Hong Hu
Hong Hu
Research Scientist, School of Computer Science, Georgia Institute of Technology
Email verificata su gatech.edu - Home page
TitoloCitata daAnno
Data-Oriented Programming: On the Expressiveness of Non-Control Data Attacks
H Hu, S Shinde, S Adrian, ZL Chua, P Saxena, Z Liang
the 37th IEEE Symposium on Security and Privacy, 2016
Automatic generation of data-oriented exploits
H Hu, ZL Chua, S Adrian, P Saxena, Z Liang
24th {USENIX} Security Symposium ({USENIX} Security 15), 177-192, 2015
DroidVault: a trusted data vault for Android devices
X Li, H Hu, G Bai, Y Jia, Z Liang, P Saxena
Engineering of Complex Computer Systems (ICECCS), 2014 19th Internationalá…, 2014
Enforcing unique code target property for control-flow integrity
H Hu, C Qian, C Yagemann, SPH Chung, WR Harris, T Kim, W Lee
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communicationsá…, 2018
The Web/Local Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing
Y Jia, ZL Chua, H Hu, S Chen, P Saxena, Z Liang
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communicationsá…, 2016
A quantitative evaluation of privilege separation in web browser designs
X Dong, H Hu, P Saxena, Z Liang
European Symposium on Research in Computer Security, 75-93, 2013
Practical analysis framework for software-based attestation scheme
L Li, H Hu, J Sun, Y Liu, JS Dong
International Conference on Formal Engineering Methods, 284-299, 2014
{RAZOR}: A Framework for Post-deployment Software Debloating
C Qian, H Hu, M Alharthi, PH Chung, T Kim, W Lee
28th {USENIX} Security Symposium ({USENIX} Security 19), 1733-1750, 2019
Automatically assessing crashes from heap overflows
L He, Y Cai, H Hu, P Su, Z Liang, Y Yang, H Huang, J Yan, X Jia, D Feng
Proceedings of the 32nd IEEE/ACM International Conference on Automatedá…, 2017
Where Does It Go?: Refining Indirect-Call Targets with Multi-Layer Type Analysis
K Lu, H Hu
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communicationsá…, 2019
APOLLO: automatic detection and diagnosis of performance regressions in database systems
J Jung, H Hu, J Arulraj, T Kim, W Kang
Proceedings of the VLDB Endowment 13 (1), 57-70, 2019
FUZZIFICATION: anti-fuzzing techniques
J Jung, H Hu, D Solodukhin, D Pagan, KH Lee, T Kim
28th {USENIX} Security Symposium ({USENIX} Security 19), 1913-1930, 2019
Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software
H Hu, ZL Chua, Z Liang, P Saxena
European Symposium on Research in Computer Security, 312-331, 2015
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–13