BibTeX records: Kangjie Lu

download as .bib file

@article{DBLP:journals/tdsc/WuXWZLZLKYL23,
  author       = {Chenggang Wu and
                  Mengyao Xie and
                  Zhe Wang and
                  Yinqian Zhang and
                  Kangjie Lu and
                  Xiaofeng Zhang and
                  Yuanming Lai and
                  Yan Kang and
                  Min Yang and
                  Tao Li},
  title        = {Dancing With Wolves: An Intra-Process Isolation Technique With Privileged
                  Hardware},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {3},
  pages        = {1959--1978},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3168089},
  doi          = {10.1109/TDSC.2022.3168089},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/WuXWZLZLKYL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZengLLX0DSB23,
  author       = {Kyle Zeng and
                  Zhenpeng Lin and
                  Kangjie Lu and
                  Xinyu Xing and
                  Ruoyu Wang and
                  Adam Doup{\'{e}} and
                  Yan Shoshitaishvili and
                  Tiffany Bao},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel
                  Protections},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {3093--3107},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623220},
  doi          = {10.1145/3576915.3623220},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZengLLX0DSB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/BaiWWL23,
  author       = {Weiheng Bai and
                  Kefu Wu and
                  Qiushi Wu and
                  Kangjie Lu},
  title        = {Guiding Directed Fuzzing with Feasibility},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2023 - Workshops, Delft, Netherlands, July 3-7, 2023},
  pages        = {42--49},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EuroSPW59978.2023.00010},
  doi          = {10.1109/EUROSPW59978.2023.00010},
  timestamp    = {Mon, 07 Aug 2023 15:56:24 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/BaiWWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Lu23,
  author       = {Kangjie Lu},
  title        = {Practical Program Modularization with Type-Based Dependence Analysis},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {1256--1270},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179412},
  doi          = {10.1109/SP46215.2023.10179412},
  timestamp    = {Thu, 27 Jul 2023 08:17:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Lu23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LiuJFLZQWC23,
  author       = {Peiyu Liu and
                  Shouling Ji and
                  Lirong Fu and
                  Kangjie Lu and
                  Xuhong Zhang and
                  Jingchang Qin and
                  Wenhai Wang and
                  Wenzhi Chen},
  title        = {How IoT Re-using Threatens Your Sensitive Data: Exploring the User-Data
                  Disposal in Used IoT Devices},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {3365--3381},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179294},
  doi          = {10.1109/SP46215.2023.10179294},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/LiuJFLZQWC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/XuLDDLWPM23,
  author       = {Jianhao Xu and
                  Kangjie Lu and
                  Zhengjie Du and
                  Zhu Ding and
                  Linke Li and
                  Qiushi Wu and
                  Mathias Payer and
                  Bing Mao},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Silent Bugs Matter: {A} Study of Compiler-Introduced Security Bugs},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {3655--3672},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/xu-jianhao},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/XuLDDLWPM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Fleischer0BBLPK23,
  author       = {Marius Fleischer and
                  Dipanjan Das and
                  Priyanka Bose and
                  Weiheng Bai and
                  Kangjie Lu and
                  Mathias Payer and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {{ACTOR:} Action-Guided Kernel Fuzzing},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {5003--5020},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/fleischer},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Fleischer0BBLPK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-06530,
  author       = {Peiyu Liu and
                  Junming Liu and
                  Lirong Fu and
                  Kangjie Lu and
                  Yifan Xia and
                  Xuhong Zhang and
                  Wenzhi Chen and
                  Haiqin Weng and
                  Shouling Ji and
                  Wenhai Wang},
  title        = {How ChatGPT is Solving Vulnerability Management Problem},
  journal      = {CoRR},
  volume       = {abs/2311.06530},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.06530},
  doi          = {10.48550/ARXIV.2311.06530},
  eprinttype    = {arXiv},
  eprint       = {2311.06530},
  timestamp    = {Wed, 15 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-06530.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-12058,
  author       = {Zichen Yu and
                  Changyong Shu and
                  Jiajun Deng and
                  Kangjie Lu and
                  Zongdai Liu and
                  Jiangyong Yu and
                  Dawei Yang and
                  Hui Li and
                  Yan Chen},
  title        = {FlashOcc: Fast and Memory-Efficient Occupancy Prediction via Channel-to-Height
                  Plugin},
  journal      = {CoRR},
  volume       = {abs/2311.12058},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.12058},
  doi          = {10.48550/ARXIV.2311.12058},
  eprinttype    = {arXiv},
  eprint       = {2311.12058},
  timestamp    = {Wed, 29 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-12058.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmetrics/WuCNZLZZ22,
  author       = {Ziyan Wu and
                  Tianming Cui and
                  Arvind Narayanan and
                  Yang Zhang and
                  Kangjie Lu and
                  Antonia Zhai and
                  Zhi{-}Li Zhang},
  title        = {GranularNF: Granular Decomposition of Stateful {NFV} at 100 Gbps Line
                  Speed and Beyond},
  journal      = {{SIGMETRICS} Perform. Evaluation Rev.},
  volume       = {50},
  number       = {2},
  pages        = {46--51},
  year         = {2022},
  url          = {https://doi.org/10.1145/3561074.3561092},
  doi          = {10.1145/3561074.3561092},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigmetrics/WuCNZLZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangLWP22,
  author       = {Bowen Wang and
                  Kangjie Lu and
                  Qiushi Wu and
                  Aditya Pakki},
  title        = {Unleashing Coveraged-Based Fuzzing Through Comprehensive, Efficient,
                  and Faithful Exploitable-Bug Exposing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {5},
  pages        = {2998--3010},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3079857},
  doi          = {10.1109/TDSC.2021.3079857},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WangLWP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tr/LiCSLS22,
  author       = {Zhao Li and
                  Yuhang Chen and
                  Yi Song and
                  Kangjie Lu and
                  Jinwei Shen},
  title        = {Effective Covering Array Generation Using an Improved Particle Swarm
                  Optimization},
  journal      = {{IEEE} Trans. Reliab.},
  volume       = {71},
  number       = {1},
  pages        = {284--294},
  year         = {2022},
  url          = {https://doi.org/10.1109/TR.2021.3132147},
  doi          = {10.1109/TR.2021.3132147},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tr/LiCSLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YangSXLWZQY022,
  author       = {Yutian Yang and
                  Wenbo Shen and
                  Xun Xie and
                  Kangjie Lu and
                  Mingsen Wang and
                  Tianyu Zhou and
                  Chenggang Qin and
                  Wang Yu and
                  Kui Ren},
  title        = {Making Memory Account Accountable: Analyzing and Detecting Memory
                  Missing-account bugs for Container Platforms},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {869--880},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564634},
  doi          = {10.1145/3564625.3564634},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/YangSXLWZQY022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhouWLJL22,
  author       = {Qingyang Zhou and
                  Qiushi Wu and
                  Dinghao Liu and
                  Shouling Ji and
                  Kangjie Lu},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Non-Distinguishable Inconsistencies as a Deterministic Oracle for
                  Detecting Security Bugs},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {3253--3267},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560661},
  doi          = {10.1145/3548606.3560661},
  timestamp    = {Sat, 17 Dec 2022 01:15:29 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhouWLJL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/JiangBL022,
  author       = {Zu{-}Ming Jiang and
                  Jia{-}Ju Bai and
                  Kangjie Lu and
                  Shi{-}Min Hu},
  title        = {Context-Sensitive and Directional Concurrency Fuzzing for Data-Race
                  Detection},
  booktitle    = {29th Annual Network and Distributed System Security Symposium, {NDSS}
                  2022, San Diego, California, USA, April 24-28, 2022},
  publisher    = {The Internet Society},
  year         = {2022},
  url          = {https://www.ndss-symposium.org/ndss-paper/auto-draft-198/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/JiangBL022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LyuJ0LZLB22,
  author       = {Chenyang Lyu and
                  Shouling Ji and
                  Xuhong Zhang and
                  Hong Liang and
                  Binbin Zhao and
                  Kangjie Lu and
                  Raheem Beyah},
  title        = {{EMS:} History-Driven Mutation for Coverage-based Fuzzing},
  booktitle    = {29th Annual Network and Distributed System Security Symposium, {NDSS}
                  2022, San Diego, California, USA, April 24-28, 2022},
  publisher    = {The Internet Society},
  year         = {2022},
  url          = {https://www.ndss-symposium.org/ndss-paper/auto-draft-201/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/LyuJ0LZLB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ZhaoLWQ22,
  author       = {Wenjia Zhao and
                  Kangjie Lu and
                  Qiushi Wu and
                  Yong Qi},
  title        = {Semantic-Informed Driver Fuzzing Without Both the Hardware Devices
                  and the Emulators},
  booktitle    = {29th Annual Network and Distributed System Security Symposium, {NDSS}
                  2022, San Diego, California, USA, April 24-28, 2022},
  publisher    = {The Internet Society},
  year         = {2022},
  url          = {https://www.ndss-symposium.org/ndss-paper/auto-draft-248/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/ZhaoLWQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/00010L22,
  author       = {Penghui Li and
                  Wei Meng and
                  Kangjie Lu},
  editor       = {Abhik Roychoudhury and
                  Cristian Cadar and
                  Miryung Kim},
  title        = {SEDiff: scope-aware differential fuzzing to test internal function
                  models in symbolic execution},
  booktitle    = {Proceedings of the 30th {ACM} Joint European Software Engineering
                  Conference and Symposium on the Foundations of Software Engineering,
                  {ESEC/FSE} 2022, Singapore, Singapore, November 14-18, 2022},
  pages        = {57--69},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3540250.3549080},
  doi          = {10.1145/3540250.3549080},
  timestamp    = {Thu, 10 Nov 2022 11:14:54 +0100},
  biburl       = {https://dblp.org/rec/conf/sigsoft/00010L22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LyuFZSMBLL22,
  author       = {Yunlong Lyu and
                  Yi Fang and
                  Yiwei Zhang and
                  Qibin Sun and
                  Siqi Ma and
                  Elisa Bertino and
                  Kangjie Lu and
                  Juanru Li},
  title        = {Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric
                  Memory Operation Synopsis},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {2096--2113},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833613},
  doi          = {10.1109/SP46214.2022.9833613},
  timestamp    = {Thu, 21 Sep 2023 15:57:27 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/LyuFZSMBLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WuXLL22,
  author       = {Qiushi Wu and
                  Yue Xiao and
                  Xiaojing Liao and
                  Kangjie Lu},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {OS-Aware Vulnerability Prioritization via Differential Severity Analysis},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {395--412},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/wu-qiushi},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/WuXLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LuXSKL21,
  author       = {Kangjie Lu and
                  Meng Xu and
                  Chengyu Song and
                  Taesoo Kim and
                  Wenke Lee},
  title        = {Stopping Memory Disclosures via Diversification and Replicated Execution},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {1},
  pages        = {160--173},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2018.2878234},
  doi          = {10.1109/TDSC.2018.2878234},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LuXSKL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YangSLYLXZQY0021,
  author       = {Nanzi Yang and
                  Wenbo Shen and
                  Jinku Li and
                  Yutian Yang and
                  Kangjie Lu and
                  Jietao Xiao and
                  Tianyu Zhou and
                  Chenggang Qin and
                  Wang Yu and
                  Jianfeng Ma and
                  Kui Ren},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level
                  Virtualization},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {764--778},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484744},
  doi          = {10.1145/3460120.3484744},
  timestamp    = {Tue, 16 Nov 2021 12:59:46 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YangSLYLXZQY0021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FuJLL0DZCW21,
  author       = {Lirong Fu and
                  Shouling Ji and
                  Kangjie Lu and
                  Peiyu Liu and
                  Xuhong Zhang and
                  Yuxuan Duan and
                  Zihui Zhang and
                  Wenzhi Chen and
                  Yanjun Wu},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {CPscan: Detecting Bugs Caused by Code Pruning in IoT Kernels},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {794--810},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484738},
  doi          = {10.1145/3460120.3484738},
  timestamp    = {Thu, 13 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/FuJLL0DZCW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiuWJLLCH21,
  author       = {Dinghao Liu and
                  Qiushi Wu and
                  Shouling Ji and
                  Kangjie Lu and
                  Zhenguang Liu and
                  Jianhai Chen and
                  Qinming He},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Detecting Missed Security Operations Through Differential Checking
                  of Object-based Similar Paths},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {1627--1644},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3485373},
  doi          = {10.1145/3460120.3485373},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiuWJLLCH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/LiuJ0DLFCCWB21,
  author       = {Peiyu Liu and
                  Shouling Ji and
                  Xuhong Zhang and
                  Qinming Dai and
                  Kangjie Lu and
                  Lirong Fu and
                  Wenzhi Chen and
                  Peng Cheng and
                  Wenhai Wang and
                  Raheem Beyah},
  title        = {{IFIZZ:} Deep-State and Efficient Fault-Scenario Generation to Test
                  IoT Firmware},
  booktitle    = {36th {IEEE/ACM} International Conference on Automated Software Engineering,
                  {ASE} 2021, Melbourne, Australia, November 15-19, 2021},
  pages        = {805--816},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ASE51524.2021.9678785},
  doi          = {10.1109/ASE51524.2021.9678785},
  timestamp    = {Thu, 13 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/kbse/LiuJ0DLFCCWB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/EmamdoostWLM21,
  author       = {Navid Emamdoost and
                  Qiushi Wu and
                  Kangjie Lu and
                  Stephen McCamant},
  title        = {Detecting Kernel Memory Leaks in Specialized Modules with Ownership
                  Reasoning},
  booktitle    = {28th Annual Network and Distributed System Security Symposium, {NDSS}
                  2021, virtually, February 21-25, 2021},
  publisher    = {The Internet Society},
  year         = {2021},
  url          = {https://www.ndss-symposium.org/ndss-paper/detecting-kernel-memory-leaks-in-specialized-modules-with-ownership-reasoning/},
  timestamp    = {Thu, 17 Jun 2021 15:42:26 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/EmamdoostWLM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BaiLL021,
  author       = {Jia{-}Ju Bai and
                  Tuo Li and
                  Kangjie Lu and
                  Shi{-}Min Hu},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Static Detection of Unsafe {DMA} Accesses in Device Drivers},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1629--1645},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/bai},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BaiLL021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WuPEML21,
  author       = {Qiushi Wu and
                  Aditya Pakki and
                  Navid Emamdoost and
                  Stephen McCamant and
                  Kangjie Lu},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Understanding and Detecting Disordered Error Handling with Precise
                  Function Pairing},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2041--2058},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/wu-qiushi},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/WuPEML21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Tan0YL021,
  author       = {Xin Tan and
                  Yuan Zhang and
                  Xiyu Yang and
                  Kangjie Lu and
                  Min Yang},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2471--2488},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/tan},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Tan0YL021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LiJCLLCLWBCL021,
  author       = {Yuwei Li and
                  Shouling Ji and
                  Yuan Chen and
                  Sizhuang Liang and
                  Wei{-}Han Lee and
                  Yueyao Chen and
                  Chenyang Lyu and
                  Chunming Wu and
                  Raheem Beyah and
                  Peng Cheng and
                  Kangjie Lu and
                  Ting Wang},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{UNIFUZZ:} {A} Holistic and Pragmatic Metrics-Driven Platform for
                  Evaluating Fuzzers},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2777--2794},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/li-yuwei},
  timestamp    = {Fri, 29 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LiJCLLCLWBCL021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/LiMLL21,
  author       = {Penghui Li and
                  Wei Meng and
                  Kangjie Lu and
                  Changhua Luo},
  editor       = {Jure Leskovec and
                  Marko Grobelnik and
                  Marc Najork and
                  Jie Tang and
                  Leila Zia},
  title        = {On the Feasibility of Automated Built-in Function Modeling for {PHP}
                  Symbolic Execution},
  booktitle    = {{WWW} '21: The Web Conference 2021, Virtual Event / Ljubljana, Slovenia,
                  April 19-23, 2021},
  pages        = {58--69},
  publisher    = {{ACM} / {IW3C2}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3442381.3450002},
  doi          = {10.1145/3442381.3450002},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/LiMLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PakkiL20,
  author       = {Aditya Pakki and
                  Kangjie Lu},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {Exaggerated Error Handling Hurts! An In-Depth Study and Context-Aware
                  Detection},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {1203--1218},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3417256},
  doi          = {10.1145/3372297.3417256},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PakkiL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LiuJFLZLLCB20,
  author       = {Peiyu Liu and
                  Shouling Ji and
                  Lirong Fu and
                  Kangjie Lu and
                  Xuhong Zhang and
                  Wei{-}Han Lee and
                  Tao Lu and
                  Wenzhi Chen and
                  Raheem Beyah},
  editor       = {Liqun Chen and
                  Ninghui Li and
                  Kaitai Liang and
                  Steve A. Schneider},
  title        = {Understanding the Security Risks of Docker Hub},
  booktitle    = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research
                  in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18,
                  2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12308},
  pages        = {257--276},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58951-6\_13},
  doi          = {10.1007/978-3-030-58951-6\_13},
  timestamp    = {Thu, 13 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/LiuJFLZLLCB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/ZhaoLQQ20,
  author       = {Wenjia Zhao and
                  Kangjie Lu and
                  Yong Qi and
                  Saiyu Qi},
  editor       = {Angelos Bilas and
                  Kostas Magoutis and
                  Evangelos P. Markatos and
                  Dejan Kostic and
                  Margo I. Seltzer},
  title        = {{MPTEE:} bringing flexible and efficient memory protection to Intel
                  {SGX}},
  booktitle    = {EuroSys '20: Fifteenth EuroSys Conference 2020, Heraklion, Greece,
                  April 27-30, 2020},
  pages        = {18:1--18:15},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3342195.3387536},
  doi          = {10.1145/3342195.3387536},
  timestamp    = {Thu, 10 Sep 2020 09:33:09 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosys/ZhaoLQQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WuHML20,
  author       = {Qiushi Wu and
                  Yang He and
                  Stephen McCamant and
                  Kangjie Lu},
  title        = {Precisely Characterizing Security Impact in a Flood of Patches via
                  Symbolic Rule Comparison},
  booktitle    = {27th Annual Network and Distributed System Security Symposium, {NDSS}
                  2020, San Diego, California, USA, February 23-26, 2020},
  publisher    = {The Internet Society},
  year         = {2020},
  url          = {https://www.ndss-symposium.org/ndss-paper/precisely-characterizing-security-impact-in-a-flood-of-patches-via-symbolic-rule-comparison/},
  timestamp    = {Mon, 01 Feb 2021 08:42:10 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/WuHML20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Wang0XZLZLKY20,
  author       = {Zhe Wang and
                  Chenggang Wu and
                  Mengyao Xie and
                  Yinqian Zhang and
                  Kangjie Lu and
                  Xiaofeng Zhang and
                  Yuanming Lai and
                  Yan Kang and
                  Min Yang},
  title        = {{SEIMI:} Efficient and Secure SMAP-Enabled Intra-process Memory Isolation},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {592--607},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00087},
  doi          = {10.1109/SP40000.2020.00087},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/Wang0XZLZLKY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JiangBL020,
  author       = {Zu{-}Ming Jiang and
                  Jia{-}Ju Bai and
                  Kangjie Lu and
                  Shi{-}Min Hu},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {Fuzzing Error Handling Code using Context-Sensitive Software Fault
                  Injection},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {2595--2612},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/jiang},
  timestamp    = {Fri, 29 Jan 2021 22:08:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JiangBL020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-01785,
  author       = {Yuwei Li and
                  Shouling Ji and
                  Yuan Chen and
                  Sizhuang Liang and
                  Wei{-}Han Lee and
                  Yueyao Chen and
                  Chenyang Lyu and
                  Chunming Wu and
                  Raheem Beyah and
                  Peng Cheng and
                  Kangjie Lu and
                  Ting Wang},
  title        = {{UNIFUZZ:} {A} Holistic and Pragmatic Metrics-Driven Platform for
                  Evaluating Fuzzers},
  journal      = {CoRR},
  volume       = {abs/2010.01785},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.01785},
  eprinttype    = {arXiv},
  eprint       = {2010.01785},
  timestamp    = {Fri, 29 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-01785.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LuH19,
  author       = {Kangjie Lu and
                  Hong Hu},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Where Does It Go?: Refining Indirect-Call Targets with Multi-Layer
                  Type Analysis},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {1867--1881},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3354244},
  doi          = {10.1145/3319535.3354244},
  timestamp    = {Tue, 10 Nov 2020 20:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LuH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LuPW19,
  author       = {Kangjie Lu and
                  Aditya Pakki and
                  Qiushi Wu},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Automatically Identifying Security Checks for Detecting Kernel Semantic
                  Bugs},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11736},
  pages        = {3--25},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29962-0\_1},
  doi          = {10.1007/978-3-030-29962-0\_1},
  timestamp    = {Mon, 05 Feb 2024 20:29:41 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/LuPW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LuPW19,
  author       = {Kangjie Lu and
                  Aditya Pakki and
                  Qiushi Wu},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {Detecting Missing-Check Bugs via Semantic- and Context-Aware Criticalness
                  and Constraints Inferences},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {1769--1786},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/lu},
  timestamp    = {Mon, 01 Feb 2021 08:43:12 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/LuPW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangLY18,
  author       = {Wenwen Wang and
                  Kangjie Lu and
                  Pen{-}Chung Yew},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {Check It Again: Detecting Lacking-Recheck Bugs in {OS} Kernels},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {1899--1913},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243844},
  doi          = {10.1145/3243734.3243844},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/WangLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/XuQL0K18,
  author       = {Meng Xu and
                  Chenxiong Qian and
                  Kangjie Lu and
                  Michael Backes and
                  Taesoo Kim},
  title        = {Precise and Scalable Detection of Double-Fetch Bugs in {OS} Kernels},
  booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  pages        = {661--678},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SP.2018.00017},
  doi          = {10.1109/SP.2018.00017},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/XuQL0K18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Lu17a,
  author       = {Kangjie Lu},
  title        = {Securing software systems by preventing information leaks},
  school       = {Georgia Institute of Technology, Atlanta, GA, {USA}},
  year         = {2017},
  url          = {https://hdl.handle.net/1853/58749},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/basesearch/Lu17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LuWPNL017,
  author       = {Kangjie Lu and
                  Marie{-}Therese Walter and
                  David Pfaff and
                  Stefan N{\"{u}}mberger and
                  Wenke Lee and
                  Michael Backes},
  title        = {Unleashing Use-Before-Initialization Vulnerabilities in the Linux
                  Kernel Using Targeted Stack Spraying},
  booktitle    = {24th Annual Network and Distributed System Security Symposium, {NDSS}
                  2017, San Diego, California, USA, February 26 - March 1, 2017},
  publisher    = {The Internet Society},
  year         = {2017},
  url          = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/unleashing-use-initialization-vulnerabilities-linux-kernel-using-targeted-stack-spraying/},
  timestamp    = {Mon, 01 Feb 2021 08:42:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/LuWPNL017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/XuLKL17,
  author       = {Meng Xu and
                  Kangjie Lu and
                  Taesoo Kim and
                  Wenke Lee},
  editor       = {Dilma Da Silva and
                  Bryan Ford},
  title        = {Bunshin: Compositing Security Mechanisms through Diversification},
  booktitle    = {2017 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2017, Santa
                  Clara, CA, USA, July 12-14, 2017},
  pages        = {271--283},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/atc17/technical-sessions/presentation/xu-meng},
  timestamp    = {Mon, 01 Feb 2021 08:43:34 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/XuLKL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/XuLKL17,
  author       = {Meng Xu and
                  Kangjie Lu and
                  Taesoo Kim and
                  Wenke Lee},
  title        = {Bunshin: Compositing Security Mechanisms through Diversification (with
                  Appendix)},
  journal      = {CoRR},
  volume       = {abs/1705.09165},
  year         = {2017},
  url          = {http://arxiv.org/abs/1705.09165},
  eprinttype    = {arXiv},
  eprint       = {1705.09165},
  timestamp    = {Tue, 27 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/XuLKL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/XuSJSLZDJLQLK16,
  author       = {Meng Xu and
                  Chengyu Song and
                  Yang Ji and
                  Ming{-}Wei Shih and
                  Kangjie Lu and
                  Cong Zheng and
                  Ruian Duan and
                  Yeongjin Jang and
                  Byoungyoung Lee and
                  Chenxiong Qian and
                  Sangho Lee and
                  Taesoo Kim},
  title        = {Toward Engineering a Secure Android Ecosystem: {A} Survey of Existing
                  Techniques},
  journal      = {{ACM} Comput. Surv.},
  volume       = {49},
  number       = {2},
  pages        = {38:1--38:47},
  year         = {2016},
  url          = {https://doi.org/10.1145/2963145},
  doi          = {10.1145/2963145},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/XuSJSLZDJLQLK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LuSKL16,
  author       = {Kangjie Lu and
                  Chengyu Song and
                  Taesoo Kim and
                  Wenke Lee},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {920--932},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978366},
  doi          = {10.1145/2976749.2978366},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LuSKL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LuLN016,
  author       = {Kangjie Lu and
                  Wenke Lee and
                  Stefan N{\"{u}}rnberger and
                  Michael Backes},
  title        = {How to Make {ASLR} Win the Clone Wars: Runtime Re-Randomization},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/how-make-aslr-win-clone-wars-runtime-re-randomization.pdf},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/LuLN016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/SongLLHKL16,
  author       = {Chengyu Song and
                  Byoungyoung Lee and
                  Kangjie Lu and
                  William Harris and
                  Taesoo Kim and
                  Wenke Lee},
  title        = {Enforcing Kernel Security Invariants with Data Flow Integrity},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/enforcing-kernal-security-invariants-data-flow-integrity.pdf},
  timestamp    = {Tue, 16 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/SongLLHKL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LuSLCKL15,
  author       = {Kangjie Lu and
                  Chengyu Song and
                  Byoungyoung Lee and
                  Simon P. Chung and
                  Taesoo Kim and
                  Wenke Lee},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {280--291},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813694},
  doi          = {10.1145/2810103.2813694},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LuSLCKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MaLMZJG15,
  author       = {Haoyu Ma and
                  Kangjie Lu and
                  Xinjie Ma and
                  Haining Zhang and
                  Chunfu Jia and
                  Debin Gao},
  editor       = {Feng Bao and
                  Steven Miller and
                  Jianying Zhou and
                  Gail{-}Joon Ahn},
  title        = {Software Watermarking using Return-Oriented Programming},
  booktitle    = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
                  2015},
  pages        = {369--380},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2714576.2714582},
  doi          = {10.1145/2714576.2714582},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MaLMZJG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LuLKWLZQLJ15,
  author       = {Kangjie Lu and
                  Zhichun Li and
                  Vasileios P. Kemerlis and
                  Zhenyu Wu and
                  Long Lu and
                  Cong Zheng and
                  Zhiyun Qian and
                  Wenke Lee and
                  Guofei Jiang},
  title        = {Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced
                  Data-flow Analysis and Peer Voting},
  booktitle    = {22nd Annual Network and Distributed System Security Symposium, {NDSS}
                  2015, San Diego, California, USA, February 8-11, 2015},
  publisher    = {The Internet Society},
  year         = {2015},
  url          = {https://www.ndss-symposium.org/ndss2015/checking-more-and-alerting-less-detecting-privacy-leakages-enhanced-data-flow-analysis-and-peer},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/LuLKWLZQLJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HuangLXWLZJ15,
  author       = {Jianjun Huang and
                  Zhichun Li and
                  Xusheng Xiao and
                  Zhenyu Wu and
                  Kangjie Lu and
                  Xiangyu Zhang and
                  Guofei Jiang},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {{SUPOR:} Precise and Scalable Sensitive User Input Detection for Android
                  Apps},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {977--992},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/huang},
  timestamp    = {Mon, 01 Feb 2021 08:42:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/HuangLXWLZJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/LuXG14,
  author       = {Kangjie Lu and
                  Siyang Xiong and
                  Debin Gao},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Jaehong Park},
  title        = {RopSteg: program steganography with return oriented programming},
  booktitle    = {Fourth {ACM} Conference on Data and Application Security and Privacy,
                  CODASPY'14, San Antonio, TX, {USA} - March 03 - 05, 2014},
  pages        = {265--272},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2557547.2557572},
  doi          = {10.1145/2557547.2557572},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/LuXG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WangLLCL13,
  author       = {Tielei Wang and
                  Kangjie Lu and
                  Long Lu and
                  Simon P. Chung and
                  Wenke Lee},
  editor       = {Samuel T. King},
  title        = {Jekyll on iOS: When Benign Apps Become Evil},
  booktitle    = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
                  USA, August 14-16, 2013},
  pages        = {559--572},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/wang\_tielei},
  timestamp    = {Mon, 01 Feb 2021 08:42:56 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/WangLLCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LuZWG11,
  author       = {Kangjie Lu and
                  Dabi Zou and
                  Weiping Wen and
                  Debin Gao},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {deRop: removing return-oriented programming from malware},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {363--372},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076784},
  doi          = {10.1145/2076732.2076784},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LuZWG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LuZWG11,
  author       = {Kangjie Lu and
                  Dabi Zou and
                  Weiping Wen and
                  Debin Gao},
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {Packed, Printable, and Polymorphic Return-Oriented Programming},
  booktitle    = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  pages        = {101--120},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0\_6},
  doi          = {10.1007/978-3-642-23644-0\_6},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/LuZWG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics