USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 10 results:
Filters: Author is Hong Hu [Clear All Filters]
VIPER: Spotting Syscall-Guard Variables for Data-Only Attacks. 32nd USENIX Security Symposium (USENIX Security 23). :1397--1414.
.
2023. µFUZZ: Redesign of Parallel Fuzzing using Microservice Architecture. 32nd USENIX Security Symposium (USENIX Security 23). :1325--1342.
.
2023. Detecting Logical Bugs of DBMS with Coverage-based Guidance. 31st USENIX Security Symposium (USENIX Security 22). :4309--4326.
.
2022. FreeWill: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting Detection on Binaries. 31st USENIX Security Symposium (USENIX Security 22). :2497--2512.
.
2022. Abusing Hidden Properties to Attack the Node.js Ecosystem. 30th USENIX Security Symposium (USENIX Security 21). :2951--2968.
.
2021. Preventing Use-After-Free Attacks with Fast Forward Allocation. 30th USENIX Security Symposium (USENIX Security 21). :2453--2470.
.
2021. Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems. 30th USENIX Security Symposium (USENIX Security 21). :303--319.
.
2021. Fuzzification: Anti-Fuzzing Techniques. 28th USENIX Security Symposium (USENIX Security 19). :1913--1930.
.
2019. RAZOR: A Framework for Post-deployment Software Debloating. 28th USENIX Security Symposium (USENIX Security 19). :1733--1750.
.
2019. Automatic Generation of Data-Oriented Exploits. 24th USENIX Security Symposium (USENIX Security 15). :177--192.
.
2015.