Hong Hu
Hong Hu
Research Scientist, School of Computer Science, Georgia Institute of Technology
Email verificata su gatech.edu - Home page
Titolo
Citata da
Citata da
Anno
Data-Oriented Programming: On the Expressiveness of Non-Control Data Attacks
H Hu, S Shinde, S Adrian, ZL Chua, P Saxena, Z Liang
the 37th IEEE Symposium on Security and Privacy, 2016
2092016
Automatic Generation of Data-oriented Exploits
H Hu, ZL Chua, S Adrian, P Saxena, Z Liang
24th {USENIX} Security Symposium ({USENIX} Security 15), 177-192, 2015
1352015
Enforcing unique code target property for control-flow integrity
H Hu, C Qian, C Yagemann, SPH Chung, WR Harris, T Kim, W Lee
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
402018
DroidVault: a trusted data vault for Android devices
X Li, H Hu, G Bai, Y Jia, Z Liang, P Saxena
Engineering of Complex Computer Systems (ICECCS), 2014 19th International …, 2014
392014
The "Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing
Y Jia, ZL Chua, H Hu, S Chen, P Saxena, Z Liang
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
202016
Razor: A Framework for Post-deployment Software Debloating
C Qian, H Hu, M Alharthi, PH Chung, T Kim, W Lee
28th {USENIX} Security Symposium ({USENIX} Security 19), 1733-1750, 2019
132019
A quantitative evaluation of privilege separation in web browser designs
X Dong, H Hu, P Saxena, Z Liang
European Symposium on Research in Computer Security, 75-93, 2013
112013
Practical analysis framework for software-based attestation scheme
L Li, H Hu, J Sun, Y Liu, JS Dong
International Conference on Formal Engineering Methods, 284-299, 2014
102014
Where does it go? refining indirect-call targets with multi-layer type analysis
K Lu, H Hu
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
52019
APOLLO: automatic detection and diagnosis of performance regressions in database systems
J Jung, H Hu, J Arulraj, T Kim, W Kang
Proceedings of the VLDB Endowment 13 (1), 57-70, 2019
52019
On the effectiveness of kernel debloating via compile-time configuration
M Alharthi, H Hu, H Moon, T Kim
Proceedings of the 1st Workshop on SoftwAre debLoating And Delayering …, 2018
52018
Fuzzification: Anti-fuzzing Techniques
J Jung, H Hu, D Solodukhin, D Pagan, KH Lee, T Kim
28th {USENIX} Security Symposium ({USENIX} Security 19), 1913-1930, 2019
42019
Identifying arbitrary memory access vulnerabilities in privilege-separated software
H Hu, ZL Chua, Z Liang, P Saxena
European Symposium on Research in Computer Security, 312-331, 2015
32015
Automatically assessing crashes from heap overflows
L He, Y Cai, H Hu, P Su, Z Liang, Y Yang, H Huang, J Yan, X Jia, D Feng
2017 32nd IEEE/ACM International Conference on Automated Software …, 2017
12017
SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback
R Zhong, Y Chen, H Hu, H Zhang, W Lee, D Wu
arXiv preprint arXiv:2006.02398, 2020
2020
DESENSITIZATION: Privacy-Aware and Attack-Preserving Crash Report
R Ding, H Hu, W Xu, T Kim
ret 2, G3, 0
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–16