Positions

Research Areas research areas

Overview

  • I'm an assistant professor in the Department of Computer Science at the University of New Hampshire. I received my Ph.D. in Information Sciences and Technology at the Pennsylvania State University. My research interest is cybersecurity. I am interested in software security, especially program analysis on binary code, malware analysis and detection, program protection, software testing, program similarity analysis, and model checking.
  • Selected Publications

    Academic Article

    Year Title
    2022 An In-Place Simplification on Mixed Boolean-Arithmetic ExpressionsSecurity and Communication Networks.  2022:1-14. 2022
    2019 Memory access integrity: detecting fine-grained memory access errors in binary codeCYBERSECURITY.  2. 2019
    2017 MalwareHunt: semantics-based malware diffing speedup by normalized basic block memoizationJournal of Computer Virology and Hacking Techniques.  13:167-178. 2017

    Conference Paper

    Year Title
    2024 Feature-driven Approximate Computing for Wearable Health-Monitoring SystemsProceedings of the Great Lakes Symposium on VLSI 2024. 712-717. 2024
    2021 Boosting SMT Solver Performance on Mixed-Bitwise-Arithmetic ExpressionsPROCEEDINGS OF THE 42ND ACM SIGPLAN INTERNATIONAL CONFERENCE ON PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION (PLDI '21). 651-664. 2021
    2021 GraphMR: Graph Neural Network for Mathematical ReasoningProceedings of the 2021 Conference on Empirical Methods in Natural Language Processing. 3395-3404. 2021
    2020 VAHunt: Warding Off New Repackaged Android Malware in App-Virtualization's ClothingProceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. 2020
    2020 Security Threats and Countermeasures for Approximate Arithmetic Computing2020 25th Asia and South Pacific Design Automation Conference (ASP-DAC). 259-264. 2020
    2019 MetaHuntProceedings of the 3rd ACM Workshop on Software Protection. 15-26. 2019
    2018 VMHuntProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS '18. 442-458. 2018
    2017 Cryptographic Function Detection in Obfuscated Binaries via Bit-Precise Symbolic Loop MappingProceedings of the 38th IEEE Symposium on Security and Privacy. 921-937. 2017
    2015 LOOPProceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15. 2015
    2012 An Address-Based Compiling Optimization for FFT on Multi-cluster DSP2012 Fifth International Symposium on Parallel Architectures, Algorithms and Programming. 60-64. 2012
    BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence CheckingProceedings of the 26th USENIX Security Symposium.

    Teaching Activities

  • Doctoral Research Taught course
  • Doctoral Research Taught course
  • Fundamentals of Cybersecurity Taught course
  • Software Security Taught course
  • Software Security Taught course
  • Software Security Analysis Taught course
  • Doctoral Research Taught course 2024
  • Doctoral Research Taught course 2023
  • Software Security Taught course 2023
  • Doctoral Research Taught course 2022
  • Fundamentals of Cybersecurity Taught course 2022
  • Software Security Analysis Taught course 2022
  • Doctoral Research Taught course 2022
  • Software Security Taught course 2022
  • Doctoral Research Taught course 2021
  • Fundamentals of Cybersecurity Taught course 2021
  • Software Security Analysis Taught course 2021
  • Computer Security Taught course 2021
  • Software Security Analysis Taught course 2020
  • Computer Security Taught course 2020
  • Doctoral Research Taught course 2020
  • Top/Cyber Security Taught course 2019
  • Top/Intro to Comp Security Taught course 2019
  • Top/Cyber Security Taught course 2018
  • Education And Training

  • B.E. Fashion Design and Engineering, Jilin University
  • MENGR Software Engineering, University of Science and Technology
  • Ph.D. Information Sciences & Technology, Pennsylvania State University
  • Full Name

  • Dongpeng Xu