Artikler med mandater om offentlig tilgang - Wenke LeeLes mer
Ikke tilgjengelig noe sted: 1
Recprov: Towards provenance-aware user space record and replay
Y Ji, S Lee, W Lee
Provenance and Annotation of Data and Processes: 6th International …, 2016
Mandater: US National Science Foundation
Tilgjengelige et eller annet sted: 51
HDFI: Hardware-assisted data-flow isolation
C Song, H Moon, M Alam, I Yun, B Lee, T Kim, W Lee, Y Paek
2016 IEEE Symposium on Security and Privacy (SP), 1-17, 2016
Mandater: US National Science Foundation
Enforcing Kernel Security Invariants with Data Flow Integrity.
C Song, B Lee, K Lu, W Harris, T Kim, W Lee
NDSS, 2016
Mandater: US National Science Foundation
Cloak and dagger: from two permissions to complete control of the UI feedback loop
Y Fratantonio, C Qian, SP Chung, W Lee
2017 IEEE Symposium on Security and Privacy (SP), 1041-1057, 2017
Mandater: US National Science Foundation, US Department of Defense
Enforcing unique code target property for control-flow integrity
H Hu, C Qian, C Yagemann, SPH Chung, WR Harris, T Kim, W Lee
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Mandater: US Department of Defense
{RAZOR}: A framework for post-deployment software debloating
C Qian, H Hu, M Alharthi, PH Chung, T Kim, W Lee
28th USENIX security symposium (USENIX Security 19), 1733-1750, 2019
Mandater: US Department of Defense
Identifying open-source license violation and 1-day security risk at large scale
R Duan, A Bijlani, M Xu, T Kim, W Lee
Proceedings of the 2017 ACM SIGSAC Conference on computer and communications …, 2017
Mandater: US National Science Foundation, US Department of Defense
Rain: Refinable attack investigation with on-demand inter-process information flow tracking
Y Ji, S Lee, E Downing, W Wang, M Fazzini, T Kim, A Orso, W Lee
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
Mandater: US National Science Foundation, US Department of Defense
The threat of offensive ai to organizations
Y Mirsky, A Demontis, J Kotak, R Shankar, D Gelei, L Yang, X Zhang, ...
Computers & Security 124, 103006, 2023
Mandater: Government of Italy
How to Make ASLR Win the Clone Wars: Runtime Re-Randomization.
K Lu, W Lee, S Nürnberger, M Backes
NDSS, 2016
Mandater: US National Science Foundation
The Price of Free: Privacy Leakage in Personalized Mobile In-Apps Ads.
W Meng, R Ding, SP Chung, S Han, W Lee
NDSS, 1-15, 2016
Mandater: US National Science Foundation
Squirrel: Testing database management systems with language validity and coverage feedback
R Zhong, Y Chen, H Hu, H Zhang, W Lee, D Wu
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
Mandater: US National Science Foundation, US Department of Defense
Unisan: Proactive kernel memory initialization to eliminate data leakages
K Lu, C Song, T Kim, W Lee
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
Mandater: US National Science Foundation
rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System.
E Uzun, SPH Chung, I Essa, W Lee
NDSS, 2018
Mandater: US Department of Defense
Unleashing use-before-initialization vulnerabilities in the linux kernel using targeted stack spraying
K Lu, MT Walter, D Pfaff, S Nürnberger, W Lee, M Backes
CISPA, 2017
Mandater: US National Science Foundation, US Department of Defense, Federal Ministry …
Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries.
R Duan, A Bijlani, Y Ji, O Alrawi, Y Xiong, M Ike, B Saltaformaggio, W Lee
NDSS, 2019
Mandater: US National Science Foundation, US Department of Defense
Enabling refinable {Cross-Host} attack investigation with efficient data flow tagging and tracking
Y Ji, S Lee, M Fazzini, J Allen, E Downing, T Kim, A Orso, W Lee
27th USENIX Security Symposium (USENIX Security 18), 1705-1722, 2018
Mandater: US National Science Foundation, US Department of Defense
One engine to fuzz’em all: Generic language processor testing with semantic validation
Y Chen, R Zhong, H Hu, H Zhang, Y Yang, D Wu, W Lee
2021 IEEE Symposium on Security and Privacy (SP), 642-658, 2021
Mandater: US National Science Foundation, US Department of Defense
{VulChecker}: Graph-based vulnerability localization in source code
Y Mirsky, G Macon, M Brown, C Yagemann, M Pruett, E Downing, ...
32nd USENIX Security Symposium (USENIX Security 23), 6557-6574, 2023
Mandater: US Department of Defense
Slimium: debloating the chromium browser with feature subsetting
C Qian, H Koo, CS Oh, T Kim, W Lee
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
Mandater: US Department of Defense
Informasjon om publisering og finansiering fastsettes automatisk av et datamaskinprogram