Kangjie Lu
Kangjie Lu
Assistant Professor, University of Minnesota
Bestätigte E-Mail-Adresse bei umn.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Jekyll on ios: When benign apps become evil
T Wang, K Lu, L Lu, S Chung, W Lee
22nd {USENIX} Security Symposium ({USENIX} Security 13), 559-572, 2013
1542013
ASLR-Guard: Stopping address space leakage for code reuse attacks
K Lu, C Song, B Lee, SP Chung, T Kim, W Lee
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1212015
{SUPOR}: Precise and Scalable Sensitive User Input Detection for Android Apps
J Huang, Z Li, X Xiao, Z Wu, K Lu, X Zhang, G Jiang
24th {USENIX} Security Symposium ({USENIX} Security 15), 977-992, 2015
942015
Enforcing Kernel Security Invariants with Data Flow Integrity.
C Song, B Lee, K Lu, W Harris, T Kim, W Lee
NDSS, 2016
852016
Checking more and alerting less: detecting privacy leakages via enhanced data-flow analysis and peer voting.
K Lu, Z Li, VP Kemerlis, Z Wu, L Lu, C Zheng, Z Qian, W Lee, G Jiang
NDSS, 2015
792015
How to Make ASLR Win the Clone Wars: Runtime Re-Randomization.
K Lu, W Lee, S Nürnberger, M Backes
NDSS, 2016
702016
Toward engineering a secure android ecosystem: A survey of existing techniques
M Xu, C Song, Y Ji, MW Shih, K Lu, C Zheng, R Duan, Y Jang, B Lee, ...
ACM Computing Surveys (CSUR) 49 (2), 1-47, 2016
642016
Unisan: Proactive kernel memory initialization to eliminate data leakages
K Lu, C Song, T Kim, W Lee
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
542016
Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying.
K Lu, MT Walter, D Pfaff, S Nümberger, W Lee, M Backes
NDSS, 2017
362017
Ropsteg: program steganography with return oriented programming
K Lu, S Xiong, D Gao
Proceedings of the 4th ACM conference on Data and application security and …, 2014
262014
Precise and scalable detection of double-fetch bugs in OS kernels
M Xu, C Qian, K Lu, M Backes, T Kim
2018 IEEE Symposium on Security and Privacy (SP), 661-678, 2018
242018
Software watermarking using return-oriented programming
H Ma, K Lu, X Ma, H Zhang, C Jia, D Gao
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
242015
Packed, printable, and polymorphic return-oriented programming
K Lu, D Zou, W Wen, D Gao
International Workshop on Recent Advances in Intrusion Detection, 101-120, 2011
232011
deRop: removing return-oriented programming from malware
K Lu, D Zou, W Wen, D Gao
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
202011
Check it again: Detecting lacking-recheck bugs in os kernels
W Wang, K Lu, PC Yew
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
142018
Bunshin: compositing security mechanisms through diversification
M Xu, K Lu, T Kim, W Lee
2017 {USENIX} Annual Technical Conference ({USENIX}{ATC} 17), 271-283, 2017
142017
Where does it go? refining indirect-call targets with multi-layer type analysis
K Lu, H Hu
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
122019
Detecting missing-check bugs via semantic-and context-aware criticalness and constraints inferences
K Lu, A Pakki, Q Wu
28th {USENIX} Security Symposium ({USENIX} Security 19), 1769-1786, 2019
122019
Stopping memory disclosures via diversification and replicated execution
K Lu, M Xu, C Song, T Kim, W Lee
IEEE Transactions on Dependable and Secure Computing, 2018
62018
Duleak: a scalable app engine for high-impact privacy leaks
LI Zhichun, Z Wu, Q Zhiyun, G Jiang, K Lu, V Kemerlis
US Patent 9,245,125, 2016
42016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20