Follow
Hong Hu
Title
Cited by
Cited by
Year
Data-Oriented Programming: On the Expressiveness of Non-Control Data Attacks
H Hu, S Shinde, S Adrian, ZL Chua, P Saxena, Z Liang
the 37th IEEE Symposium on Security and Privacy, 2016
3722016
Automatic Generation of Data-oriented Exploits
H Hu, ZL Chua, S Adrian, P Saxena, Z Liang
24th {USENIX} Security Symposium ({USENIX} Security 15), 177-192, 2015
2052015
Enforcing unique code target property for control-flow integrity
H Hu, C Qian, C Yagemann, SPH Chung, WR Harris, T Kim, W Lee
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
922018
Razor: A Framework for Post-deployment Software Debloating
C Qian, H Hu, M Alharthi, PH Chung, T Kim, W Lee
28th {USENIX} Security Symposium ({USENIX} Security 19), 1733-1750, 2019
622019
DroidVault: a trusted data vault for Android devices
X Li, H Hu, G Bai, Y Jia, Z Liang, P Saxena
Engineering of Complex Computer Systems (ICECCS), 2014 19th International …, 2014
572014
Where does it go? refining indirect-call targets with multi-layer type analysis
K Lu, H Hu
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
482019
The "Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing
Y Jia, ZL Chua, H Hu, S Chen, P Saxena, Z Liang
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
322016
Fuzzification: Anti-fuzzing Techniques
J Jung, H Hu, D Solodukhin, D Pagan, KH Lee, T Kim
28th {USENIX} Security Symposium ({USENIX} Security 19), 1913-1930, 2019
302019
Squirrel: Testing database management systems with language validity and coverage feedback
R Zhong, Y Chen, H Hu, H Zhang, W Lee, D Wu
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
252020
APOLLO: Automatic detection and diagnosis of performance regressions in database systems
J Jung, H Hu, J Arulraj, T Kim, W Kang
Proceedings of the VLDB Endowment 13 (1), 57-70, 2019
232019
Winnie: Fuzzing windows applications with harness synthesis and fast cloning
J Jung, S Tong, H Hu, J Lim, Y Jin, T Kim
Proceedings of the 2021 Network and Distributed System Security Symposium …, 2021
142021
A quantitative evaluation of privilege separation in web browser designs
X Dong, H Hu, P Saxena, Z Liang
European Symposium on Research in Computer Security, 75-93, 2013
142013
One engine to fuzz’em all: Generic language processor testing with semantic validation
Y Chen, R Zhong, H Hu, H Zhang, Y Yang, D Wu, W Lee
2021 IEEE Symposium on Security and Privacy (SP), 642-658, 2021
122021
Practical analysis framework for software-based attestation scheme
L Li, H Hu, J Sun, Y Liu, JS Dong
International Conference on Formal Engineering Methods, 284-299, 2014
102014
Sharing more and checking less: Leveraging common input keywords to detect bugs in embedded systems
L Chen, Y Wang, Q Cai, Y Zhan, H Hu, J Linghu, Q Hou, C Zhang, H Duan, ...
30th USENIX Security Symposium (USENIX Security 21), 303-319, 2021
82021
Preventing {Use-After-Free} Attacks with Fast Forward Allocation
B Wickman, H Hu, I Yun, D Jang, JW Lim, S Kashyap, T Kim
30th USENIX Security Symposium (USENIX Security 21), 2453-2470, 2021
82021
On the effectiveness of kernel debloating via compile-time configuration
HMM Alharthi, H Hu, T Kim
Proceedings of the Second Workshop on Forming an Ecosystem Around Software …, 2018
82018
Identifying arbitrary memory access vulnerabilities in privilege-separated software
H Hu, ZL Chua, Z Liang, P Saxena
European Symposium on Research in Computer Security, 312-331, 2015
82015
Abusing hidden properties to attack the node. js ecosystem
F Xiao, J Huang, Y Xiong, G Yang, H Hu, G Gu, W Lee
30th USENIX Security Symposium (USENIX Security 21), 2951-2968, 2021
42021
Desensitization: Privacy-aware and attack-preserving crash report
R Ding, H Hu, W Xu, T Kim
ret 2, G3, 2020
32020
The system can't perform the operation now. Try again later.
Articles 1–20