Biblio

Export 23 results:
Filters: Author is Wenke Lee  [Clear All Filters]
2019
Qian C, Hu H, Alharthi M, Chung PHo, Kim T, Lee W.  2019.  RAZOR: A Framework for Post-deployment Software Debloating. 28th USENIX Security Symposium (USENIX Security 19). :1733--1750.
2017
Xu M, Lu K, Kim T, Lee W.  2017.  Bunshin: Compositing Security Mechanisms through Diversification. 2017 USENIX Annual Technical Conference (USENIX ATC 17). :271--283.
Ding R, Qian C, Song C, Harris B, Kim T, Lee W.  2017.  Efficient Protection of Path-Sensitive Control Security. 26th USENIX Security Symposium (USENIX Security 17). :131--148.
2015
Lee B, Song C, Kim T, Lee W.  2015.  Type Casting Verification: Stopping an Emerging Attack Vector. 24th USENIX Security Symposium (USENIX Security 15). :81--96.
2013
Wang T, Lu K, Lu L, Chung S, Lee W.  2013.  Jekyll on iOS: When Benign Apps Become Evil. 22nd USENIX Security Symposium (USENIX Security 13). :559--572.
Xing X, Meng W, Doozan D, Snoeren AC, Feamster N, Lee W.  2013.  Take This Personally: Pollution Attacks on Personalized Services. 22nd USENIX Security Symposium (USENIX Security 13). :671--686.
2011
Antonakakis M, Perdisci R, Lee W, Vasiloglou, II N, Dagon D.  2011.  Detecting Malware Domains at the Upper DNS Hierarchy. 20th USENIX Security Symposium (USENIX Security 11).
Feamster N, Lee W.  2011.  Opening Remarks. USENIX Workshop on Free and Open Communications on the Internet (FOCI 11).
2010
Perdisci R, Lee W, Feamster N.  2010.  Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces. 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI 10).
Antonakakis M, Perdisci R, Dagon D, Lee W, Feamster N.  2010.  Building a Dynamic Reputation System for DNS. 19th USENIX Security Symposium (USENIX Security 10).
2006
Fogla P, Sharif M, Perdisci R, Kolesnikov O, Lee W.  2006.  Polymorphic Blending Attacks. 15th USENIX Security Symposium (USENIX Security 06).
1999
Lee W, Park C, Stolfo SJ.  1999.  Automated Intrusion Detection Methods Using NFR. 1st Workshop on Intrusion Detection and Network Monitoring (ID 99).
1998
Lee W, Stolfo SJ.  1998.  Data Mining Approaches for Intrusion Detection. 7th USENIX Security Symposium (USENIX Security 98).