Dongpeng Xu

Dongpeng Xu

Phone: (603) 862-1781
Office: Computer Science, Kingsbury Hall, Durham, NH 03824

I'm an assistant professor in the Department of Computer Science at the University of New Hampshire. I received my Ph.D. in Information Sciences and Technology at the Pennsylvania State University. My research interest is cybersecurity. I am interested in software security, especially program analysis on binary code, malware analysis and detection, program protection, software testing, program similarity analysis, and model checking.

Courses Taught

  • CS 527: Fundamentals of Cybersecurity
  • CS 727: Software Security
  • CS 727/827: Software Security
  • CS 827: Software Security
  • CS 927: Software Security Analysis
  • CS 999: Doctoral Research


  • Ph.D., Information Sciences & Technology, Pennsylvania State University
  • MENGR, Software Engineering, University of Science and Technology
  • B.E., Fashion Design and Engineering, Jilin University

Research Interests

  • Computer/Data/Network Security
  • Cyber Security

Selected Publications

  • Liu, B., Zheng, Q., Li, J., & Xu, D. (2022). An In-Place Simplification on Mixed Boolean-Arithmetic Expressions. SECURITY AND COMMUNICATION NETWORKS, 2022. doi:10.1155/2022/7307139

  • Xu, D., Liu, B., Feng, W., Ming, J., Zheng, Q., Li, J., & Yu, Q. (2021). Boosting SMT Solver Performance on Mixed-Bitwise-Arithmetic Expressions. In PROCEEDINGS OF THE 42ND ACM SIGPLAN INTERNATIONAL CONFERENCE ON PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION (PLDI '21) (pp. 651-664). doi:10.1145/3453483.3454068

  • Feng, W., Liu, B., Xu, D., Zheng, Q., & Xu, Y. (2021). GraphMR: Graph Neural Network for Mathematical Reasoning. In Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing. Association for Computational Linguistics. doi:10.18653/v1/2021.emnlp-main.273

  • Shi, L., Ming, J., Fu, J., Peng, G., Xu, D., Gao, K., & Pan, X. (2020). VAHunt: Warding Off New Repackaged Android Malware in App-Virtualization's Clothing. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. ACM. doi:10.1145/3372297.3423341

  • Yellu, P., Monjur, M. R., Kammerer, T., Xu, D., & Yu, Q. (2020). Security Threats and Countermeasures for Approximate Arithmetic Computing. In 2020 25th Asia and South Pacific Design Automation Conference (ASP-DAC). IEEE. doi:10.1109/asp-dac47756.2020.9045385

  • Li, W., Xu, D., Wu, W., Gong, X., Xiang, X., Wang, Y., . . . Zeng, Q. (2019). Memory access integrity: detecting fine-grained memory access errors in binary code. CYBERSECURITY, 2(1). doi:10.1186/s42400-019-0035-x

  • Wang, L., Xu, D., Ming, J., Fu, Y., & Wu, D. (2019). MetaHunt. In Unknown Conference (pp. 15-26). doi:10.1145/3338503.3357720

  • Xu, D., Ming, J., Fu, Y., & Wu, D. (2018). VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification. In Unknown Conference (pp. 442-458). doi:10.1145/3243734.3243827

  • Ming, J., Xu, D., & Wu, D. (2017). MalwareHunt: semantics-based malware diffing speedup by normalized basic block memoization. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 13(3), 167-178. doi:10.1007/s11416-016-0279-x

  • Xu, D., Ming, J., & Wu, D. (2017). Cryptographic Function Detection in Obfuscated Binaries Via Bit-Precise Symbolic Loop Mapping. In Unknown Conference (pp. 921-937). doi:10.1109/sp.2017.56

  • Most Cited Publications