USENIX reaffirms its commitment to diversity, equity, and inclusion.
Biblio
Export 6 results:
Filters: Author is Hong Hu [Clear All Filters]
Abusing Hidden Properties to Attack the Node.js Ecosystem. 30th USENIX Security Symposium (USENIX Security 21). :2951--2968.
.
2021. Preventing Use-After-Free Attacks with Fast Forward Allocation. 30th USENIX Security Symposium (USENIX Security 21). :2453--2470.
.
2021. Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems. 30th USENIX Security Symposium (USENIX Security 21). :303--319.
.
2021. Fuzzification: Anti-Fuzzing Techniques. 28th USENIX Security Symposium (USENIX Security 19). :1913--1930.
.
2019. RAZOR: A Framework for Post-deployment Software Debloating. 28th USENIX Security Symposium (USENIX Security 19). :1733--1750.
.
2019. Automatic Generation of Data-Oriented Exploits. 24th USENIX Security Symposium (USENIX Security 15). :177--192.
.
2015.