Kangjie Lu

Orcid: 0000-0002-4763-7354

According to our database1, Kangjie Lu authored at least 69 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Understanding the AI-powered Binary Code Similarity Detection.
CoRR, 2024

APILOT: Navigating Large Language Models to Generate Secure Code by Sidestepping Outdated API Pitfalls.
CoRR, 2024

BULKHEAD: Secure, Scalable, and Efficient Kernel Compartmentalization with PKS.
CoRR, 2024

Exploring Automatic Cryptographic API Misuse Detection in the Era of LLMs.
CoRR, 2024

SQLaser: Detecting DBMS Logic Bugs with Clause-Guided Fuzzing.
CoRR, 2024

Detecting Kernel Memory Bugs through Inconsistent Memory Management Intention Inferences.
Proceedings of the 33rd USENIX Security Symposium, 2024

Improving Indirect-Call Analysis in LLVM with Type and Data-Flow Co-Analysis.
Proceedings of the 33rd USENIX Security Symposium, 2024

Exploring ChatGPT's Capabilities on Vulnerability Management.
Proceedings of the 33rd USENIX Security Symposium, 2024

GNNIC: Finding Long-Lost Sibling Functions with Abstract Similarity.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Interp-flow Hijacking: Launching Non-control Data Attack via Hijacking eBPF Interpretation Flow.
Proceedings of the Computer Security - ESORICS 2024, 2024

Boosting Practical Control-Flow Integrity with Complete Field Sensitivity and Origin Awareness.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Dancing With Wolves: An Intra-Process Isolation Technique With Privileged Hardware.
IEEE Trans. Dependable Secur. Comput., 2023

FlashOcc: Fast and Memory-Efficient Occupancy Prediction via Channel-to-Height Plugin.
CoRR, 2023

How ChatGPT is Solving Vulnerability Management Problem.
CoRR, 2023

Silent Bugs Matter: A Study of Compiler-Introduced Security Bugs.
Proceedings of the 32nd USENIX Security Symposium, 2023

ACTOR: Action-Guided Kernel Fuzzing.
Proceedings of the 32nd USENIX Security Symposium, 2023

Practical Program Modularization with Type-Based Dependence Analysis.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

How IoT Re-using Threatens Your Sensitive Data: Exploring the User-Data Disposal in Used IoT Devices.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Guiding Directed Fuzzing with Feasibility.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
GranularNF: Granular Decomposition of Stateful NFV at 100 Gbps Line Speed and Beyond.
SIGMETRICS Perform. Evaluation Rev., August, 2022

Effective Covering Array Generation Using an Improved Particle Swarm Optimization.
IEEE Trans. Reliab., 2022

Unleashing Coveraged-Based Fuzzing Through Comprehensive, Efficient, and Faithful Exploitable-Bug Exposing.
IEEE Trans. Dependable Secur. Comput., 2022

OS-Aware Vulnerability Prioritization via Differential Severity Analysis.
Proceedings of the 31st USENIX Security Symposium, 2022

Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

SEDiff: scope-aware differential fuzzing to test internal function models in symbolic execution.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

Semantic-Informed Driver Fuzzing Without Both the Hardware Devices and the Emulators.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

EMS: History-Driven Mutation for Coverage-based Fuzzing.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Context-Sensitive and Directional Concurrency Fuzzing for Data-Race Detection.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Stopping Memory Disclosures via Diversification and Replicated Execution.
IEEE Trans. Dependable Secur. Comput., 2021

On the Feasibility of Automated Built-in Function Modeling for PHP Symbolic Execution.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Understanding and Detecting Disordered Error Handling with Precise Function Pairing.
Proceedings of the 30th USENIX Security Symposium, 2021

Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking.
Proceedings of the 30th USENIX Security Symposium, 2021

UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers.
Proceedings of the 30th USENIX Security Symposium, 2021

Static Detection of Unsafe DMA Accesses in Device Drivers.
Proceedings of the 30th USENIX Security Symposium, 2021

Detecting Kernel Memory Leaks in Specialized Modules with Ownership Reasoning.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

IFIZZ: Deep-State and Efficient Fault-Scenario Generation to Test IoT Firmware.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Detecting Missed Security Operations Through Differential Checking of Object-based Similar Paths.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

CPscan: Detecting Bugs Caused by Code Pruning in IoT Kernels.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection.
Proceedings of the 29th USENIX Security Symposium, 2020

SEIMI: Efficient and Secure SMAP-Enabled Intra-process Memory Isolation.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Precisely Characterizing Security Impact in a Flood of Patches via Symbolic Rule Comparison.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

MPTEE: bringing flexible and efficient memory protection to Intel SGX.
Proceedings of the EuroSys '20: Fifteenth EuroSys Conference 2020, 2020

Understanding the Security Risks of Docker Hub.
Proceedings of the Computer Security - ESORICS 2020, 2020

Exaggerated Error Handling Hurts! An In-Depth Study and Context-Aware Detection.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Detecting Missing-Check Bugs via Semantic- and Context-Aware Criticalness and Constraints Inferences.
Proceedings of the 28th USENIX Security Symposium, 2019

Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs.
Proceedings of the Computer Security - ESORICS 2019, 2019

Where Does It Go?: Refining Indirect-Call Targets with Multi-Layer Type Analysis.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Check It Again: Detecting Lacking-Recheck Bugs in OS Kernels.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Securing software systems by preventing information leaks.
PhD thesis, 2017

Bunshin: Compositing Security Mechanisms through Diversification (with Appendix).
CoRR, 2017

Bunshin: Compositing Security Mechanisms through Diversification.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

2016
Toward Engineering a Secure Android Ecosystem: A Survey of Existing Techniques.
ACM Comput. Surv., 2016

Enforcing Kernel Security Invariants with Data Flow Integrity.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

How to Make ASLR Win the Clone Wars: Runtime Re-Randomization.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps.
Proceedings of the 24th USENIX Security Symposium, 2015

Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Software Watermarking using Return-Oriented Programming.
Proceedings of the 10th ACM Symposium on Information, 2015

ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
RopSteg: program steganography with return oriented programming.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

2013
Jekyll on iOS: When Benign Apps Become Evil.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

2011
Packed, Printable, and Polymorphic Return-Oriented Programming.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

deRop: removing return-oriented programming from malware.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011


  Loading...