USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 27 results:
Filters: Author is Wenke Lee [Clear All Filters]
PUMM: Preventing Use-After-Free Using Execution Unit Partitioning. 32nd USENIX Security Symposium (USENIX Security 23). :823--840.
.
2023. TRIDENT: Towards Detecting and Mitigating Web-based Social Engineering Attacks. 32nd USENIX Security Symposium (USENIX Security 23). :6701--6718.
.
2023. VulChecker: Graph-based Vulnerability Localization in Source Code. 32nd USENIX Security Symposium (USENIX Security 23). :6557--6574.
.
2023. µFUZZ: Redesign of Parallel Fuzzing using Microservice Architecture. 32nd USENIX Security Symposium (USENIX Security 23). :1325--1342.
.
2023. Abusing Hidden Properties to Attack the Node.js Ecosystem. 30th USENIX Security Symposium (USENIX Security 21). :2951--2968.
.
2021. ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems. 30th USENIX Security Symposium (USENIX Security 21). :1989--2006.
.
2021. DeepReflect: Discovering Malicious Functionality through Binary Reconstruction. 30th USENIX Security Symposium (USENIX Security 21). :3469--3486.
.
2021. Fuzzy Labeled Private Set Intersection with Applications to Private Real-Time Biometric Search. 30th USENIX Security Symposium (USENIX Security 21). :911--928.
.
2021. RAZOR: A Framework for Post-deployment Software Debloating. 28th USENIX Security Symposium (USENIX Security 19). :1733--1750.
.
2019. Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking. 27th USENIX Security Symposium (USENIX Security 18). :1705--1722.
.
2018. Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks. 27th USENIX Security Symposium (USENIX Security 18). :393--410.
.
2018. Bunshin: Compositing Security Mechanisms through Diversification. 2017 USENIX Annual Technical Conference (USENIX ATC 17). :271--283.
.
2017. Efficient Protection of Path-Sensitive Control Security. 26th USENIX Security Symposium (USENIX Security 17). :131--148.
.
2017. Type Casting Verification: Stopping an Emerging Attack Vector. 24th USENIX Security Symposium (USENIX Security 15). :81--96.
.
2015. On the Feasibility of Large-Scale Infections of iOS Devices. 23rd USENIX Security Symposium (USENIX Security 14). :79--93.
.
2014. Mimesis Aegis: A Mimicry Privacy Shield–A System’s Approach to Data Privacy on Public Cloud. 23rd USENIX Security Symposium (USENIX Security 14). :33--48.
.
2014. Jekyll on iOS: When Benign Apps Become Evil. 22nd USENIX Security Symposium (USENIX Security 13). :559--572.
.
2013. Take This Personally: Pollution Attacks on Personalized Services. 22nd USENIX Security Symposium (USENIX Security 13). :671--686.
.
2013. From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware. 21st USENIX Security Symposium (USENIX Security 12). :491--506.
.
2012. Detecting Malware Domains at the Upper DNS Hierarchy. 20th USENIX Security Symposium (USENIX Security 11).
.
2011. Opening Remarks. USENIX Workshop on Free and Open Communications on the Internet (FOCI 11).
.
2011. Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces. 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI 10).
.
2010. Building a Dynamic Reputation System for DNS. 19th USENIX Security Symposium (USENIX Security 10).
.
2010. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. 17th USENIX Security Symposium (USENIX Security 08).
.
2008. Polymorphic Blending Attacks. 15th USENIX Security Symposium (USENIX Security 06).
.
2006.