Dongpeng Xu

Phone: (603) 862-1781
Office: Computer Science, Kingsbury Hall, Durham, NH 03824
Dongpeng Xu

I'm an assistant professor in the Department of Computer Science at the University of New Hampshire. I received my Ph.D. in Information Sciences and Technology at the Pennsylvania State University. My research interest is cybersecurity. I am interested in software security, especially program analysis on binary code, malware analysis and detection, program protection, software testing, program similarity analysis, and model checking.


  • Ph.D., Information Sciences & Technology, Pennsylvania State University
  • MENGR, Software Engineering, University of Science and Technology
  • B.E., Fashion Design and Engineering, Jilin University

Research Interests

  • Computer/Data/Network Security
  • Cyber Security

Courses Taught

  • CS 727/827: Computer Security
  • CS 780/880: Top/Intro to Comp Security
  • CS 927: Software Security Analysis
  • CS 980: Top/Cyber Security
  • CS 999: Doctoral Research

Selected Publications

Xu, D., Liu, B., Feng, W., Ming, J., Zheng, Q., Li, J., & Yu, Q. (2021). Boosting SMT solver performance on mixed-bitwise-arithmetic expressions. In Proceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation. ACM. doi:10.1145/3453483.3454068

Shi, L., Ming, J., Fu, J., Peng, G., Xu, D., Gao, K., & Pan, X. (2020). VAHunt: Warding Off New Repackaged Android Malware in App-Virtualization's Clothing. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. ACM. doi:10.1145/3372297.3423341

Yellu, P., Monjur, M. R., Kammerer, T., Xu, D., & Yu, Q. (2020). Security Threats and Countermeasures for Approximate Arithmetic Computing. In 2020 25th Asia and South Pacific Design Automation Conference (ASP-DAC). IEEE. doi:10.1109/asp-dac47756.2020.9045385

Li, W., Xu, D., Wu, W., Gong, X., Xiang, X., Wang, Y., . . . Zeng, Q. (2019). Memory access integrity: detecting fine-grained memory access errors in binary code. Cybersecurity, 2(1). doi:10.1186/s42400-019-0035-x

Wang, L., Xu, D., Ming, J., Fu, Y., & Wu, D. (2019). MetaHunt. In Unknown Conference (pp. 15-26). doi:10.1145/3338503.3357720

Xu, D., Ming, J., Fu, Y., & Wu, D. (2018). VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification. In Unknown Conference (pp. 442-458). doi:10.1145/3243734.3243827

Ming, J., Xu, D., & Wu, D. (2017). MalwareHunt: semantics-based malware diffing speedup by normalized basic block memoization. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 13(3), 167-178. doi:10.1007/s11416-016-0279-x

Xu, D., Ming, J., & Wu, D. (2017). Cryptographic Function Detection in Obfuscated Binaries Via Bit-Precise Symbolic Loop Mapping. In Unknown Conference (pp. 921-937). doi:10.1109/sp.2017.56

Ming, J., Xu, D., Wang, L., & Wu, D. (2015). LOOP. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM. doi:10.1145/2810103.2813617

Xu, D., & Zheng, Q. (2012). An Address-Based Compiling Optimization for FFT on Multi-cluster DSP. In 2012 Fifth International Symposium on Parallel Architectures, Algorithms and Programming. IEEE. doi:10.1109/paap.2012.17

Most Cited Publications