Export 23 results:
Filters: Author is Wenke Lee  [Clear All Filters]
Qian C, Hu H, Alharthi M, Chung PHo, Kim T, Lee W.  2019.  RAZOR: A Framework for Post-deployment Software Debloating. 28th USENIX Security Symposium (USENIX Security 19). :1733--1750.
Xu M, Lu K, Kim T, Lee W.  2017.  Bunshin: Compositing Security Mechanisms through Diversification. 2017 USENIX Annual Technical Conference (USENIX ATC 17). :271--283.
Ding R, Qian C, Song C, Harris B, Kim T, Lee W.  2017.  Efficient Protection of Path-Sensitive Control Security. 26th USENIX Security Symposium (USENIX Security 17). :131--148.
Lee B, Song C, Kim T, Lee W.  2015.  Type Casting Verification: Stopping an Emerging Attack Vector. 24th USENIX Security Symposium (USENIX Security 15). :81--96.
Wang T, Lu K, Lu L, Chung S, Lee W.  2013.  Jekyll on iOS: When Benign Apps Become Evil. 22nd USENIX Security Symposium (USENIX Security 13). :559--572.
Xing X, Meng W, Doozan D, Snoeren AC, Feamster N, Lee W.  2013.  Take This Personally: Pollution Attacks on Personalized Services. 22nd USENIX Security Symposium (USENIX Security 13). :671--686.
Antonakakis M, Perdisci R, Lee W, Vasiloglou, II N, Dagon D.  2011.  Detecting Malware Domains at the Upper DNS Hierarchy. 20th USENIX Security Symposium (USENIX Security 11).
Feamster N, Lee W.  2011.  Opening Remarks. USENIX Workshop on Free and Open Communications on the Internet (FOCI 11).
Perdisci R, Lee W, Feamster N.  2010.  Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces. 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI 10).
Antonakakis M, Perdisci R, Dagon D, Lee W, Feamster N.  2010.  Building a Dynamic Reputation System for DNS. 19th USENIX Security Symposium (USENIX Security 10).
Fogla P, Sharif M, Perdisci R, Kolesnikov O, Lee W.  2006.  Polymorphic Blending Attacks. 15th USENIX Security Symposium (USENIX Security 06).
Lee W, Park C, Stolfo SJ.  1999.  Automated Intrusion Detection Methods Using NFR. 1st Workshop on Intrusion Detection and Network Monitoring (ID 99).
Lee W, Stolfo SJ.  1998.  Data Mining Approaches for Intrusion Detection. 7th USENIX Security Symposium (USENIX Security 98).