Follow
Hong Hu
Title
Cited by
Cited by
Year
Data-Oriented Programming: On the Expressiveness of Non-Control Data Attacks
H Hu, S Shinde, S Adrian, ZL Chua, P Saxena, Z Liang
the 37th IEEE Symposium on Security and Privacy, 2016
4942016
Automatic Generation of Data-oriented Exploits
H Hu, ZL Chua, S Adrian, P Saxena, Z Liang
24th {USENIX} Security Symposium ({USENIX} Security 15), 177-192, 2015
2422015
Enforcing unique code target property for control-flow integrity
H Hu, C Qian, C Yagemann, SPH Chung, WR Harris, T Kim, W Lee
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1282018
Razor: A Framework for Post-deployment Software Debloating
C Qian, H Hu, M Alharthi, PH Chung, T Kim, W Lee
28th {USENIX} Security Symposium ({USENIX} Security 19), 1733-1750, 2019
1132019
Where does it go? refining indirect-call targets with multi-layer type analysis
K Lu, H Hu
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
1052019
Squirrel: Testing database management systems with language validity and coverage feedback
R Zhong, Y Chen, H Hu, H Zhang, W Lee, D Wu
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
792020
DroidVault: a trusted data vault for Android devices
X Li, H Hu, G Bai, Y Jia, Z Liang, P Saxena
Engineering of Complex Computer Systems (ICECCS), 2014 19th International …, 2014
622014
APOLLO: Automatic detection and diagnosis of performance regressions in database systems
J Jung, H Hu, J Arulraj, T Kim, W Kang
Proceedings of the VLDB Endowment 13 (1), 57-70, 2019
612019
Fuzzification: Anti-fuzzing Techniques
J Jung, H Hu, D Solodukhin, D Pagan, KH Lee, T Kim
28th {USENIX} Security Symposium ({USENIX} Security 19), 1913-1930, 2019
522019
Winnie: Fuzzing windows applications with harness synthesis and fast cloning
J Jung, S Tong, H Hu, J Lim, Y Jin, T Kim
Proceedings of the 2021 Network and Distributed System Security Symposium …, 2021
512021
One engine to fuzz’em all: Generic language processor testing with semantic validation
Y Chen, R Zhong, H Hu, H Zhang, Y Yang, D Wu, W Lee
2021 IEEE Symposium on Security and Privacy (SP), 642-658, 2021
452021
Sharing more and checking less: Leveraging common input keywords to detect bugs in embedded systems
L Chen, Y Wang, Q Cai, Y Zhan, H Hu, J Linghu, Q Hou, C Zhang, H Duan, ...
30th USENIX Security Symposium (USENIX Security 21), 303-319, 2021
442021
The "Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing
Y Jia, ZL Chua, H Hu, S Chen, P Saxena, Z Liang
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
352016
Preventing {Use-After-Free} Attacks with Fast Forward Allocation
B Wickman, H Hu, I Yun, D Jang, JW Lim, S Kashyap, T Kim
30th USENIX Security Symposium (USENIX Security 21), 2453-2470, 2021
262021
Abusing hidden properties to attack the Node. js ecosystem
F Xiao, J Huang, Y Xiong, G Yang, H Hu, G Gu, W Lee
30th USENIX Security Symposium (USENIX Security 21), 2951-2968, 2021
232021
Detecting Logical Bugs of {DBMS} with Coverage-based Guidance
Y Liang, S Liu, H Hu
31st USENIX Security Symposium (USENIX Security 22), 4309-4326, 2022
192022
A quantitative evaluation of privilege separation in web browser designs
X Dong, H Hu, P Saxena, Z Liang
Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013
162013
Identifying arbitrary memory access vulnerabilities in privilege-separated software
H Hu, ZL Chua, Z Liang, P Saxena
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
132015
Practical analysis framework for software-based attestation scheme
L Li, H Hu, J Sun, Y Liu, JS Dong
Formal Methods and Software Engineering: 16th International Conference on …, 2014
112014
On the effectiveness of kernel debloating via compile-time configuration
M Alharthi, H Hu, H Moon, T Kim
Proceedings of the Second Workshop on Forming an Ecosystem Around Software …, 2018
92018
The system can't perform the operation now. Try again later.
Articles 1–20