Hong Hu
Hong Hu
Research Scientist, School of Computer Science, Georgia Institute of Technology
Verified email at gatech.edu - Homepage
Cited by
Cited by
Data-Oriented Programming: On the Expressiveness of Non-Control Data Attacks
H Hu, S Shinde, S Adrian, ZL Chua, P Saxena, Z Liang
the 37th IEEE Symposium on Security and Privacy, 2016
Automatic Generation of Data-oriented Exploits
H Hu, ZL Chua, S Adrian, P Saxena, Z Liang
24th {USENIX} Security Symposium ({USENIX} Security 15), 177-192, 2015
DroidVault: a trusted data vault for Android devices
X Li, H Hu, G Bai, Y Jia, Z Liang, P Saxena
Engineering of Complex Computer Systems (ICECCS), 2014 19th International …, 2014
Enforcing unique code target property for control-flow integrity
H Hu, C Qian, C Yagemann, SPH Chung, WR Harris, T Kim, W Lee
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
The "Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing
Y Jia, ZL Chua, H Hu, S Chen, P Saxena, Z Liang
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
A quantitative evaluation of privilege separation in web browser designs
X Dong, H Hu, P Saxena, Z Liang
European Symposium on Research in Computer Security, 75-93, 2013
Practical analysis framework for software-based attestation scheme
L Li, H Hu, J Sun, Y Liu, JS Dong
International Conference on Formal Engineering Methods, 284-299, 2014
Razor: A Framework for Post-deployment Software Debloating
C Qian, H Hu, M Alharthi, PH Chung, T Kim, W Lee
28th {USENIX} Security Symposium ({USENIX} Security 19), 1733-1750, 2019
Where Does It Go? Refining Indirect-Call Targets with Multi-Layer Type Analysis
K Lu, H Hu
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
Fuzzification: Anti-fuzzing Techniques
J Jung, H Hu, D Solodukhin, D Pagan, KH Lee, T Kim
28th {USENIX} Security Symposium ({USENIX} Security 19), 1913-1930, 2019
Automatically assessing crashes from heap overflows
L He, Y Cai, H Hu, P Su, Z Liang, Y Yang, H Huang, J Yan, X Jia, D Feng
2017 32nd IEEE/ACM International Conference on Automated Software …, 2017
Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software
H Hu, ZL Chua, Z Liang, P Saxena
European Symposium on Research in Computer Security, 312-331, 2015
APOLLO: automatic detection and diagnosis of performance regressions in database systems
J Jung, H Hu, J Arulraj, T Kim, W Kang
Proceedings of the VLDB Endowment 13 (1), 57-70, 2019
DESENSITIZATION: Privacy-Aware and Attack-Preserving Crash Report
R Ding, H Hu, W Xu, T Kim
ret 2, G3, 0
The system can't perform the operation now. Try again later.
Articles 1–14