Login / Signup
Hong Hu
ORCID
Publication Activity (10 Years)
Years Active: 2013-2024
Publications (10 Years): 27
Top Topics
Database
Cooperative
Malware Detection
Keywords
Top Venues
USENIX Security Symposium
CCS
NDSS
IEEE Symposium on Security and Privacy
</>
Publications
</>
Shuai He
,
Cai Fu
,
Hong Hu
,
Jiahe Chen
,
Jianqiang Lv
,
Shuai Jiang
MalwareTotal: Multi-Faceted and Sequence-Aware Bypass Tactics against Static Malware Detection.
ICSE
(2024)
Tianrou Xia
,
Hong Hu
,
Dinghao Wu
DEEPTYPE: Refining Indirect Call Targets with Strong Multi-layer Type Analysis.
USENIX Security Symposium
(2024)
Yongheng Chen
,
Rui Zhong
,
Yupeng Yang
,
Hong Hu
,
Dinghao Wu
,
Wenke Lee
µFUZZ: Redesign of Parallel Fuzzing using Microservice Architecture.
USENIX Security Symposium
(2023)
Hengkai Ye
,
Song Liu
,
Zhechang Zhang
,
Hong Hu
VIPER: Spotting Syscall-Guard Variables for Data-Only Attacks.
USENIX Security Symposium
(2023)
Peng Xu
,
Yanhao Wang
,
Hong Hu
,
Purui Su
COOPER: Testing the Binding Code of Scripting Languages with Cooperative Mutation.
NDSS
(2022)
Yu Liang
,
Song Liu
,
Hong Hu
Detecting Logical Bugs of DBMS with Coverage-based Guidance.
USENIX Security Symposium
(2022)
Libo Chen
,
Quanpu Cai
,
Zhenbang Ma
,
Yanhao Wang
,
Hong Hu
,
Minghang Shen
,
Yue Liu
,
Shanqing Guo
,
Haixin Duan
,
Kaida Jiang
,
Zhi Xue
SFuzz: Slice-based Fuzzing for Real-Time Operating Systems.
CCS
(2022)
Liang He
,
Hong Hu
,
Purui Su
,
Yan Cai
,
Zhenkai Liang
FreeWill: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting Detection on Binaries.
USENIX Security Symposium
(2022)
Kyuhong Park
,
Burak Sahin
,
Yongheng Chen
,
Jisheng Zhao
,
Evan Downing
,
Hong Hu
,
Wenke Lee
Identifying Behavior Dispatchers for Malware Analysis.
AsiaCCS
(2021)
Libo Chen
,
Yanhao Wang
,
Quanpu Cai
,
Yunfan Zhan
,
Hong Hu
,
Jiaqi Linghu
,
Qinsheng Hou
,
Chao Zhang
,
Haixin Duan
,
Zhi Xue
Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems.
USENIX Security Symposium
(2021)
Feng Xiao
,
Jianwei Huang
,
Yichang Xiong
,
Guangliang Yang
,
Hong Hu
,
Guofei Gu
,
Wenke Lee
Abusing Hidden Properties to Attack the Node.js Ecosystem.
USENIX Security Symposium
(2021)
Yongheng Chen
,
Rui Zhong
,
Hong Hu
,
Hangfan Zhang
,
Yupeng Yang
,
Dinghao Wu
,
Wenke Lee
One Engine to Fuzz 'em All: Generic Language Processor Testing with Semantic Validation.
IEEE Symposium on Security and Privacy
(2021)
Jinho Jung
,
Stephen Tong
,
Hong Hu
,
Jungwon Lim
,
Yonghwi Jin
,
Taesoo Kim
WINNIE : Fuzzing Windows Applications with Harness Synthesis and Fast Cloning.
NDSS
(2021)
Brian Wickman
,
Hong Hu
,
Insu Yun
,
Daehee Jang
,
Jungwon Lim
,
Sanidhya Kashyap
,
Taesoo Kim
Preventing Use-After-Free Attacks with Fast Forward Allocation.
USENIX Security Symposium
(2021)
Rui Zhong
,
Yongheng Chen
,
Hong Hu
,
Hangfan Zhang
,
Wenke Lee
,
Dinghao Wu
SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback.
CoRR
(2020)
Ren Ding
,
Hong Hu
,
Wen Xu
,
Taesoo Kim
DESENSITIZATION: Privacy-Aware and Attack-Preserving Crash Report.
NDSS
(2020)
Rui Zhong
,
Yongheng Chen
,
Hong Hu
,
Hangfan Zhang
,
Wenke Lee
,
Dinghao Wu
SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback.
CCS
(2020)
Chenxiong Qian
,
Hong Hu
,
Mansour Alharthi
,
Simon Pak Ho Chung
,
Taesoo Kim
,
Wenke Lee
RAZOR: A Framework for Post-deployment Software Debloating.
USENIX Security Symposium
(2019)
Kangjie Lu
,
Hong Hu
Where Does It Go?: Refining Indirect-Call Targets with Multi-Layer Type Analysis.
CCS
(2019)
Jinho Jung
,
Hong Hu
,
David Solodukhin
,
Daniel Pagan
,
Kyu Hyung Lee
,
Taesoo Kim
Fuzzification: Anti-Fuzzing Techniques.
USENIX Security Symposium
(2019)
Jinho Jung
,
Hong Hu
,
Joy Arulraj
,
Taesoo Kim
,
Woon-Hak Kang
APOLLO: Automatic Detection and Diagnosis of Performance Regressions in Database Systems.
Proc. VLDB Endow.
13 (1) (2019)
Hong Hu
,
Chenxiong Qian
,
Carter Yagemann
,
Simon Pak Ho Chung
,
William R. Harris
,
Taesoo Kim
,
Wenke Lee
Enforcing Unique Code Target Property for Control-Flow Integrity.
CCS
(2018)
Liang He
,
Yan Cai
,
Hong Hu
,
Purui Su
,
Zhenkai Liang
,
Yi Yang
,
Huafeng Huang
,
Jia Yan
,
Xiangkun Jia
,
Dengguo Feng
Automatically assessing crashes from heap overflows.
ASE
(2017)
Yaoqi Jia
,
Zheng Leong Chua
,
Hong Hu
,
Shuo Chen
,
Prateek Saxena
,
Zhenkai Liang
"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing.
CCS
(2016)
Hong Hu
,
Shweta Shinde
,
Sendroiu Adrian
,
Zheng Leong Chua
,
Prateek Saxena
,
Zhenkai Liang
Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks.
IEEE Symposium on Security and Privacy
(2016)
Hong Hu
,
Zheng Leong Chua
,
Sendroiu Adrian
,
Prateek Saxena
,
Zhenkai Liang
Automatic Generation of Data-Oriented Exploits.
USENIX Security Symposium
(2015)
Hong Hu
,
Zheng Leong Chua
,
Zhenkai Liang
,
Prateek Saxena
Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software.
ESORICS (2)
(2015)
Xiaolei Li
,
Hong Hu
,
Guangdong Bai
,
Yaoqi Jia
,
Zhenkai Liang
,
Prateek Saxena
DroidVault: A Trusted Data Vault for Android Devices.
ICECCS
(2014)
Li Li
,
Hong Hu
,
Jun Sun
,
Yang Liu
,
Jin Song Dong
Practical Analysis Framework for Software-Based Attestation Scheme.
ICFEM
(2014)
Xinshu Dong
,
Hong Hu
,
Prateek Saxena
,
Zhenkai Liang
A Quantitative Evaluation of Privilege Separation in Web Browser Designs.
ESORICS
(2013)