Hong Hu

    Calculated based on number of publications stored in Pure and citations from Scopus
    20132024

    Research activity per year

    Filter
    Conference contribution

    Search results

    • 2024

      DEEPTYPE: Refining Indirect Call Targets with Strong Multi-layer Type Analysis

      Xia, T., Hu, H. & Wu, D., 2024, Proceedings of the 33rd USENIX Security Symposium. USENIX Association, p. 5877-5894 18 p. (Proceedings of the 33rd USENIX Security Symposium).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      1 Scopus citations
    • MalwareTotal: Multi-Faceted and Sequence-Aware Bypass Tactics Against Static Malware Detection

      He, S., Fu, C., Hu, H., Chen, J., Lv, J. & Jiang, S., 2024, Proceedings - 2024 ACM/IEEE 44th International Conference on Software Engineering, ICSE 2024. IEEE Computer Society, p. 2123-2134 12 p. (Proceedings - International Conference on Software Engineering).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2023

      µFUZZ: Redesign of Parallel Fuzzing using Microservice Architecture

      Chen, Y., Zhong, R., Yang, Y., Hu, H., Wu, D. & Lee, W., 2023, 32nd USENIX Security Symposium, USENIX Security 2023. USENIX Association, p. 1325-1342 18 p. (32nd USENIX Security Symposium, USENIX Security 2023; vol. 2).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      4 Scopus citations
    • VIPER: Spotting Syscall-Guard Variables for Data-Only Attacks

      Ye, H., Liu, S., Zhang, Z. & Hu, H., 2023, 32nd USENIX Security Symposium, USENIX Security 2023. USENIX Association, p. 1397-1414 18 p. (32nd USENIX Security Symposium, USENIX Security 2023; vol. 2).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      3 Scopus citations
    • 2022

      COOPER: Testing the Binding Code of Scripting Languages with Cooperative Mutation

      Xu, P., Wang, Y., Hu, H. & Su, P., 2022, 29th Annual Network and Distributed System Security Symposium, NDSS 2022. The Internet Society, (29th Annual Network and Distributed System Security Symposium, NDSS 2022).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
      6 Scopus citations
    • Detecting Logical Bugs of DBMS with Coverage-based Guidance

      Liang, Y., Liu, S. & Hu, H., 2022, Proceedings of the 31st USENIX Security Symposium, Security 2022. USENIX Association, p. 4309-4326 18 p. (Proceedings of the 31st USENIX Security Symposium, Security 2022).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      21 Scopus citations
    • FREEWILL: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting Detection on Binaries

      He, L., Hu, H., Su, P., Cai, Y. & Liang, Z., 2022, Proceedings of the 31st USENIX Security Symposium, Security 2022. USENIX Association, p. 2497-2512 16 p. (Proceedings of the 31st USENIX Security Symposium, Security 2022).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      10 Scopus citations
    • SFuzz: Slice-based Fuzzing for Real-Time Operating Systems

      Chen, L., Cai, Q., Ma, Z., Wang, Y., Hu, H., Shen, M., Liu, Y., Guo, S., Duan, H., Jiang, K. & Xue, Z., Nov 7 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 485-498 14 p. (Proceedings of the ACM Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      10 Scopus citations
    • Who Goes First Detecting Go Concurrency Bugs via Message Reordering

      Liu, Z., Xia, S., Liang, Y., Song, L. & Hu, H., Feb 28 2022, ASPLOS 2022 - Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems. Falsafi, B., Ferdman, M., Lu, S. & Wenisch, T. F. (eds.). Association for Computing Machinery, p. 888-902 15 p. (International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      10 Scopus citations
    • 2021

      Abusing hidden properties to attack the node.js ecosystem

      Xiao, F., Huang, J., Xiong, Y., Yang, G., Hu, H., Gu, G. & Lee, W., 2021, Proceedings of the 30th USENIX Security Symposium. USENIX Association, p. 2951-2968 18 p. (Proceedings of the 30th USENIX Security Symposium).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      27 Scopus citations
    • Identifying Behavior Dispatchers for Malware Analysis

      Park, K., Sahin, B., Chen, Y., Zhao, J., Downing, E., Hu, H. & Lee, W., May 24 2021, ASIA CCS 2021 - Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 759-773 15 p. (ASIA CCS 2021 - Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      6 Scopus citations
    • One engine to fuzz 'em All: Generic language processor testing with semantic validation

      Chen, Y., Zhong, R., Hu, H., Zhang, H., Yang, Y., Wu, D. & Lee, W., May 2021, Proceedings - 2021 IEEE Symposium on Security and Privacy, SP 2021. Institute of Electrical and Electronics Engineers Inc., p. 642-658 17 p. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2021-May).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      42 Scopus citations
    • Preventing use-after-free attacks with fast forward allocation

      Wickman, B., Hu, H., Yun, I., Jang, D., Lim, J. W., Kashyap, S. & Kim, T., 2021, Proceedings of the 30th USENIX Security Symposium. USENIX Association, p. 2453-2470 18 p. (Proceedings of the 30th USENIX Security Symposium).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      30 Scopus citations
    • Sharing more and checking less: Leveraging common input keywords to detect bugs in embedded systems

      Chen, L., Wang, Y., Cai, Q., Zhan, Y., Hu, H., Linghu, J., Hou, Q., Zhang, C., Duan, H. & Xue, Z., 2021, Proceedings of the 30th USENIX Security Symposium. USENIX Association, p. 303-319 17 p. (Proceedings of the 30th USENIX Security Symposium).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      51 Scopus citations
    • WINNIE: Fuzzing Windows Applications with Harness Synthesis and Fast Cloning

      Jung, J., Tong, S., Hu, H., Lim, J., Jin, Y. & Kim, T., 2021, 28th Annual Network and Distributed System Security Symposium, NDSS 2021. The Internet Society, (28th Annual Network and Distributed System Security Symposium, NDSS 2021).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
      45 Scopus citations
    • 2020

      DESENSITIZATION: Privacy-Aware and Attack-Preserving Crash Report

      Ding, R., Hu, H., Xu, W. & Kim, T., 2020, 27th Annual Network and Distributed System Security Symposium, NDSS 2020. The Internet Society, (27th Annual Network and Distributed System Security Symposium, NDSS 2020).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
      6 Scopus citations
    • SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback

      Zhong, R., Chen, Y., Hu, H., Zhang, H., Lee, W. & Wu, D., Oct 30 2020, CCS 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 955-970 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
      70 Scopus citations
    • 2019

      Fuzzification: Anti-fuzzing techniques

      Jung, J., Hu, H., Solodukhin, D., Pagan, D., Lee, K. H. & Kim, T., 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 1913-1930 18 p. (Proceedings of the 28th USENIX Security Symposium).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      38 Scopus citations
    • Razor: A framework for post-deployment software debloating

      Qian, C., Hu, H., Alharthi, M., Chung, P. H., Kim, T. & Lee, W., 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 1733-1750 18 p. (Proceedings of the 28th USENIX Security Symposium).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      90 Scopus citations
    • Where does it go? Refining indirect-call targets with multi-layer type analysis

      Lu, K. & Hu, H., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1867-1881 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
      100 Scopus citations
    • 2018

      Enforcing unique code target property for control-flow integrity

      Hu, H., Qian, C., Yagemann, C., Chung, S. P. H., Harris, W. R., Kim, T. & Lee, W., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1470-1486 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      98 Scopus citations
    • 2017

      Automatically assessing crashes from heap overflows

      He, L., Cai, Y., Hu, H., Su, P., Liang, Z., Yang, Y., Huang, H., Yan, J., Jia, X. & Feng, D., Nov 20 2017, ASE 2017 - Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering. Nguyen, T. N., Rosu, G. & Di Penta, M. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 274-279 6 p. 8115640. (ASE 2017 - Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      13 Scopus citations
    • 2016

      Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks

      Hu, H., Shinde, S., Adrian, S., Chua, Z. L., Saxena, P. & Liang, Z., Aug 16 2016, Proceedings - 2016 IEEE Symposium on Security and Privacy, SP 2016. Institute of Electrical and Electronics Engineers Inc., p. 969-986 18 p. 7546545. (Proceedings - 2016 IEEE Symposium on Security and Privacy, SP 2016).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      316 Scopus citations
    • The "Web/local" boundary is fuzzy: A security study of Chrome's process-based Sandboxing

      Jia, Y., Chua, Z. L., Hu, H., Chen, S., Saxena, P. & Liang, Z., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 791-804 14 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      22 Scopus citations
    • 2015

      Automatic generation of data-oriented exploits

      Hu, H., Chua, Z. L., Adrian, S., Saxena, P. & Liang, Z., 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 177-192 16 p. (Proceedings of the 24th USENIX Security Symposium).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      154 Scopus citations
    • Identifying arbitrary memory access vulnerabilities in privilege-separated software

      Hu, H., Chua, Z. L., Liang, Z. & Saxena, P., 2015, Computer Security – ESORICS 2015 - 20th European Symposium on Research in Computer Security, Proceedings. Pernul, G., Ryan, P. Y. A. & Weippl, E. (eds.). Springer Verlag, p. 312-331 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9327).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      9 Scopus citations
    • 2014

      DroidVault: A trusted data vault for android devices

      Li, X., Hu, H., Bai, G., Jia, Y., Liang, Z. & Saxena, P., Oct 13 2014, Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, ICECCS. Institute of Electrical and Electronics Engineers Inc., p. 29-38 10 p. 6923115. (Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, ICECCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
      37 Scopus citations
    • Practical analysis framework for software-based attestation scheme

      Li, L., Hu, H., Sun, J., Liu, Y. & Dong, J. S., 2014, Formal Methods and Software Engineering - 16th International Conference on Formal Engineering Methods, ICFEM 2014, Proceedings. Merz, S. & Pang, J. (eds.). Springer Verlag, p. 284-299 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8829).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      7 Scopus citations
    • 2013

      A quantitative evaluation of privilege separation in web browser designs

      Dong, X., Hu, H., Saxena, P. & Liang, Z., 2013, Computer Security, ESORICS 2013 - 18th European Symposium on Research in Computer Security, Proceedings. p. 75-93 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8134 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      7 Scopus citations