I'm an assistant professor in the Department of Computer Science at the University of New Hampshire. I received my Ph.D. in Information Sciences and Technology at the Pennsylvania State University. My research interest is cybersecurity. I am interested in software security, especially program analysis on binary code, malware analysis and detection, program protection, software testing, program similarity analysis, and model checking.
Courses Taught
- CS 527: Fundamentals of Cybersecurity
- CS 727: Software Security
- CS 727/827: Software Security
- CS 827: Software Security
- CS 927: Software Security Analysis
- CS 999: Doctoral Research
Research Interests
- Computer/Data/Network Security
- Cyber Security
Selected Publications
Chennagouni, N., Kajol, M., Chen, D., Xu, D., & Yu, Q. (2024). Feature-driven Approximate Computing for Wearable Health-Monitoring Systems. In Proceedings of the Great Lakes Symposium on VLSI 2024 (pp. 712-717). ACM. doi:10.1145/3649476.3658719
Liu, B., Zheng, Q., Li, J., & Xu, D. (2022). An In-Place Simplification on Mixed Boolean-Arithmetic Expressions. SECURITY AND COMMUNICATION NETWORKS, 2022. doi:10.1155/2022/7307139
Feng, W., Liu, B., Xu, D., Zheng, Q., & Xu, Y. (2021). GraphMR: Graph Neural Network for Mathematical Reasoning. In Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing (pp. 3395-3404). Association for Computational Linguistics. doi:10.18653/v1/2021.emnlp-main.273
Xu, D., Liu, B., Feng, W., Ming, J., Zheng, Q., Li, J., & Yu, Q. (2021). Boosting SMT Solver Performance on Mixed-Bitwise-Arithmetic Expressions. In PROCEEDINGS OF THE 42ND ACM SIGPLAN INTERNATIONAL CONFERENCE ON PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION (PLDI '21) (pp. 651-664). doi:10.1145/3453483.3454068
Shi, L., Ming, J., Fu, J., Peng, G., Xu, D., Gao, K., & Pan, X. (2020). VAHunt: Warding Off New Repackaged Android Malware in App-Virtualization's Clothing. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. ACM. doi:10.1145/3372297.3423341
Yellu, P., Monjur, M. R., Kammerer, T., Xu, D., & Yu, Q. (2020). Security Threats and Countermeasures for Approximate Arithmetic Computing. In 2020 25th Asia and South Pacific Design Automation Conference (ASP-DAC) (pp. 259-264). IEEE. doi:10.1109/asp-dac47756.2020.9045385
Li, W., Xu, D., Wu, W., Gong, X., Xiang, X., Wang, Y., . . . Zeng, Q. (2019). Memory access integrity: detecting fine-grained memory access errors in binary code. CYBERSECURITY, 2(1). doi:10.1186/s42400-019-0035-x
Xu, D., Ming, J., Fu, Y., & Wu, D. (2018). VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification. In Unknown Conference (pp. 442-458). doi:10.1145/3243734.3243827
Ming, J., Xu, D., & Wu, D. (2017). MalwareHunt: semantics-based malware diffing speedup by normalized basic block memoization. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 13(3), 167-178. doi:10.1007/s11416-016-0279-x
Xu, D., Ming, J., & Wu, D. (2017). Cryptographic Function Detection in Obfuscated Binaries Via Bit-Precise Symbolic Loop Mapping. In Unknown Conference (pp. 921-937). doi:10.1109/sp.2017.56