Biblio

Export 6 results:
Filters: Author is Hong Hu  [Clear All Filters]
2021
Xiao F, Huang J, Xiong Y, Yang G, Hu H, Gu G, Lee W.  2021.  Abusing Hidden Properties to Attack the Node.js Ecosystem. 30th USENIX Security Symposium (USENIX Security 21). :2951--2968.
Wickman B, Hu H, Yun I, Jang DH, Lim JW, Kashyap S, Kim T.  2021.  Preventing Use-After-Free Attacks with Fast Forward Allocation. 30th USENIX Security Symposium (USENIX Security 21). :2453--2470.
Chen L, Wang Y, Cai Q, Zhan Y, Hu H, Linghu J, Hou Q, Zhang C, Duan H, Xue Z.  2021.  Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems. 30th USENIX Security Symposium (USENIX Security 21). :303--319.
2019
Jung J, Hu H, Solodukhin D, Pagan D, Lee KHyung, Kim T.  2019.  Fuzzification: Anti-Fuzzing Techniques. 28th USENIX Security Symposium (USENIX Security 19). :1913--1930.
Qian C, Hu H, Alharthi M, Chung PHo, Kim T, Lee W.  2019.  RAZOR: A Framework for Post-deployment Software Debloating. 28th USENIX Security Symposium (USENIX Security 19). :1733--1750.
2015
Hu H, Chua ZLeong, Adrian S, Saxena P, Liang Z.  2015.  Automatic Generation of Data-Oriented Exploits. 24th USENIX Security Symposium (USENIX Security 15). :177--192.