Long Lu
Long Lu
Assistant Professor of Computer Science, Northeastern University
Email verificata su northeastern.edu - Home page
Titolo
Citata da
Citata da
Anno
Chex: statically vetting android apps for component hijacking vulnerabilities
L Lu, Z Li, Z Wu, W Lee, G Jiang
Proceedings of the 2012 ACM conference on Computer and communicationsá…, 2012
6632012
Mapping kernel objects to enable systematic integrity checking
M Carbone, W Cui, L Lu, W Lee, M Peinado, X Jiang
Proceedings of the 16th ACM conference on Computer and communicationsá…, 2009
2012009
Blade: an attack-agnostic approach for preventing drive-by malware infections
L Lu, V Yegneswaran, P Porras, W Lee
Proceedings of the 17th ACM conference on Computer and communicationsá…, 2010
1992010
Jekyll on ios: When benign apps become evil
T Wang, K Lu, L Lu, S Chung, W Lee
22nd {USENIX} Security Symposium ({USENIX} Security 13), 559-572, 2013
1512013
Preventing Use-after-free with Dangling Pointers Nullification.
B Lee, C Song, Y Jang, T Wang, T Kim, L Lu, W Lee
NDSS, 2015
1012015
SURF: detecting and measuring search poisoning
L Lu, R Perdisci, W Lee
Proceedings of the 18th ACM conference on Computer and communicationsá…, 2011
1002011
Remix: On-demand live randomization
Y Chen, Z Wang, D Whalley, L Lu
Proceedings of the sixth ACM conference on data and application security andá…, 2016
842016
Checking more and alerting less: detecting privacy leakages via enhanced data-flow analysis and peer voting.
K Lu, Z Li, VP Kemerlis, Z Wu, L Lu, C Zheng, Z Qian, W Lee, G Jiang
NDSS, 2015
742015
From zygote to morula: Fortifying weakened aslr on android
B Lee, L Lu, T Wang, T Kim, W Lee
2014 IEEE Symposium on Security and Privacy, 424-439, 2014
582014
Shreds: Fine-grained execution units with private memory
Y Chen, S Reymondjohnson, Z Sun, L Lu
2016 IEEE Symposium on Security and Privacy (SP), 56-71, 2016
472016
Scareware detection
C Seifert, J Stokes, L Lu, D Heckerman, C Colcernian, S Parthasarathy, ...
US Patent 9,130,988, 2015
452015
NORAX: Enabling execute-only memory for COTS binaries on AArch64
Y Chen, D Zhang, R Wang, R Qiao, AM Azab, L Lu, H Vijayakumar, ...
2017 IEEE Symposium on Security and Privacy (SP), 304-319, 2017
332017
Compiler-assisted code randomization
H Koo, Y Chen, L Lu, VP Kemerlis, M Polychronakis
2018 IEEE Symposium on Security and Privacy (SP), 461-477, 2018
242018
Method for scalable analysis of android applications for security vulnerability
LI Zhichun, L Lu, Z Wu, G Jiang
US Patent 8,875,298, 2014
232014
Vbutton: Practical attestation of user-driven operations in mobile apps
W Li, S Luo, Z Sun, Y Xia, L Lu, H Chen, B Zang, H Guan
Proceedings of the 16th annual international conference on mobile systemsá…, 2018
172018
Webcapsule: Towards a lightweight forensic engine for web browsers
C Neasbitt, B Li, R Perdisci, L Lu, K Singh, K Li
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communicationsá…, 2015
162015
Secure integration of web content and applications on commodity mobile operating systems
D Davidson, Y Chen, F George, L Lu, S Jha
Proceedings of the 2017 ACM on Asia Conference on Computer andá…, 2017
142017
Case: Comprehensive application security enforcement on cots mobile devices
S Zhu, L Lu, K Singh
Proceedings of the 14th Annual International Conference on Mobile Systemsá…, 2016
102016
SAVIOR: towards bug-driven hybrid testing
Y Chen, P Li, J Xu, S Guo, R Zhou, Y Zhang, L Lu
arXiv preprint arXiv:1906.07327, 2019
92019
Instaguard: Instantly deployable hot-patches for vulnerable system programs on android
Y Chen, Y Li, L Lu, YH Lin, H Vijayakumar, Z Wang, X Ou
2018 Network and Distributed System Security Symposium (NDSS'18), 2018
82018
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20