peng Gao*, Changlin Liu, Erman Ayday, Kangkook Jee, Ting Wang, Yanfang (Fanny) Ye, Zhuotao Liu, and Xusheng Xiao
Back-Propagating System Dependency Impact for Attack Investigation
In Proceedings of the USENIX Security Symposium (USENIX Security 2022), Boston, MA, USA, Aug 2022. [PDF][Project Website][Artifact Evaluation][Zenodo Repo]

Pengcheng Xia, Haoyu Wang, Weihang Su, Zhou Yu, Xiapu Luo, Chao Zhang, Xusheng Xiao, and Guoai Xu
Trade or Trick? Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange
In Proceedings of the ACM SIGMETRICS / IFIP Performance (SIGMETRICS 2022), Mumbai, India, June 2022. [PDF]

Guosheng Xu, Siyi Li, Hao Zhou, Shucen Liu, Yutian Tang, Li Li, Xiapu Luo, Xusheng Xiao, Guoai Xu, and Haoyu Wang
Lie to Me: Abusing the Mobile Content Sharing Service for Fun and Profit
In Proceedings of the ACM Web Conference 2022 (WWW 2022), Lyon, France, April 2022. [PDF]

Zikan Dong, Hongxuan Liu, Liu Wang, Xiapu Luo, Yao Guo, Guoai Xu, Xusheng Xiao, and Haoyu Wang
What Did You Pack in My App? A Systematic Analysis of Commercial Android Packers
In Proceedings of the ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2022), Industry Track, Singapore, Nov 2022. [PDF]

Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Qi Li, and Yih-Chun Hu
Making Web 3.0 Connected - A Perspective from Interoperability and Programmability across Blockchains
IEEE Transactions on Dependable and Secure Computing (TDSC), 19(5): 2965-2981, 2022. [PDF]

Liangyi Huang, Sophia Hall, Fei Shao, Arafath Nihar, Vipin Chaudhary, Yinghui Wu, Roger French, and Xusheng Xiao
System-Auditing, Data Analysis and Characteristics of Cyber Attacks for Big Data Systems
In Proceedings of the Conference on Information and Knowledge Management (CIKM), Demo Track, Hybrid Conference, Atlanta, Georgia, USA, 2022. [PDF]

William C Oltjen, Yangxin Fan, Jiqi Liu, Liangyi Huang, Xuanji Yu, Mengjie Li, Hubert Seigneur, Xusheng Xiao, Kristopher O Davis, Laura S Bruckman, Yinghui Wu, and Roger H French
FAIRification, Quality Assessment, and Missingness Pattern Discovery for Spatiotemporal Photovoltaic Data
In Proceedings of the IEEE Photovoltaics Specialists Conference (PVSC), San Juan, Puerto Rico, 2022. [PDF]

2021

Fei Shao, Rui Xu, Wasif Haque, Jingwei Xu, Ying Zhang, Wei Yang, Yanfang Ye, and Xusheng Xiao
WebEvo: Taming Web Application Evolution via Detecting Semantic Structure Change
In Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2021), Virtual, July 2021. [PDF][Project Website][Artifact Evaluation].

Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev Kulkarni, and Dawn Song
Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
In Proceedings of the 37th IEEE International Conference on Data Engineering (ICDE 2021), Virtual, April 2021. [PDF].

Yangyu Hu, Haoyu Wang, Tiantong Ji, Xusheng Xiao, Xiapu Luo, Peng Gao, and Yao Guo
CHAMP: Characterizing Undesired App Behaviors from User Comments based on Market Policies
In Proceedings of the 43rd International Conference on Software Engineering (ICSE 2021), Madrid, Spain, May 2021. [PDF]

Shifa Zhong, Kai Zhang, Majid Bagheri, Joel G. Burken, April Gu, Baikun Li, Xingmao Ma, Babetta L. Marrone, Zhiyong Jason Ren, Joshua Schrier, Wei Shi, Haoyue Tan, Tianbao Wang, Xu Wang, Bryan M. Wong, Xusheng Xiao, Xiong Yu, Jun-Jie Zhu, and Huichun Zhang
Machine learning: New ideas and tools in Environmental Science and Engineering
Invited feature article in Environment Science & Technology, 55(19): 12741-12754, 2021. [DOI][PDF]

Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Haoyuan Liu, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev Kulkarni, and Dawn Song
A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence
In Proceedings of the 37th IEEE International Conference on Data Engineering (ICDE 2021), Demo Track, Virtual, April 2021. [PDF].

2020

Jiaping Gui, Ding Li, Zhengzhang Chen, Junghwan Rhee, Xusheng Xiao, Mu Zhang, Kangkook Jee, Zhichun Li, and Haifeng Chen
APTrace: A Responsive System for Agile Enterprise Level Causality Analysis
In Proceedings of the 36th IEEE International Conference on Data Engineering (ICDE 2020), Industry and Application Track, Dallas, TX, April 2020. [PDF]

Yujie Fan, Yanfang Ye, Qian Peng, Jianfei Zhang, Yiming Zhang, Xusheng Xiao, Chuan Shi, Qi Xiong, Fudong Shao, and Liang Zhao
Metagraph Aggregated Heterogeneous Graph Neural Network for Illicit Traded Product Identification in Underground Market
In Proceedings of the 20th IEEE International Conference on Data Mining (ICDM 2020), Sorrento, Italy, Nov 2020. [PDF]

Yiming Zhang, Yujie Fan, Shifu Hou, Yanfang Ye, Xusheng Xiao, Pan Li, Chuan Shi, Liang Zhao, Shouhuai Xu
Cyber-guided Deep Neural Network for Malicious Repository Detection in GitHub
In Proceedings of the 11th IEEE International Conference on Knowledge Graph (ICKG 2020), Nanjing, China, Aug 2020. [PDF]

Peng Gao, Xusheng Xiao, Ding Li, Kangkook Jee, Haifeng Chen, Sanjeev R. Kulkarni, and Prateek Mittal
Querying Streaming System Monitoring Data for Enterprise System Anomaly Detection
In Proceedings of the 36th IEEE International Conference on Data Engineering (ICDE 2020), Demo Track, Dallas, TX, April 2020. [PDF]

Jian Liu, Xusheng Xiao, Lihua Xu, Liang Dou, and Andy Podgurski
DroidMutator: An Effective Mutation Analysis Tool for Android Applications
In Proceedings of the 42nd International Conference on Software Engineering (ICSE 2020), Demo Track, Seoul, South Korea, May 2020. [PDF].

2019

Shengqu Xi*, Shao Yang*, Xusheng Xiao, Yuan Yao, Yayuan Xiong, Fengyuan Xu, Haoyu Wang, Peng Gao, Zhuotao Liu, Feng Xu, and Jian Lu
DeepIntent : Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps
In Proceedings of the 26th ACM Conference on Computer and Communications Security (CCS 2019), London, UK, Nov 2019. [PDF] (Acceptance Rate: 16.2%, 117 out of 722)

Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, and Yih-Chun Hu
HyperService: Interoperability and Programmability across Heterogeneous Blockchains
In Proceedings of the 26th ACM Conference on Computer and Communications Security (CCS 2019), London, UK, Nov 2019. [PDF] (Acceptance Rate: 16.2%, 117 out of 722)

Xusheng Xiao, Xiaoyin Wang, Zhihao Cao, Hanlin Wang, and Peng Gao
IconIntent: Automatic Identification of Sensitive UI Widgets based on Icon Classification for Android Apps
In Proceedings of the 41st ACM/IEEE International Conference on Software Engineering (ICSE 2019), Montreal, Canada, May 2019. [PDF] (Acceptance Rate: 20.6%, 109 out of 529)

Zhilei Ren, Changlin Liu, Xusheng Xiao, He Jiang and Tao Xie
Root Cause Localization for Unreproducible Builds via Causality Analysis over System Call Tracing
In Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), San Diego, CA, USA, Nov 2019. [PDF] (Acceptance Rate: 20.9%, 93 out of 445)

Haoyu Wang, Hongxuan Liu, Xusheng Xiao, Guozhu Meng and Yao Guo
Characterizing Android App Signing Issues
In Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), San Diego, CA, USA, Nov 2019. [PDF] (Acceptance Rate: 20.9%, 93 out of 445)

Jiaping Gui, Xusheng Xiao, Ding Li, Chung Hwan Kim, and Haifeng Chen
Progressive Processing of System Behavioral Query
In Proceedings of the Annual Computer Security Applications Conference (ACSAC 2019), San Juan, Puerto Rico, Dec 2019. [PDF]

Yun Ma, Yangyang Huang, Ziniu Hu, Xusheng Xiao, and Xuanzhe Liu
Paladin: Automated Generation of Reproducible Test Cases for Android Apps
In Proceedings of the 20th Workshop on Mobile Computing Systems and Applications (HotMobile 2019), Santa Cruz, CA, USA, Feb 2019. [PDF]

Xia Zhang, Xusheng Xiao, Liang He, Yun Ma, Yangyang Huang, Xuanzhe Liu, Wenyao Xu, and Cong Liu
PIFA: An Intelligent Phase Identification and Frequency Adjustment Framework for Time-Sensitive Mobile Computing
In Proceedings of the 25th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2019), Montreal, Canada, April 2019. [PDF]

Shengqu Xi, Yuan Yao, Xusheng Xiao, Feng Xu, and Jian Lu
Bug Triaging Based on Tossing Sequence Modeling
Journal of Computer Science and Technology (JCST), 2019.

Peng Gao, Xusheng Xiao, Zhichun Li, Kangkook Jee, Fengyuan Xu, Sanjeev R. Kulkarni, and Prateek Mittal
A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security
In Proceedings of the 45th International Conference on Very Large Data Bases (VLDB 2019), Demonstrations Track, Los Angelos, CA, USA, Aug 2019. [PDF][Demo Website] (Acceptance Rate: 37.8%, 48 out of 127).

2018

Peng Gao, Xusheng Xiao, Ding Li, Zhichun Li, Kangkook Jee, Zhenyu Wu, Chung Hwan Kim, Sanjeev R. Kulkarni, and Prateek Mittal
SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection
In Proceedings of the USENIX Security Symposium (USENIX Security 2018), Boston, MA, USA, July 2018. [PDF][Website] [Presentation Video] [Poster][Demo Video] (Acceptance Rate: 19.2%, 100 out of 520)

Yutao Tang, Ding Li, Zhichun Li, Mu Zhang, Kangkook Jee, Xusheng Xiao, Zhenyu Wu, Junghwan Rhee, Fengyuan Xu, and Qun Li
NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis
In Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS 2018), Toronto, Canada, Oct 2018. [PDF] (Acceptance Rate: 16.6%, 134 out of 809)

Peng Gao, Xusheng Xiao, Zhichun Li, Kangkook Jee, Fengyuan Xu, Sanjeev R. Kulkarni, and Prateek Mittal
AIQL: Enabling Efficient Attack Investigation from System Monitoring Data
In Proceedings of the USENIX Annual Technical Conference (USENIX ATC 2018), Boston, MA, USA, July 2018. [PDF][Poster][Project Website][Demo Website] (Acceptance Rate: 20.9%, 79 out of 378)

Patrick Morrison, Rahul Pandita, Xusheng Xiao, Ram Chillarege, Laurie Williams
Are Vulnerabilities Discovered and Resolved Like Other Defects?
In Proceedings of the 37th International Conference on Software Engineering (ICSE 2018), Journal First Paper, Gothenburg, Sweden, May 2018

Angello Astorga, Siwakorn Srisakaokul, Xusheng Xiao, and Tao Xie
PreInfer: Automatic Inference of Preconditions via Symbolic Analysis
In Proceedings of the 48th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2018), Luxembourg, June 2018. [PDF] (Acceptance Rate: 28.1%, 62 out of 221)

Jiayi Cao, Angello Astorga, Siwakorn Srisakaokul, Zhengkai Wu, Xueqing Liu, Xusheng Xiao, and Tao Xie
Visualizing Path Exploration to Assist Problem Diagnosis for Structural Test Generation
In Proceedings of the IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2018), Posters, Lisbon, Portugal, October 2018. [PDF]

2017

Patrick Morrison, Rahul Pandita, Xusheng Xiao, Ram Chillarege, Laurie Williams
Are Vulnerabilities Discovered and Resolved Like Other Defects?
Empirical Software Engineering (EMSE), 23(3): 1383–1421, 2017.

Yujie Yuan, Lihua Xu, Xusheng Xiao, Andy Podguiski, Huibiao Zhu
RunDroid: Recovering Excution Call Graph for Android Applications
In Proceedings of the 11th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE 2017), Demonstrations Track, pages 949-953, Paderborn, Germany, September 2017. [PDF][Code][Video]

Zheng Dong, Yuchuan Liu, Husheng Zhou, Xusheng Xiao, Yu Gu, Lingming Zhang and Cong Liu
An Energy-efficient Offloading Framework with Predictable Temporal Correctness
In ACM/IEEE Symposium on Edge Computing (SEC), San Jose, CA, October, 2017. [PDF]

Dengfeng Li, Wing Lam, Wei Yang, Zhengkai Wu, Xusheng Xiao, Tao Xie
Towards Privacy-Preserving Mobile Apps: A Balancing Act
In Proceedings of the Symposium and Bootcamp on the Science of Security (HotSoS 2017), Hanover, Maryland, April 2017. [PDF]

2016

Zhang Xu, Zhenyu Wu, Zhichun Li, Kangkook Jee, Junghwan Rhee, Xusheng Xiao, Fengyuan Xu, Haining Wang, and Guofei Jiang
High Fidelity Data Reduction for Big Data Security Dependency Analyses
In Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS 2016), pages 504-516, Vienna, Austria, October 2016. [PDF] (Acceptance Rate: 18.1%, 151 out of 836).

Bo Zong, Xusheng Xiao, Zhichun Li, Zhenyu Wu, Zhiyun Qian, Xifeng Yan, Ambuj K. Singh, and Guofei Jiang
Behavior Query Discovery in System-Generated Temporal Graphs
In Proceedings of 42nd International Conference on Very Large Data Bases (VLDB 2016), pages 240-251, New Delhi, India, September 2016. [PDF][arXiv]

Sihan Li, Xusheng Xiao, Blake Bassett, Tao Xie, and Nikolai Tillmann
Measuring Code Behavioral Similarity for Programming and Software Engineering Education
In International Conference on Software Engineering (ICSE 2016), Education Track, pages 501-510, May 2016. [PDF]

Xusheng Xiao, Jian-Guang Lou, Shan Lu, David C. Shepherd, Xin Peng, and Qianxiang Wang
Roundtable: Research Opportunities and Challenges for Large-Scale Software Systems
Journal of Computer Science and Technology (JCST), 31(5): 851-860, 2016. [PDF]

Wei Yang, Xusheng Xiao, Dengfeng Li, Huoran Li, Xuanzhe Liu, Haoyu Wang, Yao Guo, and Tao Xie
Security Analytics for Mobile Apps: Achievements and Challenges
Journal of Cyber Security (in Chinese), 1(2): 1-14, April 2016. [PDF]

Qing Gao, Xusheng Xiao, Jun Li, Yingfei Xiong, Kuanl Taneja, Dan Hao, Lu Zhang, and Tao Xie
High-Confidence Software Evolution
Science China Information Sciences (SCIS), 59 (7): 071101:1-071101:19, 2016.

2015

Jianjun Huang, Zhichun Li, Xusheng Xiao, Zhenyu Wu, Kangjie Lu, Xiangyu Zhang, and Guofei Jiang
SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps
In Proceedings of the 24th USENIX Security Symposium (USENIX Security 2015), pages 977-992, Washington, D.C., August 2015. [PDF] (Acceptance Rate: 15.7%, 67 out of 426).

Wei Yang, Xusheng Xiao, Benjamin Andow, Sihan Li, Tao Xie, and William Enck
AppContext: Differentiating Malicious and Benign Mobile App Behaviors Under Context
In Proceedings of the 37th International Conference on Software Engineering (ICSE 2015), pages 303-313, Florence, Italy, May 2015. [PDF] (Acceptance Rate: 18.5%, 84 out of 452).

Xusheng Xiao, Nikolai Tillmann, Manuel Fahndrich, Jonathan de Halleux, Michal Moskal, and Tao Xie
User-Aware Privacy Control via Extended Static-Information-Flow Analysis
Automated Software Engineering Journal (ASEJ), 22(3): 333-366, 2015. [PDF]. A previous version appeared in Proceedings of ASE 2012.

Before 2015

Xusheng Xiao, Gogul Balakrishnan, Franjo Ivancic, Naoto Maeda, Aarti Gupta and Deepak Chhetri
ARC++: Effective Typestate and Lifetime Dependency Analysis
In Proceedings of the 2014 International Symposium on Software Testing and Analysis (ISSTA 2014), pages 116-126, Bay Area, California, July 2014. [PDF] (Acceptance Rate: 28.1%, 36 out of 128)

John Slankas, Xusheng Xiao, Laurie Williams, and Tao Xie
Relation Extraction for Inferring Access Control Rules from Natural Language Artifacts
In Proceedings of the 2014 Annual Computer Security Applications Conference (ACSAC 2014), pages 366-375, New Orleans, Louisiana, USA, December 2014. [PDF]

Tao Xie, Lu Zhang, Xusheng Xiao, Yingfei Xiong, and Dan Hao
Cooperative Software Testing and Analysis: Advances and Challenges
Journal of Computer Science and Technology (JCST), 29(4): 713-723, 2014. [PDF]

Wei Yang, Xusheng Xiao, Rahul Pandita, William Enck and Tao Xie
Improving Mobile Application Security via Bridging User Expectations and Application Behaviors
ACM Symposium and Bootcamp on the Science of Security (HotSoS), Raleigh, NC, April 2014. [PDF]

Xusheng Xiao, Shi Han, Tao Xie, and Dongmei Zhang
Context-Sensitive Delta Inference for Identifying Workload-Dependent Performance Bottlenecks

In Proceedings of the 2013 International Symposium on Software Testing and Analysis (ISSTA 2013), pages 90-100, Lugano Switzerland, July 2013. [PDF] (Acceptance Rate: 32 / 124 = 25.8%)

Xusheng Xiao, Sihan Li, Tao Xie, and Nikolai Tillmann
Characteristic Studies of Loop Problems for Structural Test Generation via Symbolic Execution
In Proceedings of the 28th IEEE/ACM International Conference on Automated Software Engineering (ASE 2013), pages 246-256, Palo Alto, California, November 2013. [PDF] (Acceptance Rate: 17.0%, 43 / 254 = 17.0%)

Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, and Tao Xie
WHYPER: Towards Automating Risk Assessment of Mobile Applications
In Proceedings of the 22nd USENIX Security Symposium (USENIX Security 2013), pages 527-542,Washington DC, August 2013. [PDF] (Acceptance Rate: 45 / 277 = 16.2%)

Xusheng Xiao, Amit Paradkar, Suresh Thummalapenta and Tao Xie
Automated Extraction of Security Policies from Natural-Language Software Documents
In Proceedings of the 20th ACM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE 2012), pages 12:1-12:11, Research Triangle Park, North Carolina, USA, November 2012. [PDF] (Acceptance Rate: 35 / 201 = 17.4%)

Xusheng Xiao, Nikolai Tillmann, Manuel Fahndrich, Jonathan de Halleux, Michal Moskal
User-Aware Privacy Control via Extended Static-Information-Flow Analysis
In Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering 2012 (ASE 2012), pages 80-89, Essen, Germany, September 2012. [PDF] (Acceptance Rate: 21 / 138 = 15.2%)

Rahul Pandita, Xusheng Xiao, Hao Zhong, Tao Xie, Stephen Oney, and Amit Paradkar
Inferring Method Specifications from Natural Language API Descriptions
In Proceedings of the 34rd International Conference on Software Engineering (ICSE 2012), pages 815-825, Zurich, Switzerland, June 2012. [PDF] (Acceptance Rate: 87 / 408 = 21.3%)

Xusheng Xiao, Suresh Thummalapenta, and Tao Xie
Advances on Improving Automation in Developer Testing
In Advances in Computers Series, Volume 85, Burlington: Academic Press, 85: 165-212, 2012. [PDF]

Xusheng Xiao
Problem Identification for Structural Test Generation: First Step Towards Cooperative Developer Testing
ACM Student Research Competition (ACM SRC) Grand Finals, San Francisco, CA, June 2012.

Xusheng Xiao, Tao Xie, Nikolai Tillmann, and Jonathan de Halleux
Precise Identification of Problems for Structural Test Generation
In Proceedings of the 33rd International Conference on Software Engineering (ICSE 2011), pages 611-620, Honolulu, Hawaii, USA, May 2011. [PDF] (Acceptance Rate: 62 / 442 = 14%)

Xusheng Xiao
Problem Identification for Structural Test Generation: First Step Towards Cooperative Developer Testing
In Proceedings of the 33rd International Conference on Software Engineering (ICSE 2011), ACM Student Research Competition (SRC), pages 1179-1181, Honolulu, Hawaii, May 2011. [PDF]

Xusheng Xiao, Tao Xie, Nikolai Tillmann, and Jonathan de Halleux
Covana: Precise Identification of Problems in Pex
In Proceedings of the 33rd International Conference on Software Engineering (ICSE 2011), Demonstrations Track, pages 1004-1006, Honolulu, Hawaii, May 2011. [PDF][Demo Video].

Patent

Ding Li, Xusheng Xiao, Zhichun L, Guofei Jiang, and Peng Gao
System and method for detecting security risks in a computer system. Granted Feb 2, 2021. US Patent 10909242.

Xusheng Xiao, Zhichun L, Mu Zhang, Guofei Jiang, and Jiaping Gui
Progressive processing for querying system behavior. Granted Jan 5, 2021. US Patent 10885027.

Xusheng Xiao, Zhichun Li, Fengyuan Xu, Peng Gao, and Guofei Jiang
Risky Behavior Query Construction and Execution. Granted Dec 8, 2020. US Patent 10860582.

Xusheng Xiao, Zhichun Li, Mu Zhang, Guofei Jiang, Jiaping Gui, and Ding Li
Security Monitoring with Progressive Behavioral Query Language Database. Granted Nov 10, 2020. US Patent 10831750.

Zhichun Li, Xusheng Xiao, Zhenyu Wu, Jianjun Huang, and Guofei Jiang
System and Method for Detecting Sensitive User Input Leakages in Software Applications. Granted Jan 16, 2018. US Patent 9870485.

Xusheng Xiao, Nikolai Tillmann, Manuel Fahndrich, Jonathan de Halleux, Michal Moskal
Controlling the Release of Private Information Using Static Flow Analysis. Granted Aug 11, 2015. US Patent 9104528.

Zhenyu Wu, Zhichun Li, Jungwhan Rhee, Fengyuan Xu, Guofei Jiang, Kangkook Jee, Xusheng Xiao, and Zhang Xu
Intrusion Detection using Efficient System Dependency Analysis. US20170244733 A1.

Xusheng Xiao, Zhichun Li, Zhenyu Wu, Fengyuan Xu, and Guofei Jiang
Scalable Data Stream Management System for Monitoring System Activities. US20160283531 A1.

Zhichun Li, Xusheng Xiao, Zhenyu Wu, Bo Zong, and Guofei Jiang
Method and System for Behavior Query Construction in Temporal Graphs using Discriminative Sub-trace Mining. US20160125094 A1.

Aarti Gupta, Gogul Balakrishnan, Franjo Ivancic, Xusheng Xiao
Effective Lifetime Dependency Analysis and Typestate Analysis. 2014. US20140289712 A1.