SW Security Instant OS Updates via Userspace Checkpoint-and-Restart, USENIX Annual Technical Conference (ATC), June 2016
|
SW Security Hardware-Assisted On-Demand Hypervisor Activation for Efficient Security Critical Code Execution on Mobile Devices, USENIX Annual Technical Conference(ATC), Jun 2016 (Acceptance rate: 19%)
|
SW Security TrackMeOrNot: Enabling Flexible Control on Web Tracking, International Conference on World Wide Web (WWW), April 2016
|
SW Security Enforcing Kernel Security Invariants with Data Flow Integrity, Network and Distributed System Security Symposium (NDSS), Feb 2016
|
SW Security ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks, ACM Conference on Computer and Communications Security (CCS), Oct 2015
|
SW Security Cross-checking Semantic Correctness: The Case of Finding File System Bugs, ACM Symposium on Operating Systems Principles (SOSP), Oct 2015
|
SW Security Type Casting Verification: Stopping an Emerging Attack Vector, Usenix Security Symposium (Security), August 2015
|
SW Security Understanding Malvertising Through Ad-Injecting Browser Extensions, International Conference on World Wide Web (WWW), May 2015
|
SW Security Preventing Use-after-free with Dangling Pointers Nullification, Network and Distributed System Security Symposium (NDSS), Feb 2015
|
SW Security From Zygote to Morula: Fortifying weakened ASLR on Android, IEEE Symposium on Security and Privacy (Oakland), May 2014
|
SW Security Protecting Location Privacy Using Location Semantics, ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), August 2011
|
SW Security binOb+: A Framework for Potent and Stealthy Binary Obfuscation, ACM Symposium on Information, Computer and Communications Security (ASIACCS), April 2010
|