Chex: statically vetting android apps for component hijacking vulnerabilities L Lu, Z Li, Z Wu, W Lee, G Jiang Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 792 | 2012 |
Blade: an attack-agnostic approach for preventing drive-by malware infections L Lu, V Yegneswaran, P Porras, W Lee Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 222 | 2010 |
Mapping kernel objects to enable systematic integrity checking M Carbone, W Cui, L Lu, W Lee, M Peinado, X Jiang Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 218 | 2009 |
Jekyll on {iOS}: When Benign Apps Become Evil T Wang, K Lu, L Lu, S Chung, W Lee 22nd USENIX Security Symposium (USENIX Security 13), 559-572, 2013 | 169 | 2013 |
Preventing Use-after-free with Dangling Pointers Nullification. B Lee, C Song, Y Jang, T Wang, T Kim, L Lu, W Lee NDSS, 2015 | 152 | 2015 |
SURF: detecting and measuring search poisoning L Lu, R Perdisci, W Lee Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 128 | 2011 |
Remix: On-demand live randomization Y Chen, Z Wang, D Whalley, L Lu Proceedings of the sixth ACM conference on data and application security and …, 2016 | 106 | 2016 |
Checking more and alerting less: detecting privacy leakages via enhanced data-flow analysis and peer voting. K Lu, Z Li, VP Kemerlis, Z Wu, L Lu, C Zheng, Z Qian, W Lee, G Jiang NDSS, 2015 | 90 | 2015 |
Shreds: Fine-grained execution units with private memory Y Chen, S Reymondjohnson, Z Sun, L Lu 2016 IEEE Symposium on Security and Privacy (SP), 56-71, 2016 | 83 | 2016 |
Savior: Towards bug-driven hybrid testing Y Chen, P Li, J Xu, S Guo, R Zhou, Y Zhang, T Wei, L Lu 2020 IEEE Symposium on Security and Privacy (SP), 1580-1596, 2020 | 75 | 2020 |
Scareware detection C Seifert, J Stokes, L Lu, D Heckerman, C Colcernian, S Parthasarathy, ... US Patent 9,130,988, 2015 | 74 | 2015 |
From zygote to morula: Fortifying weakened aslr on android B Lee, L Lu, T Wang, T Kim, W Lee 2014 IEEE Symposium on Security and Privacy, 424-439, 2014 | 71 | 2014 |
{P2IM}: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling B Feng, A Mera, L Lu 29th USENIX Security Symposium (USENIX Security 20), 1237-1254, 2020 | 70 | 2020 |
Compiler-assisted code randomization H Koo, Y Chen, L Lu, VP Kemerlis, M Polychronakis 2018 IEEE Symposium on Security and Privacy (SP), 461-477, 2018 | 55 | 2018 |
NORAX: Enabling execute-only memory for COTS binaries on AArch64 Y Chen, D Zhang, R Wang, R Qiao, AM Azab, L Lu, H Vijayakumar, ... 2017 IEEE Symposium on Security and Privacy (SP), 304-319, 2017 | 44 | 2017 |
OAT: Attesting operation integrity of embedded devices Z Sun, B Feng, L Lu, S Jha 2020 IEEE Symposium on Security and Privacy (SP), 1433-1449, 2020 | 39 | 2020 |
Vbutton: Practical attestation of user-driven operations in mobile apps W Li, S Luo, Z Sun, Y Xia, L Lu, H Chen, B Zang, H Guan Proceedings of the 16th annual international conference on mobile systems …, 2018 | 35 | 2018 |
{StreamBox-TZ}: Secure Stream Analytics at the Edge with {TrustZone} H Park, S Zhai, L Lu, FX Lin 2019 USENIX Annual Technical Conference (USENIX ATC 19), 537-554, 2019 | 34 | 2019 |
Method for scalable analysis of android applications for security vulnerability LI Zhichun, L Lu, Z Wu, G Jiang US Patent 8,875,298, 2014 | 28 | 2014 |
Webcapsule: Towards a lightweight forensic engine for web browsers C Neasbitt, B Li, R Perdisci, L Lu, K Singh, K Li Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 27 | 2015 |