Publications

 

 

 

COPYRIGHT: The following materials are copyrighted by the corresponding publishers (e.g., ACM, IEEE, Springer Verlag). You can download them only if you accept and obey the terms and restrictions defined by the respective publishers. The online version may be older than the printed version available at the respective publisher’s website.

 

My Publication Word Cloud


[2020] | [2019][2018]  | [2017]  |  [2016]  |  [2015]  |  [Before 2015]  |  [Patent]


[2020]

  • Jiaping Gui, Ding Li, Zhengzhang Chen, Junghwan Rhee, Xusheng Xiao, Mu Zhang, Kangkook Jee, Zhichun Li, and Haifeng Chen.
    APTrace: A Responsive System for Agile Enterprise Level Causality Analysis 
    In Proceedings of the 36th IEEE International Conference on Data Engineering (ICDE 2020), Industry and Application Track, Dallas, TX, April 2020. [PDF].
  • Peng Gao, Xusheng Xiao, Ding Li, Kangkook Jee, Haifeng Chen, Sanjeev R. Kulkarni, and Prateek Mittal.
    Querying Streaming System Monitoring Data for Enterprise System Anomaly Detection 
    In Proceedings of the 36th IEEE International Conference on Data Engineering (ICDE 2020), Demo Track, Dallas, TX, April 2020. [PDF].
  • Jian Liu, Xusheng Xiao, Lihua Xu, Liang Dou, and Andy Podgurski.
    DroidMutator: An Effective Mutation Analysis Tool for Android Applications
    In Proceedings of the 42nd International Conference on Software Engineering  (ICSE 2020), Demo Track, Seoul, South Korea, May 2020. [PDF].

[2019]

  • Shengqu Xi, Shao Yang, Xusheng Xiao, Yuan Yao, Yayuan Xiong, Fengyuan Xu, Haoyu Wang, Peng Gao, Zhuotao Liu, Feng Xu, and Jian Lu.
    DeepIntent : Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps 
    In Proceedings of the 26th ACM Conference on Computer and Communications Security (CCS 2019), London, UK, Nov 2019. [PDF] (Acceptance Rate: 16.2%, 117 out of 722).
  • Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, and Yih-Chun Hu.
    HyperService: Interoperability and Programmability across Heterogeneous Blockchains 
    In Proceedings of the 26th ACM Conference on Computer and Communications Security (CCS 2019), London, UK, Nov 2019. [PDF] (Acceptance Rate: 16.2%, 117 out of 722).
  • Xusheng Xiao, Xiaoyin Wang, Zhihao Cao, Hanlin Wang, and Peng Gao.
    IconIntent: Automatic Identification of Sensitive UI Widgets based on Icon Classification for Android Apps 
    In Proceedings of the 41st ACM/IEEE International Conference on Software Engineering (ICSE 2019), Montreal, Canada, May 2019. [PDF] (Acceptance Rate: 20.6%, 109 out of 529).
  • Zhilei Ren, Changlin Liu, Xusheng Xiao, He Jiang and Tao Xie.
    Root Cause Localization for Unreproducible Builds via Causality Analysis over System Call Tracing 
    In Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), San Diego, CA, USA, Nov 2019. [PDF] (Acceptance Rate: 20.9%, 93 out of 445).
  • Haoyu Wang, Hongxuan Liu, Xusheng Xiao, Guozhu Meng and Yao Guo.
    Characterizing Android App Signing Issues 
    In Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), San Diego, CA, USA, Nov 2019. [PDF] (Acceptance Rate: 20.9%, 93 out of 445).
  • Jiaping Gui, Xusheng Xiao, Ding Li, Chung Hwan Kim, and Haifeng Chen.
    Progressive Processing of System Behavioral Query 
    In Proceedings of the Annual Computer Security Applications Conference (ACSAC), San Juan, Puerto Rico, Dec 2019. [PDF].
  • Yun Ma, Yangyang Huang, Ziniu Hu, Xusheng Xiao, and Xuanzhe Liu.
    Paladin: Automated Generation of Reproducible Test Cases for Android Apps 
    In Proceedings of the 20th Workshop on Mobile Computing Systems and Applications (HotMobile 2019), Santa Cruz, CA, USA, Feb 2019. [PDF].
  • Xia Zhang, Xusheng Xiao, Liang He, Yun Ma, Yangyang Huang, Xuanzhe Liu, Wenyao Xu, and Cong Liu.
    PIFA: An Intelligent Phase Identification and Frequency Adjustment Framework for Time-Sensitive Mobile Computing 
    In Proceedings of the 25th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2019), Montreal, Canada, April 2019. [PDF].
  • Shengqu Xi, Yuan Yao, Xusheng Xiao, Feng Xu, and Jian Lu.
    Bug Triaging Based on Tossing Sequence Modeling 
    Journal of Computer Science and Technology (JCST), 2019. [PDF]
  • Peng Gao, Xusheng Xiao, Zhichun Li, Kangkook Jee, Fengyuan Xu, Sanjeev R. Kulkarni, and Prateek Mittal.
    A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security 
    In Proceedings of the 45th International Conference on Very Large Data Bases (VLDB 2019), Demonstrations Track, Los Angelos, CA, USA, Aug 2019. [PDF][Demo Website] (Acceptance Rate: 37.8%, 48 out of 127).

[2018]

  • Peng Gao, Xusheng Xiao, Ding Li, Zhichun Li, Kangkook Jee, Zhenyu Wu, Chung Hwan Kim, Sanjeev R. Kulkarni, and Prateek Mittal.
    SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection 
    In Proceedings of the USENIX Security Symposium (USENIX Security 2018), Boston, MA, USA, July 2018. [PDF][Website] [Presentation Video] [Poster] [Project Website] [Demo Video] (Acceptance Rate: 19.2%, 100 out of 520).
    • CSAW'18 Best Applied Security Research Paper Award Top-10 Finalists (Acceptance Rate: 13.5%, 10 out of 74)
  • Yutao Tang, Ding Li, Zhichun Li, Mu Zhang, Kangkook Jee, Xusheng Xiao, Zhenyu Wu, Junghwan Rhee, Fengyuan Xu, and Qun Li.
    NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis 
    In Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS 2018), Toronto, Canada, Oct 2018. [PDF
    (Acceptance Rate: 16.6%, 134 out of 809).
  • Peng Gao, Xusheng Xiao, Zhichun Li, Kangkook Jee, Fengyuan Xu, Sanjeev R. Kulkarni, and Prateek Mittal.
    AIQL: Enabling Efficient Attack Investigation from System Monitoring Data 
    In Proceedings of the USENIX Annual Technical Conference (USENIX ATC 2018), Boston, MA, USA, July 2018. [PDF][Poster] [Project Website][Demo Website] (Acceptance Rate: 20.9%, 79 out of 378).
  • Patrick Morrison, Rahul Pandita, Xusheng Xiao, Ram Chillarege, Laurie Williams.
    Are Vulnerabilities Discovered and Resolved Like Other Defects? 
    In Proceedings of the 37th International Conference on Software Engineering (ICSE 2018), Journal First Paper, Gothenburg, Sweden, May 2018.
  • Angello Astorga, Siwakorn Srisakaokul, Xusheng Xiao, and Tao Xie. 
    PreInfer: Automatic Inference of Preconditions via Symbolic Analysis.
    In Proceedings of the 48th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2018), Luxembourg, June 2018. [PDF
    (Acceptance Rate: 28.1%, 62 out of 221).
  • Jiayi Cao, Angello Astorga, Siwakorn Srisakaokul, Zhengkai Wu, Xueqing Liu, Xusheng Xiao, and Tao Xie. 
    Visualizing Path Exploration to Assist Problem Diagnosis for Structural Test Generation.
    In Proceedings of the IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2018), Posters, Lisbon, Portugal, October 2018. [PDF]

[2017]

  • Patrick Morrison, Rahul Pandita, Xusheng Xiao, Ram Chillarege, Laurie Williams.
    Are Vulnerabilities Discovered and Resolved Like Other Defects? 
    Empirical Software Engineering (EMSE), pages 1-39, 2017.
  • Yujie Yuan, Lihua Xu, Xusheng Xiao, Andy Podguiski, Huibiao Zhu. 
    RunDroid: Recovering Excution Call Graph for Android Applications.
    In Proceedings of the 11th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE 2017), Demonstrations Track, pages 949-953, Paderborn, Germany, September 2017. [PDF][Code][Video]
  • Zheng Dong, Yuchuan Liu, Husheng Zhou, Xusheng Xiao, Yu Gu, Lingming Zhang and Cong Liu. 
    An Energy-efficient Offloading Framework with Predictable Temporal Correctness.
    In ACM/IEEE Symposium on Edge Computing (SEC), San
    Jose, CA, October, 2017. [PDF]
  • Dengfeng Li, Wing Lam, Wei Yang, Zhengkai Wu, Xusheng Xiao, Tao Xie. 
    Towards Privacy-Preserving Mobile Apps: A Balancing Act.
    In Proceedings of the Symposium and Bootcamp on the Science of Security (HotSoS 2017), Hanover, Maryland, April 2017. [PDF]

[2016]

  • Zhang Xu, Zhenyu Wu, Zhichun Li, Kangkook Jee, Junghwan Rhee, Xusheng Xiao, Fengyuan Xu, Haining Wang, and Guofei Jiang. 
    High Fidelity Data Reduction for Big Data Security Dependency Analyses
    In Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS 2016), pages 504-516, Vienna, Austria, October 2016. [PDF] (Acceptance Rate: 18.1%, 151 out of 836).
  • Bo Zong, Xusheng Xiao, Zhichun Li, Zhenyu Wu, Zhiyun Qian, Xifeng Yan, Ambuj K. Singh, and Guofei Jiang. 
    Behavior Query Discovery in System-Generated Temporal Graphs
    In Proceedings of 42nd International Conference on Very Large Data Bases (VLDB 2016), pages 240-251, New Delhi, India, September 2016.  [PDF] [arXiv]
  • Sihan Li, Xusheng Xiao, Blake Bassett, Tao Xie, and Nikolai Tillmann. 
    Measuring Code Behavioral Similarity for Programming and Software Engineering Education
    In International Conference on Software Engineering (ICSE 2016), Education Track, pages 501-510, May 2016.  [PDF]
  • Xusheng Xiao, Jian-Guang Lou, Shan Lu, David C. Shepherd, Xin Peng, and Qianxiang Wang. 
    Roundtable: Research Opportunities and Challenges for Large-Scale Software Systems
    Journal of Computer Science and Technology (JCST), 31(5): 851-860, 2016. [PDF]
  • Wei Yang, Xusheng Xiao, Dengfeng Li, Huoran Li, Xuanzhe Liu, Haoyu Wang, Yao Guo, and Tao Xie. 
    Security Analytics for Mobile Apps: Achievements and Challenges
    Journal of Cyber Security (in Chinese), 1(2): 1-14, April 2016. [PDF]
  • Qing Gao, Xusheng Xiao, Jun Li, Yingfei Xiong, Kuanl Taneja, Dan Hao, Lu Zhang, and Tao Xie. 
    High-Confidence Software Evolution
    Science China Information Sciences (SCIS), 59 (7): 071101:1-071101:19, 2016.

[2015]

  • Jianjun Huang, Zhichun Li, Xusheng Xiao, Zhenyu Wu, Kangjie Lu, Xiangyu Zhang, and Guofei Jiang. 
    SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps
    In Proceedings of the 24th USENIX Security Symposium (USENIX Security 2015), pages 977-992, Washington, D.C., August 2015. [PDF] (Acceptance Rate: 15.7%, 67 out of 426).
    • CSAW'15 Best Applied Security Research Paper Award Top-10 Finalists (Acceptance Rate: 12.2%, 10 out of 82)
  • Wei Yang, Xusheng Xiao, Benjamin Andow, Sihan Li, Tao Xie, and William Enck. 
    AppContext: Differentiating Malicious and Benign Mobile App Behaviors Under Context.
     In Proceedings of the 37th International Conference on Software Engineering (ICSE 2015), pages 303-313, Florence, Italy, May 2015. [PDF] (Acceptance Rate: 18.5%, 84 out of 452).
  • Xusheng Xiao, Nikolai Tillmann, Manuel Fahndrich, Jonathan de Halleux, Michal Moskal, and Tao Xie. 
    User-Aware Privacy Control via Extended Static-Information-Flow Analysis
    Automated Software Engineering Journal (ASEJ), 22 (3): 333-366, 2015. [PDF]. A previous version appeared in Proceedings of ASE 2012.

[Before 2015]

  • Xusheng Xiao, Gogul Balakrishnan, Franjo Ivancic, Naoto Maeda, Aarti Gupta and Deepak Chhetri.
    ARC++: Effective Typestate and Lifetime Dependency Analysis.
    In Proceedings of the 2014 International Symposium on Software Testing and Analysis (ISSTA 2014), pages 116-126, Bay Area, California, July 2014. [PDF] (Acceptance Rate: 28.1%, 36 out of 128).
  • John Slankas, Xusheng Xiao, Laurie Williams, and Tao Xie. 
    Relation Extraction for Inferring Access Control Rules from Natural Language Artifacts
    In Proceedings of the 2014 Annual Computer Security Applications Conference (ACSAC 2014), pages 366-375, New Orleans, Louisiana, USA, December 2014. [PDF]
  • Tao Xie, Lu Zhang, Xusheng Xiao, Yingfei Xiong, and Dan Hao. 
    Cooperative Software Testing and Analysis: Advances and Challenges
    Journal of Computer Science and Technology (JCST), 29(4): 713-723, 2014. [PDF]
  • Wei Yang, Xusheng Xiao, Rahul Pandita, William Enck and Tao Xie. 
    Improving Mobile Application Security via Bridging User Expectations and Application Behaviors.  
    ACM Symposium and Bootcamp on the Science of Security (HotSoS), Raleigh, NC, April 2014.  [PDF]
  • Xusheng Xiao, Shi Han, Tao Xie, and Dongmei Zhang.  
    Context-Sensitive Delta Inference for Identifying Workload-Dependent Performance Bottlenecks.  In Proceedings of the 2013 International Symposium on Software Testing and Analysis (ISSTA 2013), pages 90-100, Lugano Switzerland, July 2013. [PDF]  (Acceptance Rate: 32 / 124 =  25.8%)  
  • Xusheng Xiao, Sihan Li, Tao Xie, and Nikolai Tillmann. 
    Characteristic Studies of Loop Problems for Structural Test Generation via Symbolic Execution.
     In Proceedings of the 28th IEEE/ACM International Conference on Automated Software Engineering (ASE 2013), pages 246-256, Palo Alto, California, November 2013. [PDF] (Acceptance Rate: 17.0%, 43 / 254 = 17.0%).
  • Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, and Tao Xie.  
    WHYPER: Towards Automating Risk Assessment of Mobile Applications.  
    In Proceedings of the 22nd USENIX Security Symposium (USENIX Security 2013), pages 527-542,Washington DC, August 2013.  [PDF] (Acceptance Rate: 45 / 277 = 16.2%)
  • Xusheng Xiao, Amit Paradkar, Suresh Thummalapenta and Tao Xie. 
    Automated Extraction of Security Policies from Natural-Language Software Documents
    In Proceedings of the 20th ACM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE 2012), pages 12:1-12:11, Research Triangle Park, North Carolina, USA, November 2012. [PDF][Slides] (Acceptance Rate: 35 / 201 = 17.4%)
  • Xusheng Xiao, Nikolai Tillmann, Manuel Fahndrich, Jonathan de Halleux, Michal Moskal. 
    User-Aware Privacy Control via Extended Static-Information-Flow Analysis.  
    In Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering 2012 (ASE 2012), pages 80-89, Essen, Germany, September 2012. [PDF] (Acceptance Rate: 21 / 138 = 15.2%) 
  • Rahul Pandita, Xusheng Xiao, Hao Zhong, Tao Xie, Stephen Oney, and Amit Paradkar. 
    Inferring Method Specifications from Natural Language API Descriptions
    In Proceedings of the 34rd International Conference on Software Engineering (ICSE 2012), pages 815-825, Zurich, Switzerland, June 2012. [PDF] (Acceptance Rate: 87 / 408 = 21.3%) 
  • Xusheng Xiao, Suresh Thummalapenta, and Tao Xie. 
    Advances on Improving Automation in Developer Testing
    In Advances in Computers Series, Volume 85, Burlington: Academic Press, 2012, pages 165-212. [PDF]
  • Xusheng Xiao
    Problem Identification for Structural Test Generation: First Step Towards Cooperative Developer Testing.  
    ACM Student Research Competition (ACM SRC) Grand Finals, San Francisco, CA, June 2012. 
    • Winner of the ICSE SRC Best Project Representing an Innovative Use of Microsoft Technology
  • Xusheng Xiao, Tao Xie, Nikolai Tillmann, and Jonathan de Halleux. 
    Precise Identification of Problems for Structural Test Generation
    In Proceedings of the 33rd International Conference on Software Engineering (ICSE 2011), pages 611-620, Honolulu, Hawaii, USA, May 2011. [PDF]  (Acceptance Rate: 62 / 442 = 14%)
  • Xusheng Xiao
    Problem Identification for Structural Test Generation: First Step Towards Cooperative Developer Testing
    In Proceedings of the 33rd International Conference on Software Engineering (ICSE 2011), ACM Student Research Competition (SRC), pages 1179-1181, Honolulu, Hawaii, May 2011. [PDF]
    • Won "Best project representing an innovative use of Microsoft technology" in ICSE 2011, Honolulu, HI! 
  • Xusheng Xiao, Tao Xie, Nikolai Tillmann, and Jonathan de Halleux. 
    Covana: Precise Identification of Problems in Pex
    In Proceedings of the 33rd International Conference on Software Engineering (ICSE 2011), Demonstrations Track, pages 1004-1006, Honolulu, Hawaii, May 2011.  [PDF][Demo Video].

[Patent]

  • Zhenyu Wu, Zhichun Li, Jungwhan Rhee, Fengyuan Xu, Guofei Jiang, Kangkook Jee, Xusheng Xiao, and Zhang Xu. 
    Intrusion Detection using Efficient System Dependency Analysis . 
    US20170244733 A1.
  • Xusheng Xiao, Zhichun Li, Fengyuan Xu, Peng Gao, and Guofei Jiang. 
    Risky Behavior Query Construction and Execution. 
    US20170220639 A1.
  • Zhichun Li, Xusheng Xiao, Zhenyu Wu, Jianjun Huang, and Guofei Jiang. 
    System and Method for Detecting Sensitive User Input Leakages in Software Applications. US Patent 9870485
  • Xusheng Xiao, Zhichun Li, Zhenyu Wu, Fengyuan Xu, and Guofei Jiang. 
    Scalable Data Stream Management System for Monitoring System Activities
    US20160283531 A1
  • Zhichun Li, Xusheng Xiao, Zhenyu Wu, Bo Zong, and Guofei Jiang. 
    Method and System for Behavior Query Construction in Temporal Graphs using Discriminative Sub-trace Mining. US20160125094 A1.
  • Aarti Gupta, Gogul Balakrishnan, Franjo Ivancic, Xusheng Xiao
    Effective Lifetime Dependency Analysis and Typestate Analysis. 2014. US20140289712 A1.
  • Xusheng Xiao, Nikolai Tillmann, Manuel Fahndrich, Jonathan de Halleux, Michal Moskal. 
    Controlling the Release of Private Information Using Static Flow Analysis. 2013. US Patent 9104528

[Thesis]

  • Xusheng Xiao
    Cooperative Testing and Analysis via Informed Decision Making
    Doctoral Dissertation, Department of Computer Science, North Carolina State University, June 2014. [PDF]