Kangjie Lu
Orcid: 0000-0002-4763-7354
According to our database1,
Kangjie Lu
authored at least 69 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
APILOT: Navigating Large Language Models to Generate Secure Code by Sidestepping Outdated API Pitfalls.
CoRR, 2024
CoRR, 2024
CoRR, 2024
Detecting Kernel Memory Bugs through Inconsistent Memory Management Intention Inferences.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Interp-flow Hijacking: Launching Non-control Data Attack via Hijacking eBPF Interpretation Flow.
Proceedings of the Computer Security - ESORICS 2024, 2024
Boosting Practical Control-Flow Integrity with Complete Field Sensitivity and Origin Awareness.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
FlashOcc: Fast and Memory-Efficient Occupancy Prediction via Channel-to-Height Plugin.
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
How IoT Re-using Threatens Your Sensitive Data: Exploring the User-Data Disposal in Used IoT Devices.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the IEEE European Symposium on Security and Privacy, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
GranularNF: Granular Decomposition of Stateful NFV at 100 Gbps Line Speed and Beyond.
SIGMETRICS Perform. Evaluation Rev., August, 2022
IEEE Trans. Reliab., 2022
Unleashing Coveraged-Based Fuzzing Through Comprehensive, Efficient, and Faithful Exploitable-Bug Exposing.
IEEE Trans. Dependable Secur. Comput., 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
SEDiff: scope-aware differential fuzzing to test internal function models in symbolic execution.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022
Semantic-Informed Driver Fuzzing Without Both the Hardware Devices and the Emulators.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms.
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
On the Feasibility of Automated Built-in Function Modeling for PHP Symbolic Execution.
Proceedings of the WWW '21: The Web Conference 2021, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021
Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Detecting Missed Security Operations Through Differential Checking of Object-based Similar Paths.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Precisely Characterizing Security Impact in a Flood of Patches via Symbolic Rule Comparison.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the EuroSys '20: Fifteenth EuroSys Conference 2020, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Detecting Missing-Check Bugs via Semantic- and Context-Aware Criticalness and Constraints Inferences.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
CoRR, 2017
Proceedings of the 2017 USENIX Annual Technical Conference, 2017
Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
2016
ACM Comput. Surv., 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proceedings of the 24th USENIX Security Symposium, 2015
Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
2011
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011