Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Kangjie Lu
@article{DBLP:journals/tdsc/WuXWZLZLKYL23, author = {Chenggang Wu and Mengyao Xie and Zhe Wang and Yinqian Zhang and Kangjie Lu and Xiaofeng Zhang and Yuanming Lai and Yan Kang and Min Yang and Tao Li}, title = {Dancing With Wolves: An Intra-Process Isolation Technique With Privileged Hardware}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {3}, pages = {1959--1978}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3168089}, doi = {10.1109/TDSC.2022.3168089}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/WuXWZLZLKYL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZengLLX0DSB23, author = {Kyle Zeng and Zhenpeng Lin and Kangjie Lu and Xinyu Xing and Ruoyu Wang and Adam Doup{\'{e}} and Yan Shoshitaishvili and Tiffany Bao}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {3093--3107}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623220}, doi = {10.1145/3576915.3623220}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZengLLX0DSB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/BaiWWL23, author = {Weiheng Bai and Kefu Wu and Qiushi Wu and Kangjie Lu}, title = {Guiding Directed Fuzzing with Feasibility}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2023 - Workshops, Delft, Netherlands, July 3-7, 2023}, pages = {42--49}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuroSPW59978.2023.00010}, doi = {10.1109/EUROSPW59978.2023.00010}, timestamp = {Mon, 07 Aug 2023 15:56:24 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/BaiWWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Lu23, author = {Kangjie Lu}, title = {Practical Program Modularization with Type-Based Dependence Analysis}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {1256--1270}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179412}, doi = {10.1109/SP46215.2023.10179412}, timestamp = {Thu, 27 Jul 2023 08:17:10 +0200}, biburl = {https://dblp.org/rec/conf/sp/Lu23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LiuJFLZQWC23, author = {Peiyu Liu and Shouling Ji and Lirong Fu and Kangjie Lu and Xuhong Zhang and Jingchang Qin and Wenhai Wang and Wenzhi Chen}, title = {How IoT Re-using Threatens Your Sensitive Data: Exploring the User-Data Disposal in Used IoT Devices}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {3365--3381}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179294}, doi = {10.1109/SP46215.2023.10179294}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/LiuJFLZQWC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/XuLDDLWPM23, author = {Jianhao Xu and Kangjie Lu and Zhengjie Du and Zhu Ding and Linke Li and Qiushi Wu and Mathias Payer and Bing Mao}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Silent Bugs Matter: {A} Study of Compiler-Introduced Security Bugs}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {3655--3672}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/xu-jianhao}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/XuLDDLWPM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Fleischer0BBLPK23, author = {Marius Fleischer and Dipanjan Das and Priyanka Bose and Weiheng Bai and Kangjie Lu and Mathias Payer and Christopher Kruegel and Giovanni Vigna}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {{ACTOR:} Action-Guided Kernel Fuzzing}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {5003--5020}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/fleischer}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Fleischer0BBLPK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-06530, author = {Peiyu Liu and Junming Liu and Lirong Fu and Kangjie Lu and Yifan Xia and Xuhong Zhang and Wenzhi Chen and Haiqin Weng and Shouling Ji and Wenhai Wang}, title = {How ChatGPT is Solving Vulnerability Management Problem}, journal = {CoRR}, volume = {abs/2311.06530}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.06530}, doi = {10.48550/ARXIV.2311.06530}, eprinttype = {arXiv}, eprint = {2311.06530}, timestamp = {Wed, 15 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-06530.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-12058, author = {Zichen Yu and Changyong Shu and Jiajun Deng and Kangjie Lu and Zongdai Liu and Jiangyong Yu and Dawei Yang and Hui Li and Yan Chen}, title = {FlashOcc: Fast and Memory-Efficient Occupancy Prediction via Channel-to-Height Plugin}, journal = {CoRR}, volume = {abs/2311.12058}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.12058}, doi = {10.48550/ARXIV.2311.12058}, eprinttype = {arXiv}, eprint = {2311.12058}, timestamp = {Wed, 29 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-12058.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmetrics/WuCNZLZZ22, author = {Ziyan Wu and Tianming Cui and Arvind Narayanan and Yang Zhang and Kangjie Lu and Antonia Zhai and Zhi{-}Li Zhang}, title = {GranularNF: Granular Decomposition of Stateful {NFV} at 100 Gbps Line Speed and Beyond}, journal = {{SIGMETRICS} Perform. Evaluation Rev.}, volume = {50}, number = {2}, pages = {46--51}, year = {2022}, url = {https://doi.org/10.1145/3561074.3561092}, doi = {10.1145/3561074.3561092}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigmetrics/WuCNZLZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangLWP22, author = {Bowen Wang and Kangjie Lu and Qiushi Wu and Aditya Pakki}, title = {Unleashing Coveraged-Based Fuzzing Through Comprehensive, Efficient, and Faithful Exploitable-Bug Exposing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {5}, pages = {2998--3010}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3079857}, doi = {10.1109/TDSC.2021.3079857}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangLWP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/LiCSLS22, author = {Zhao Li and Yuhang Chen and Yi Song and Kangjie Lu and Jinwei Shen}, title = {Effective Covering Array Generation Using an Improved Particle Swarm Optimization}, journal = {{IEEE} Trans. Reliab.}, volume = {71}, number = {1}, pages = {284--294}, year = {2022}, url = {https://doi.org/10.1109/TR.2021.3132147}, doi = {10.1109/TR.2021.3132147}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tr/LiCSLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YangSXLWZQY022, author = {Yutian Yang and Wenbo Shen and Xun Xie and Kangjie Lu and Mingsen Wang and Tianyu Zhou and Chenggang Qin and Wang Yu and Kui Ren}, title = {Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {869--880}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564634}, doi = {10.1145/3564625.3564634}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/YangSXLWZQY022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhouWLJL22, author = {Qingyang Zhou and Qiushi Wu and Dinghao Liu and Shouling Ji and Kangjie Lu}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {3253--3267}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560661}, doi = {10.1145/3548606.3560661}, timestamp = {Sat, 17 Dec 2022 01:15:29 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhouWLJL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/JiangBL022, author = {Zu{-}Ming Jiang and Jia{-}Ju Bai and Kangjie Lu and Shi{-}Min Hu}, title = {Context-Sensitive and Directional Concurrency Fuzzing for Data-Race Detection}, booktitle = {29th Annual Network and Distributed System Security Symposium, {NDSS} 2022, San Diego, California, USA, April 24-28, 2022}, publisher = {The Internet Society}, year = {2022}, url = {https://www.ndss-symposium.org/ndss-paper/auto-draft-198/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/JiangBL022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LyuJ0LZLB22, author = {Chenyang Lyu and Shouling Ji and Xuhong Zhang and Hong Liang and Binbin Zhao and Kangjie Lu and Raheem Beyah}, title = {{EMS:} History-Driven Mutation for Coverage-based Fuzzing}, booktitle = {29th Annual Network and Distributed System Security Symposium, {NDSS} 2022, San Diego, California, USA, April 24-28, 2022}, publisher = {The Internet Society}, year = {2022}, url = {https://www.ndss-symposium.org/ndss-paper/auto-draft-201/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/LyuJ0LZLB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ZhaoLWQ22, author = {Wenjia Zhao and Kangjie Lu and Qiushi Wu and Yong Qi}, title = {Semantic-Informed Driver Fuzzing Without Both the Hardware Devices and the Emulators}, booktitle = {29th Annual Network and Distributed System Security Symposium, {NDSS} 2022, San Diego, California, USA, April 24-28, 2022}, publisher = {The Internet Society}, year = {2022}, url = {https://www.ndss-symposium.org/ndss-paper/auto-draft-248/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/ZhaoLWQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/00010L22, author = {Penghui Li and Wei Meng and Kangjie Lu}, editor = {Abhik Roychoudhury and Cristian Cadar and Miryung Kim}, title = {SEDiff: scope-aware differential fuzzing to test internal function models in symbolic execution}, booktitle = {Proceedings of the 30th {ACM} Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, {ESEC/FSE} 2022, Singapore, Singapore, November 14-18, 2022}, pages = {57--69}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3540250.3549080}, doi = {10.1145/3540250.3549080}, timestamp = {Thu, 10 Nov 2022 11:14:54 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/00010L22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LyuFZSMBLL22, author = {Yunlong Lyu and Yi Fang and Yiwei Zhang and Qibin Sun and Siqi Ma and Elisa Bertino and Kangjie Lu and Juanru Li}, title = {Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {2096--2113}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833613}, doi = {10.1109/SP46214.2022.9833613}, timestamp = {Thu, 21 Sep 2023 15:57:27 +0200}, biburl = {https://dblp.org/rec/conf/sp/LyuFZSMBLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WuXLL22, author = {Qiushi Wu and Yue Xiao and Xiaojing Liao and Kangjie Lu}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {OS-Aware Vulnerability Prioritization via Differential Severity Analysis}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {395--412}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/wu-qiushi}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/WuXLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LuXSKL21, author = {Kangjie Lu and Meng Xu and Chengyu Song and Taesoo Kim and Wenke Lee}, title = {Stopping Memory Disclosures via Diversification and Replicated Execution}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {160--173}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2878234}, doi = {10.1109/TDSC.2018.2878234}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LuXSKL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YangSLYLXZQY0021, author = {Nanzi Yang and Wenbo Shen and Jinku Li and Yutian Yang and Kangjie Lu and Jietao Xiao and Tianyu Zhou and Chenggang Qin and Wang Yu and Jianfeng Ma and Kui Ren}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {764--778}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484744}, doi = {10.1145/3460120.3484744}, timestamp = {Tue, 16 Nov 2021 12:59:46 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YangSLYLXZQY0021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FuJLL0DZCW21, author = {Lirong Fu and Shouling Ji and Kangjie Lu and Peiyu Liu and Xuhong Zhang and Yuxuan Duan and Zihui Zhang and Wenzhi Chen and Yanjun Wu}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {CPscan: Detecting Bugs Caused by Code Pruning in IoT Kernels}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {794--810}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484738}, doi = {10.1145/3460120.3484738}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/FuJLL0DZCW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuWJLLCH21, author = {Dinghao Liu and Qiushi Wu and Shouling Ji and Kangjie Lu and Zhenguang Liu and Jianhai Chen and Qinming He}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Detecting Missed Security Operations Through Differential Checking of Object-based Similar Paths}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {1627--1644}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3485373}, doi = {10.1145/3460120.3485373}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiuWJLLCH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/LiuJ0DLFCCWB21, author = {Peiyu Liu and Shouling Ji and Xuhong Zhang and Qinming Dai and Kangjie Lu and Lirong Fu and Wenzhi Chen and Peng Cheng and Wenhai Wang and Raheem Beyah}, title = {{IFIZZ:} Deep-State and Efficient Fault-Scenario Generation to Test IoT Firmware}, booktitle = {36th {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2021, Melbourne, Australia, November 15-19, 2021}, pages = {805--816}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ASE51524.2021.9678785}, doi = {10.1109/ASE51524.2021.9678785}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/kbse/LiuJ0DLFCCWB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/EmamdoostWLM21, author = {Navid Emamdoost and Qiushi Wu and Kangjie Lu and Stephen McCamant}, title = {Detecting Kernel Memory Leaks in Specialized Modules with Ownership Reasoning}, booktitle = {28th Annual Network and Distributed System Security Symposium, {NDSS} 2021, virtually, February 21-25, 2021}, publisher = {The Internet Society}, year = {2021}, url = {https://www.ndss-symposium.org/ndss-paper/detecting-kernel-memory-leaks-in-specialized-modules-with-ownership-reasoning/}, timestamp = {Thu, 17 Jun 2021 15:42:26 +0200}, biburl = {https://dblp.org/rec/conf/ndss/EmamdoostWLM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BaiLL021, author = {Jia{-}Ju Bai and Tuo Li and Kangjie Lu and Shi{-}Min Hu}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Static Detection of Unsafe {DMA} Accesses in Device Drivers}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1629--1645}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/bai}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/BaiLL021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WuPEML21, author = {Qiushi Wu and Aditya Pakki and Navid Emamdoost and Stephen McCamant and Kangjie Lu}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Understanding and Detecting Disordered Error Handling with Precise Function Pairing}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2041--2058}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/wu-qiushi}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/WuPEML21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Tan0YL021, author = {Xin Tan and Yuan Zhang and Xiyu Yang and Kangjie Lu and Min Yang}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2471--2488}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/tan}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Tan0YL021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LiJCLLCLWBCL021, author = {Yuwei Li and Shouling Ji and Yuan Chen and Sizhuang Liang and Wei{-}Han Lee and Yueyao Chen and Chenyang Lyu and Chunming Wu and Raheem Beyah and Peng Cheng and Kangjie Lu and Ting Wang}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{UNIFUZZ:} {A} Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2777--2794}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/li-yuwei}, timestamp = {Fri, 29 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LiJCLLCLWBCL021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/LiMLL21, author = {Penghui Li and Wei Meng and Kangjie Lu and Changhua Luo}, editor = {Jure Leskovec and Marko Grobelnik and Marc Najork and Jie Tang and Leila Zia}, title = {On the Feasibility of Automated Built-in Function Modeling for {PHP} Symbolic Execution}, booktitle = {{WWW} '21: The Web Conference 2021, Virtual Event / Ljubljana, Slovenia, April 19-23, 2021}, pages = {58--69}, publisher = {{ACM} / {IW3C2}}, year = {2021}, url = {https://doi.org/10.1145/3442381.3450002}, doi = {10.1145/3442381.3450002}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/LiMLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PakkiL20, author = {Aditya Pakki and Kangjie Lu}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {Exaggerated Error Handling Hurts! An In-Depth Study and Context-Aware Detection}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {1203--1218}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417256}, doi = {10.1145/3372297.3417256}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PakkiL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LiuJFLZLLCB20, author = {Peiyu Liu and Shouling Ji and Lirong Fu and Kangjie Lu and Xuhong Zhang and Wei{-}Han Lee and Tao Lu and Wenzhi Chen and Raheem Beyah}, editor = {Liqun Chen and Ninghui Li and Kaitai Liang and Steve A. Schneider}, title = {Understanding the Security Risks of Docker Hub}, booktitle = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12308}, pages = {257--276}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58951-6\_13}, doi = {10.1007/978-3-030-58951-6\_13}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/LiuJFLZLLCB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/ZhaoLQQ20, author = {Wenjia Zhao and Kangjie Lu and Yong Qi and Saiyu Qi}, editor = {Angelos Bilas and Kostas Magoutis and Evangelos P. Markatos and Dejan Kostic and Margo I. Seltzer}, title = {{MPTEE:} bringing flexible and efficient memory protection to Intel {SGX}}, booktitle = {EuroSys '20: Fifteenth EuroSys Conference 2020, Heraklion, Greece, April 27-30, 2020}, pages = {18:1--18:15}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3342195.3387536}, doi = {10.1145/3342195.3387536}, timestamp = {Thu, 10 Sep 2020 09:33:09 +0200}, biburl = {https://dblp.org/rec/conf/eurosys/ZhaoLQQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WuHML20, author = {Qiushi Wu and Yang He and Stephen McCamant and Kangjie Lu}, title = {Precisely Characterizing Security Impact in a Flood of Patches via Symbolic Rule Comparison}, booktitle = {27th Annual Network and Distributed System Security Symposium, {NDSS} 2020, San Diego, California, USA, February 23-26, 2020}, publisher = {The Internet Society}, year = {2020}, url = {https://www.ndss-symposium.org/ndss-paper/precisely-characterizing-security-impact-in-a-flood-of-patches-via-symbolic-rule-comparison/}, timestamp = {Mon, 01 Feb 2021 08:42:10 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WuHML20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Wang0XZLZLKY20, author = {Zhe Wang and Chenggang Wu and Mengyao Xie and Yinqian Zhang and Kangjie Lu and Xiaofeng Zhang and Yuanming Lai and Yan Kang and Min Yang}, title = {{SEIMI:} Efficient and Secure SMAP-Enabled Intra-process Memory Isolation}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {592--607}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00087}, doi = {10.1109/SP40000.2020.00087}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/Wang0XZLZLKY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JiangBL020, author = {Zu{-}Ming Jiang and Jia{-}Ju Bai and Kangjie Lu and Shi{-}Min Hu}, editor = {Srdjan Capkun and Franziska Roesner}, title = {Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {2595--2612}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/jiang}, timestamp = {Fri, 29 Jan 2021 22:08:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/JiangBL020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-01785, author = {Yuwei Li and Shouling Ji and Yuan Chen and Sizhuang Liang and Wei{-}Han Lee and Yueyao Chen and Chenyang Lyu and Chunming Wu and Raheem Beyah and Peng Cheng and Kangjie Lu and Ting Wang}, title = {{UNIFUZZ:} {A} Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers}, journal = {CoRR}, volume = {abs/2010.01785}, year = {2020}, url = {https://arxiv.org/abs/2010.01785}, eprinttype = {arXiv}, eprint = {2010.01785}, timestamp = {Fri, 29 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-01785.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LuH19, author = {Kangjie Lu and Hong Hu}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Where Does It Go?: Refining Indirect-Call Targets with Multi-Layer Type Analysis}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {1867--1881}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3354244}, doi = {10.1145/3319535.3354244}, timestamp = {Tue, 10 Nov 2020 20:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LuH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LuPW19, author = {Kangjie Lu and Aditya Pakki and Qiushi Wu}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11736}, pages = {3--25}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29962-0\_1}, doi = {10.1007/978-3-030-29962-0\_1}, timestamp = {Mon, 05 Feb 2024 20:29:41 +0100}, biburl = {https://dblp.org/rec/conf/esorics/LuPW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LuPW19, author = {Kangjie Lu and Aditya Pakki and Qiushi Wu}, editor = {Nadia Heninger and Patrick Traynor}, title = {Detecting Missing-Check Bugs via Semantic- and Context-Aware Criticalness and Constraints Inferences}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {1769--1786}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/lu}, timestamp = {Mon, 01 Feb 2021 08:43:12 +0100}, biburl = {https://dblp.org/rec/conf/uss/LuPW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangLY18, author = {Wenwen Wang and Kangjie Lu and Pen{-}Chung Yew}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Check It Again: Detecting Lacking-Recheck Bugs in {OS} Kernels}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {1899--1913}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243844}, doi = {10.1145/3243734.3243844}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/WangLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/XuQL0K18, author = {Meng Xu and Chenxiong Qian and Kangjie Lu and Michael Backes and Taesoo Kim}, title = {Precise and Scalable Detection of Double-Fetch Bugs in {OS} Kernels}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {661--678}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00017}, doi = {10.1109/SP.2018.00017}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/XuQL0K18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Lu17a, author = {Kangjie Lu}, title = {Securing software systems by preventing information leaks}, school = {Georgia Institute of Technology, Atlanta, GA, {USA}}, year = {2017}, url = {https://hdl.handle.net/1853/58749}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/basesearch/Lu17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LuWPNL017, author = {Kangjie Lu and Marie{-}Therese Walter and David Pfaff and Stefan N{\"{u}}mberger and Wenke Lee and Michael Backes}, title = {Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying}, booktitle = {24th Annual Network and Distributed System Security Symposium, {NDSS} 2017, San Diego, California, USA, February 26 - March 1, 2017}, publisher = {The Internet Society}, year = {2017}, url = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/unleashing-use-initialization-vulnerabilities-linux-kernel-using-targeted-stack-spraying/}, timestamp = {Mon, 01 Feb 2021 08:42:15 +0100}, biburl = {https://dblp.org/rec/conf/ndss/LuWPNL017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/XuLKL17, author = {Meng Xu and Kangjie Lu and Taesoo Kim and Wenke Lee}, editor = {Dilma Da Silva and Bryan Ford}, title = {Bunshin: Compositing Security Mechanisms through Diversification}, booktitle = {2017 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2017, Santa Clara, CA, USA, July 12-14, 2017}, pages = {271--283}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/atc17/technical-sessions/presentation/xu-meng}, timestamp = {Mon, 01 Feb 2021 08:43:34 +0100}, biburl = {https://dblp.org/rec/conf/usenix/XuLKL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/XuLKL17, author = {Meng Xu and Kangjie Lu and Taesoo Kim and Wenke Lee}, title = {Bunshin: Compositing Security Mechanisms through Diversification (with Appendix)}, journal = {CoRR}, volume = {abs/1705.09165}, year = {2017}, url = {http://arxiv.org/abs/1705.09165}, eprinttype = {arXiv}, eprint = {1705.09165}, timestamp = {Tue, 27 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/XuLKL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/XuSJSLZDJLQLK16, author = {Meng Xu and Chengyu Song and Yang Ji and Ming{-}Wei Shih and Kangjie Lu and Cong Zheng and Ruian Duan and Yeongjin Jang and Byoungyoung Lee and Chenxiong Qian and Sangho Lee and Taesoo Kim}, title = {Toward Engineering a Secure Android Ecosystem: {A} Survey of Existing Techniques}, journal = {{ACM} Comput. Surv.}, volume = {49}, number = {2}, pages = {38:1--38:47}, year = {2016}, url = {https://doi.org/10.1145/2963145}, doi = {10.1145/2963145}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/XuSJSLZDJLQLK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LuSKL16, author = {Kangjie Lu and Chengyu Song and Taesoo Kim and Wenke Lee}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {920--932}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978366}, doi = {10.1145/2976749.2978366}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LuSKL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LuLN016, author = {Kangjie Lu and Wenke Lee and Stefan N{\"{u}}rnberger and Michael Backes}, title = {How to Make {ASLR} Win the Clone Wars: Runtime Re-Randomization}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/how-make-aslr-win-clone-wars-runtime-re-randomization.pdf}, timestamp = {Thu, 17 Jun 2021 16:04:48 +0200}, biburl = {https://dblp.org/rec/conf/ndss/LuLN016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/SongLLHKL16, author = {Chengyu Song and Byoungyoung Lee and Kangjie Lu and William Harris and Taesoo Kim and Wenke Lee}, title = {Enforcing Kernel Security Invariants with Data Flow Integrity}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/enforcing-kernal-security-invariants-data-flow-integrity.pdf}, timestamp = {Tue, 16 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/SongLLHKL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LuSLCKL15, author = {Kangjie Lu and Chengyu Song and Byoungyoung Lee and Simon P. Chung and Taesoo Kim and Wenke Lee}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {280--291}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813694}, doi = {10.1145/2810103.2813694}, timestamp = {Tue, 10 Nov 2020 19:58:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LuSLCKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MaLMZJG15, author = {Haoyu Ma and Kangjie Lu and Xinjie Ma and Haining Zhang and Chunfu Jia and Debin Gao}, editor = {Feng Bao and Steven Miller and Jianying Zhou and Gail{-}Joon Ahn}, title = {Software Watermarking using Return-Oriented Programming}, booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17, 2015}, pages = {369--380}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2714576.2714582}, doi = {10.1145/2714576.2714582}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MaLMZJG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LuLKWLZQLJ15, author = {Kangjie Lu and Zhichun Li and Vasileios P. Kemerlis and Zhenyu Wu and Long Lu and Cong Zheng and Zhiyun Qian and Wenke Lee and Guofei Jiang}, title = {Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/checking-more-and-alerting-less-detecting-privacy-leakages-enhanced-data-flow-analysis-and-peer}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/LuLKWLZQLJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HuangLXWLZJ15, author = {Jianjun Huang and Zhichun Li and Xusheng Xiao and Zhenyu Wu and Kangjie Lu and Xiangyu Zhang and Guofei Jiang}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {{SUPOR:} Precise and Scalable Sensitive User Input Detection for Android Apps}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {977--992}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/huang}, timestamp = {Mon, 01 Feb 2021 08:42:57 +0100}, biburl = {https://dblp.org/rec/conf/uss/HuangLXWLZJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/LuXG14, author = {Kangjie Lu and Siyang Xiong and Debin Gao}, editor = {Elisa Bertino and Ravi S. Sandhu and Jaehong Park}, title = {RopSteg: program steganography with return oriented programming}, booktitle = {Fourth {ACM} Conference on Data and Application Security and Privacy, CODASPY'14, San Antonio, TX, {USA} - March 03 - 05, 2014}, pages = {265--272}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2557547.2557572}, doi = {10.1145/2557547.2557572}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/LuXG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WangLLCL13, author = {Tielei Wang and Kangjie Lu and Long Lu and Simon P. Chung and Wenke Lee}, editor = {Samuel T. King}, title = {Jekyll on iOS: When Benign Apps Become Evil}, booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC, USA, August 14-16, 2013}, pages = {559--572}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/wang\_tielei}, timestamp = {Mon, 01 Feb 2021 08:42:56 +0100}, biburl = {https://dblp.org/rec/conf/uss/WangLLCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LuZWG11, author = {Kangjie Lu and Dabi Zou and Weiping Wen and Debin Gao}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {deRop: removing return-oriented programming from malware}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {363--372}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076784}, doi = {10.1145/2076732.2076784}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LuZWG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LuZWG11, author = {Kangjie Lu and Dabi Zou and Weiping Wen and Debin Gao}, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {Packed, Printable, and Polymorphic Return-Oriented Programming}, booktitle = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, pages = {101--120}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0\_6}, doi = {10.1007/978-3-642-23644-0\_6}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/LuZWG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.