default search action
Hong Hu 0004
Person information
- affiliation: Penn State University, University Park, PA, USA
- affiliation (former): Georgia Institute of Technology, GA, USA
- affiliation (former): National University of Singapore
Other persons with the same name
- Hong Hu — disambiguation page
- Hong Hu 0001 — Chinese Academy of Sciences, Institute of Computing Technology, Key Laboratory of Intelligent Information Processing, Beijing, China
- Hong Hu 0002 — Harbin Institute of Technology Shenzhen Graduate School, China
- Hong Hu 0003 — Anhui University, School of Resources and Environmental Engineering, Hefei, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j2]Shuai Jiang, Cai Fu, Shuai He, Jianqiang Lv, Lansheng Han, Hong Hu:
BinCola: Diversity-Sensitive Contrastive Learning for Binary Code Similarity Detection. IEEE Trans. Software Eng. 50(10): 2485-2497 (2024) - [c29]Shuai He, Cai Fu, Hong Hu, Jiahe Chen, Jianqiang Lv, Shuai Jiang:
MalwareTotal: Multi-Faceted and Sequence-Aware Bypass Tactics against Static Malware Detection. ICSE 2024: 172:1-172:12 - [c28]Tianrou Xia, Hong Hu, Dinghao Wu:
DEEPTYPE: Refining Indirect Call Targets with Strong Multi-layer Type Analysis. USENIX Security Symposium 2024 - 2023
- [c27]Yongheng Chen, Rui Zhong, Yupeng Yang, Hong Hu, Dinghao Wu, Wenke Lee:
µFUZZ: Redesign of Parallel Fuzzing using Microservice Architecture. USENIX Security Symposium 2023: 1325-1342 - [c26]Hengkai Ye, Song Liu, Zhechang Zhang, Hong Hu:
VIPER: Spotting Syscall-Guard Variables for Data-Only Attacks. USENIX Security Symposium 2023: 1397-1414 - 2022
- [c25]Ziheng Liu, Shihao Xia, Yu Liang, Linhai Song, Hong Hu:
Who goes first? detecting go concurrency bugs via message reordering. ASPLOS 2022: 888-902 - [c24]Libo Chen, Quanpu Cai, Zhenbang Ma, Yanhao Wang, Hong Hu, Minghang Shen, Yue Liu, Shanqing Guo, Haixin Duan, Kaida Jiang, Zhi Xue:
SFuzz: Slice-based Fuzzing for Real-Time Operating Systems. CCS 2022: 485-498 - [c23]Peng Xu, Yanhao Wang, Hong Hu, Purui Su:
COOPER: Testing the Binding Code of Scripting Languages with Cooperative Mutation. NDSS 2022 - [c22]Liang He, Hong Hu, Purui Su, Yan Cai, Zhenkai Liang:
FreeWill: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting Detection on Binaries. USENIX Security Symposium 2022: 2497-2512 - [c21]Yu Liang, Song Liu, Hong Hu:
Detecting Logical Bugs of DBMS with Coverage-based Guidance. USENIX Security Symposium 2022: 4309-4326 - 2021
- [c20]Kyuhong Park, Burak Sahin, Yongheng Chen, Jisheng Zhao, Evan Downing, Hong Hu, Wenke Lee:
Identifying Behavior Dispatchers for Malware Analysis. AsiaCCS 2021: 759-773 - [c19]Jinho Jung, Stephen Tong, Hong Hu, Jungwon Lim, Yonghwi Jin, Taesoo Kim:
WINNIE : Fuzzing Windows Applications with Harness Synthesis and Fast Cloning. NDSS 2021 - [c18]Yongheng Chen, Rui Zhong, Hong Hu, Hangfan Zhang, Yupeng Yang, Dinghao Wu, Wenke Lee:
One Engine to Fuzz 'em All: Generic Language Processor Testing with Semantic Validation. SP 2021: 642-658 - [c17]Libo Chen, Yanhao Wang, Quanpu Cai, Yunfan Zhan, Hong Hu, Jiaqi Linghu, Qinsheng Hou, Chao Zhang, Haixin Duan, Zhi Xue:
Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems. USENIX Security Symposium 2021: 303-319 - [c16]Brian Wickman, Hong Hu, Insu Yun, Daehee Jang, Jungwon Lim, Sanidhya Kashyap, Taesoo Kim:
Preventing Use-After-Free Attacks with Fast Forward Allocation. USENIX Security Symposium 2021: 2453-2470 - [c15]Feng Xiao, Jianwei Huang, Yichang Xiong, Guangliang Yang, Hong Hu, Guofei Gu, Wenke Lee:
Abusing Hidden Properties to Attack the Node.js Ecosystem. USENIX Security Symposium 2021: 2951-2968 - [i2]Zhilong Wang, Haizhou Wang, Hong Hu, Peng Liu:
Identifying Non-Control Security-Critical Data in Program Binaries with a Deep Neural Model. CoRR abs/2108.12071 (2021) - 2020
- [c14]Rui Zhong, Yongheng Chen, Hong Hu, Hangfan Zhang, Wenke Lee, Dinghao Wu:
SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback. CCS 2020: 955-970 - [c13]Ren Ding, Hong Hu, Wen Xu, Taesoo Kim:
DESENSITIZATION: Privacy-Aware and Attack-Preserving Crash Report. NDSS 2020 - [i1]Rui Zhong, Yongheng Chen, Hong Hu, Hangfan Zhang, Wenke Lee, Dinghao Wu:
SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback. CoRR abs/2006.02398 (2020)
2010 – 2019
- 2019
- [j1]Jinho Jung, Hong Hu, Joy Arulraj, Taesoo Kim, Woon-Hak Kang:
APOLLO: Automatic Detection and Diagnosis of Performance Regressions in Database Systems. Proc. VLDB Endow. 13(1): 57-70 (2019) - [c12]Kangjie Lu, Hong Hu:
Where Does It Go?: Refining Indirect-Call Targets with Multi-Layer Type Analysis. CCS 2019: 1867-1881 - [c11]Chenxiong Qian, Hong Hu, Mansour Alharthi, Simon Pak Ho Chung, Taesoo Kim, Wenke Lee:
RAZOR: A Framework for Post-deployment Software Debloating. USENIX Security Symposium 2019: 1733-1750 - [c10]Jinho Jung, Hong Hu, David Solodukhin, Daniel Pagan, Kyu Hyung Lee, Taesoo Kim:
Fuzzification: Anti-Fuzzing Techniques. USENIX Security Symposium 2019: 1913-1930 - 2018
- [c9]Hong Hu, Chenxiong Qian, Carter Yagemann, Simon Pak Ho Chung, William R. Harris, Taesoo Kim, Wenke Lee:
Enforcing Unique Code Target Property for Control-Flow Integrity. CCS 2018: 1470-1486 - 2017
- [c8]Liang He, Yan Cai, Hong Hu, Purui Su, Zhenkai Liang, Yi Yang, Huafeng Huang, Jia Yan, Xiangkun Jia, Dengguo Feng:
Automatically assessing crashes from heap overflows. ASE 2017: 274-279 - 2016
- [c7]Yaoqi Jia, Zheng Leong Chua, Hong Hu, Shuo Chen, Prateek Saxena, Zhenkai Liang:
"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing. CCS 2016: 791-804 - [c6]Hong Hu, Shweta Shinde, Sendroiu Adrian, Zheng Leong Chua, Prateek Saxena, Zhenkai Liang:
Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks. IEEE Symposium on Security and Privacy 2016: 969-986 - 2015
- [c5]Hong Hu, Zheng Leong Chua, Zhenkai Liang, Prateek Saxena:
Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software. ESORICS (2) 2015: 312-331 - [c4]Hong Hu, Zheng Leong Chua, Sendroiu Adrian, Prateek Saxena, Zhenkai Liang:
Automatic Generation of Data-Oriented Exploits. USENIX Security Symposium 2015: 177-192 - 2014
- [c3]Xiaolei Li, Hong Hu, Guangdong Bai, Yaoqi Jia, Zhenkai Liang, Prateek Saxena:
DroidVault: A Trusted Data Vault for Android Devices. ICECCS 2014: 29-38 - [c2]Li Li, Hong Hu, Jun Sun, Yang Liu, Jin Song Dong:
Practical Analysis Framework for Software-Based Attestation Scheme. ICFEM 2014: 284-299 - 2013
- [c1]Xinshu Dong, Hong Hu, Prateek Saxena, Zhenkai Liang:
A Quantitative Evaluation of Privilege Separation in Web Browser Designs. ESORICS 2013: 75-93
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-26 20:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint