Hong Hu

Orcid: 0000-0002-6261-3190

Affiliations:
  • Penn State University, University Park, PA, USA
  • Georgia Institute of Technology, GA, USA (former)
  • National University of Singapore (former)


According to our database1, Hong Hu authored at least 29 papers between 2013 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
VIPER: Spotting Syscall-Guard Variables for Data-Only Attacks.
Proceedings of the 32nd USENIX Security Symposium, 2023

µFUZZ: Redesign of Parallel Fuzzing using Microservice Architecture.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Detecting Logical Bugs of DBMS with Coverage-based Guidance.
Proceedings of the 31st USENIX Security Symposium, 2022

FreeWill: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting Detection on Binaries.
Proceedings of the 31st USENIX Security Symposium, 2022

COOPER: Testing the Binding Code of Scripting Languages with Cooperative Mutation.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

SFuzz: Slice-based Fuzzing for Real-Time Operating Systems.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Who goes first? detecting go concurrency bugs via message reordering.
Proceedings of the ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Lausanne, Switzerland, 28 February 2022, 2022

2021
Identifying Non-Control Security-Critical Data in Program Binaries with a Deep Neural Model.
CoRR, 2021

Abusing Hidden Properties to Attack the Node.js Ecosystem.
Proceedings of the 30th USENIX Security Symposium, 2021

Preventing Use-After-Free Attacks with Fast Forward Allocation.
Proceedings of the 30th USENIX Security Symposium, 2021

Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems.
Proceedings of the 30th USENIX Security Symposium, 2021

One Engine to Fuzz 'em All: Generic Language Processor Testing with Semantic Validation.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

WINNIE : Fuzzing Windows Applications with Harness Synthesis and Fast Cloning.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Identifying Behavior Dispatchers for Malware Analysis.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
DESENSITIZATION: Privacy-Aware and Attack-Preserving Crash Report.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
APOLLO: Automatic Detection and Diagnosis of Performance Regressions in Database Systems.
Proc. VLDB Endow., 2019

RAZOR: A Framework for Post-deployment Software Debloating.
Proceedings of the 28th USENIX Security Symposium, 2019

Fuzzification: Anti-Fuzzing Techniques.
Proceedings of the 28th USENIX Security Symposium, 2019

Where Does It Go?: Refining Indirect-Call Targets with Multi-Layer Type Analysis.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Enforcing Unique Code Target Property for Control-Flow Integrity.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Automatically assessing crashes from heap overflows.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

2016
Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Automatic Generation of Data-Oriented Exploits.
Proceedings of the 24th USENIX Security Symposium, 2015

Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
Practical Analysis Framework for Software-Based Attestation Scheme.
Proceedings of the Formal Methods and Software Engineering, 2014

DroidVault: A Trusted Data Vault for Android Devices.
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014

2013
A Quantitative Evaluation of Privilege Separation in Web Browser Designs.
Proceedings of the Computer Security - ESORICS 2013, 2013


  Loading...