Biblio

Export 27 results:
Filters: Author is Wenke Lee  [Clear All Filters]
2023
Yagemann C, Chung SP, Saltaformaggio B, Lee W.  2023.  PUMM: Preventing Use-After-Free Using Execution Unit Partitioning. 32nd USENIX Security Symposium (USENIX Security 23). :823--840.
Yang Z, Allen J, Landen M, Perdisci R, Lee W.  2023.  TRIDENT: Towards Detecting and Mitigating Web-based Social Engineering Attacks. 32nd USENIX Security Symposium (USENIX Security 23). :6701--6718.
Mirsky Y, Macon G, Brown M, Yagemann C, Pruett M, Downing E, Mertoguno S, Lee W.  2023.  VulChecker: Graph-based Vulnerability Localization in Source Code. 32nd USENIX Security Symposium (USENIX Security 23). :6557--6574.
Chen Y, Zhong R, Yang Y, Hu H, Wu D, Lee W.  2023.  µFUZZ: Redesign of Parallel Fuzzing using Microservice Architecture. 32nd USENIX Security Symposium (USENIX Security 23). :1325--1342.
2019
Qian C, Hu H, Alharthi M, Chung PHo, Kim T, Lee W.  2019.  RAZOR: A Framework for Post-deployment Software Debloating. 28th USENIX Security Symposium (USENIX Security 19). :1733--1750.
2017
Xu M, Lu K, Kim T, Lee W.  2017.  Bunshin: Compositing Security Mechanisms through Diversification. 2017 USENIX Annual Technical Conference (USENIX ATC 17). :271--283.
Ding R, Qian C, Song C, Harris B, Kim T, Lee W.  2017.  Efficient Protection of Path-Sensitive Control Security. 26th USENIX Security Symposium (USENIX Security 17). :131--148.
2015
Lee B, Song C, Kim T, Lee W.  2015.  Type Casting Verification: Stopping an Emerging Attack Vector. 24th USENIX Security Symposium (USENIX Security 15). :81--96.
2013
Wang T, Lu K, Lu L, Chung S, Lee W.  2013.  Jekyll on iOS: When Benign Apps Become Evil. 22nd USENIX Security Symposium (USENIX Security 13). :559--572.
Xing X, Meng W, Doozan D, Snoeren AC, Feamster N, Lee W.  2013.  Take This Personally: Pollution Attacks on Personalized Services. 22nd USENIX Security Symposium (USENIX Security 13). :671--686.
2011
Antonakakis M, Perdisci R, Lee W, Vasiloglou, II N, Dagon D.  2011.  Detecting Malware Domains at the Upper DNS Hierarchy. 20th USENIX Security Symposium (USENIX Security 11).
Feamster N, Lee W.  2011.  Opening Remarks. USENIX Workshop on Free and Open Communications on the Internet (FOCI 11).
2010
Perdisci R, Lee W, Feamster N.  2010.  Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces. 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI 10).
Antonakakis M, Perdisci R, Dagon D, Lee W, Feamster N.  2010.  Building a Dynamic Reputation System for DNS. 19th USENIX Security Symposium (USENIX Security 10).
2006
Fogla P, Sharif M, Perdisci R, Kolesnikov O, Lee W.  2006.  Polymorphic Blending Attacks. 15th USENIX Security Symposium (USENIX Security 06).

Pages