ASLR-Guard: Stopping address space leakage for code reuse attacks K Lu, C Song, B Lee, SP Chung, T Kim, W Lee Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015 | 179 | 2015 |
Jekyll on iOS: When Benign Apps Become Evil. T Wang, K Lu, L Lu, SP Chung, W Lee USENIX Security Symposium 78, 4, 2013 | 173 | 2013 |
Enforcing kernel security invariants with data flow integrity. C Song, B Lee, K Lu, W Harris, T Kim, W Lee NDSS, 2016 | 150 | 2016 |
{SUPOR}: Precise and scalable sensitive user input detection for android apps J Huang, Z Li, X Xiao, Z Wu, K Lu, X Zhang, G Jiang 24th {USENIX} Security Symposium ({USENIX} Security 15), 977-992, 2015 | 147 | 2015 |
How to Make ASLR Win the Clone Wars: Runtime Re-Randomization. K Lu, W Lee, S Nürnberger, M Backes NDSS, 2016 | 113 | 2016 |
Checking more and alerting less: detecting privacy leakages via enhanced data-flow analysis and peer voting. K Lu, Z Li, VP Kemerlis, Z Wu, L Lu, C Zheng, Z Qian, W Lee, G Jiang NDSS, 2015 | 100 | 2015 |
Toward engineering a secure android ecosystem: A survey of existing techniques M Xu, C Song, Y Ji, MW Shih, K Lu, C Zheng, R Duan, Y Jang, B Lee, ... ACM Computing Surveys (CSUR) 49 (2), 1-47, 2016 | 99 | 2016 |
Unisan: Proactive kernel memory initialization to eliminate data leakages K Lu, C Song, T Kim, W Lee Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 84 | 2016 |
Where does it go? refining indirect-call targets with multi-layer type analysis K Lu, H Hu Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 69 | 2019 |
Precise and scalable detection of double-fetch bugs in OS kernels M Xu, C Qian, K Lu, M Backes, T Kim 2018 IEEE Symposium on Security and Privacy (SP), 661-678, 2018 | 69 | 2018 |
Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying. K Lu, MT Walter, D Pfaff, S Nümberger, W Lee, M Backes NDSS, 2017 | 64 | 2017 |
Detecting missing-check bugs via semantic-and context-aware criticalness and constraints inferences KL Lu, A Pakki, Q Wu Proceedings of the 28th USENIX Conference on Security Symposium, 2019 | 56 | 2019 |
UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers. Y Li, S Ji, Y Chen, S Liang, WH Lee, Y Chen, C Lyu, C Wu, R Beyah, ... USENIX Security Symposium, 2777-2794, 2021 | 51 | 2021 |
Ropsteg: program steganography with return oriented programming K Lu, S Xiong, D Gao Proceedings of the 4th ACM conference on Data and application security and …, 2014 | 45 | 2014 |
Check it again: Detecting lacking-recheck bugs in os kernels W Wang, K Lu, PC Yew Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 40 | 2018 |
Software watermarking using return-oriented programming H Ma, K Lu, X Ma, H Zhang, C Jia, D Gao Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015 | 33 | 2015 |
Bunshin: Compositing Security Mechanisms through Diversification. M Xu, K Lu, T Kim, W Lee USENIX Annual Technical Conference, 271-283, 2017 | 28 | 2017 |
Understanding the security risks of docker hub P Liu, S Ji, L Fu, K Lu, X Zhang, WH Lee, T Lu, W Chen, R Beyah Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020 | 25 | 2020 |
deRop: removing return-oriented programming from malware K Lu, D Zou, W Wen, D Gao Proceedings of the 27th Annual Computer Security Applications Conference …, 2011 | 25 | 2011 |
Fuzzing error handling code using context-sensitive software fault injection ZM Jiang, JJ Bai, K Lu, SM Hu the 29th USENIX Security Symposium (Security'20), 2020 | 24 | 2020 |