default search action
Kangjie Lu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c53]Qirui Liu, Wenbo Shen, Jinmeng Zhou, Zhuoruo Zhang, Jiayi Hu, Shukai Ni, Kangjie Lu, Rui Chang:
Interp-flow Hijacking: Launching Non-control Data Attack via Hijacking eBPF Interpretation Flow. ESORICS (3) 2024: 194-214 - [c52]Qiushi Wu, Zhongshu Gu, Hani Jamjoom, Kangjie Lu:
GNNIC: Finding Long-Lost Sibling Functions with Abstract Similarity. NDSS 2024 - [c51]Peiyu Liu, Junming Liu, Lirong Fu, Kangjie Lu, Yifan Xia, Xuhong Zhang, Wenzhi Chen, Haiqin Weng, Shouling Ji, Wenhai Wang:
Exploring ChatGPT's Capabilities on Vulnerability Management. USENIX Security Symposium 2024 - [c50]Dinghao Liu, Shouling Ji, Kangjie Lu, Qinming He:
Improving Indirect-Call Analysis in LLVM with Type and Data-Flow Co-Analysis. USENIX Security Symposium 2024 - [c49]Dinghao Liu, Zhipeng Lu, Shouling Ji, Kangjie Lu, Jianhai Chen, Zhenguang Liu, Dexin Liu, Renyi Cai, Qinming He:
Detecting Kernel Memory Bugs through Inconsistent Memory Management Intention Inferences. USENIX Security Symposium 2024 - [i6]Jin Wei, Ping Chen, Kangjie Lu, Jun Dai, Xiaoyan Sun:
SQLaser: Detecting DBMS Logic Bugs with Clause-Guided Fuzzing. CoRR abs/2407.04294 (2024) - [i5]Yifan Xia, Zichen Xie, Peiyu Liu, Kangjie Lu, Yan Liu, Wenhai Wang, Shouling Ji:
Exploring Automatic Cryptographic API Misuse Detection in the Era of LLMs. CoRR abs/2407.16576 (2024) - 2023
- [j6]Chenggang Wu, Mengyao Xie, Zhe Wang, Yinqian Zhang, Kangjie Lu, Xiaofeng Zhang, Yuanming Lai, Yan Kang, Min Yang, Tao Li:
Dancing With Wolves: An Intra-Process Isolation Technique With Privileged Hardware. IEEE Trans. Dependable Secur. Comput. 20(3): 1959-1978 (2023) - [c48]Kyle Zeng, Zhenpeng Lin, Kangjie Lu, Xinyu Xing, Ruoyu Wang, Adam Doupé, Yan Shoshitaishvili, Tiffany Bao:
RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections. CCS 2023: 3093-3107 - [c47]Weiheng Bai, Kefu Wu, Qiushi Wu, Kangjie Lu:
Guiding Directed Fuzzing with Feasibility. EuroS&P Workshops 2023: 42-49 - [c46]Kangjie Lu:
Practical Program Modularization with Type-Based Dependence Analysis. SP 2023: 1256-1270 - [c45]Peiyu Liu, Shouling Ji, Lirong Fu, Kangjie Lu, Xuhong Zhang, Jingchang Qin, Wenhai Wang, Wenzhi Chen:
How IoT Re-using Threatens Your Sensitive Data: Exploring the User-Data Disposal in Used IoT Devices. SP 2023: 3365-3381 - [c44]Jianhao Xu, Kangjie Lu, Zhengjie Du, Zhu Ding, Linke Li, Qiushi Wu, Mathias Payer, Bing Mao:
Silent Bugs Matter: A Study of Compiler-Introduced Security Bugs. USENIX Security Symposium 2023: 3655-3672 - [c43]Marius Fleischer, Dipanjan Das, Priyanka Bose, Weiheng Bai, Kangjie Lu, Mathias Payer, Christopher Kruegel, Giovanni Vigna:
ACTOR: Action-Guided Kernel Fuzzing. USENIX Security Symposium 2023: 5003-5020 - [i4]Peiyu Liu, Junming Liu, Lirong Fu, Kangjie Lu, Yifan Xia, Xuhong Zhang, Wenzhi Chen, Haiqin Weng, Shouling Ji, Wenhai Wang:
How ChatGPT is Solving Vulnerability Management Problem. CoRR abs/2311.06530 (2023) - [i3]Zichen Yu, Changyong Shu, Jiajun Deng, Kangjie Lu, Zongdai Liu, Jiangyong Yu, Dawei Yang, Hui Li, Yan Chen:
FlashOcc: Fast and Memory-Efficient Occupancy Prediction via Channel-to-Height Plugin. CoRR abs/2311.12058 (2023) - 2022
- [j5]Ziyan Wu, Tianming Cui, Arvind Narayanan, Yang Zhang, Kangjie Lu, Antonia Zhai, Zhi-Li Zhang:
GranularNF: Granular Decomposition of Stateful NFV at 100 Gbps Line Speed and Beyond. SIGMETRICS Perform. Evaluation Rev. 50(2): 46-51 (2022) - [j4]Bowen Wang, Kangjie Lu, Qiushi Wu, Aditya Pakki:
Unleashing Coveraged-Based Fuzzing Through Comprehensive, Efficient, and Faithful Exploitable-Bug Exposing. IEEE Trans. Dependable Secur. Comput. 19(5): 2998-3010 (2022) - [j3]Zhao Li, Yuhang Chen, Yi Song, Kangjie Lu, Jinwei Shen:
Effective Covering Array Generation Using an Improved Particle Swarm Optimization. IEEE Trans. Reliab. 71(1): 284-294 (2022) - [c42]Yutian Yang, Wenbo Shen, Xun Xie, Kangjie Lu, Mingsen Wang, Tianyu Zhou, Chenggang Qin, Wang Yu, Kui Ren:
Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms. ACSAC 2022: 869-880 - [c41]Qingyang Zhou, Qiushi Wu, Dinghao Liu, Shouling Ji, Kangjie Lu:
Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs. CCS 2022: 3253-3267 - [c40]Zu-Ming Jiang, Jia-Ju Bai, Kangjie Lu, Shi-Min Hu:
Context-Sensitive and Directional Concurrency Fuzzing for Data-Race Detection. NDSS 2022 - [c39]Chenyang Lyu, Shouling Ji, Xuhong Zhang, Hong Liang, Binbin Zhao, Kangjie Lu, Raheem Beyah:
EMS: History-Driven Mutation for Coverage-based Fuzzing. NDSS 2022 - [c38]Wenjia Zhao, Kangjie Lu, Qiushi Wu, Yong Qi:
Semantic-Informed Driver Fuzzing Without Both the Hardware Devices and the Emulators. NDSS 2022 - [c37]Penghui Li, Wei Meng, Kangjie Lu:
SEDiff: scope-aware differential fuzzing to test internal function models in symbolic execution. ESEC/SIGSOFT FSE 2022: 57-69 - [c36]Yunlong Lyu, Yi Fang, Yiwei Zhang, Qibin Sun, Siqi Ma, Elisa Bertino, Kangjie Lu, Juanru Li:
Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis. SP 2022: 2096-2113 - [c35]Qiushi Wu, Yue Xiao, Xiaojing Liao, Kangjie Lu:
OS-Aware Vulnerability Prioritization via Differential Severity Analysis. USENIX Security Symposium 2022: 395-412 - 2021
- [j2]Kangjie Lu, Meng Xu, Chengyu Song, Taesoo Kim, Wenke Lee:
Stopping Memory Disclosures via Diversification and Replicated Execution. IEEE Trans. Dependable Secur. Comput. 18(1): 160-173 (2021) - [c34]Nanzi Yang, Wenbo Shen, Jinku Li, Yutian Yang, Kangjie Lu, Jietao Xiao, Tianyu Zhou, Chenggang Qin, Wang Yu, Jianfeng Ma, Kui Ren:
Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization. CCS 2021: 764-778 - [c33]Lirong Fu, Shouling Ji, Kangjie Lu, Peiyu Liu, Xuhong Zhang, Yuxuan Duan, Zihui Zhang, Wenzhi Chen, Yanjun Wu:
CPscan: Detecting Bugs Caused by Code Pruning in IoT Kernels. CCS 2021: 794-810 - [c32]Dinghao Liu, Qiushi Wu, Shouling Ji, Kangjie Lu, Zhenguang Liu, Jianhai Chen, Qinming He:
Detecting Missed Security Operations Through Differential Checking of Object-based Similar Paths. CCS 2021: 1627-1644 - [c31]Peiyu Liu, Shouling Ji, Xuhong Zhang, Qinming Dai, Kangjie Lu, Lirong Fu, Wenzhi Chen, Peng Cheng, Wenhai Wang, Raheem Beyah:
IFIZZ: Deep-State and Efficient Fault-Scenario Generation to Test IoT Firmware. ASE 2021: 805-816 - [c30]Navid Emamdoost, Qiushi Wu, Kangjie Lu, Stephen McCamant:
Detecting Kernel Memory Leaks in Specialized Modules with Ownership Reasoning. NDSS 2021 - [c29]Jia-Ju Bai, Tuo Li, Kangjie Lu, Shi-Min Hu:
Static Detection of Unsafe DMA Accesses in Device Drivers. USENIX Security Symposium 2021: 1629-1645 - [c28]Qiushi Wu, Aditya Pakki, Navid Emamdoost, Stephen McCamant, Kangjie Lu:
Understanding and Detecting Disordered Error Handling with Precise Function Pairing. USENIX Security Symposium 2021: 2041-2058 - [c27]Xin Tan, Yuan Zhang, Xiyu Yang, Kangjie Lu, Min Yang:
Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking. USENIX Security Symposium 2021: 2471-2488 - [c26]Yuwei Li, Shouling Ji, Yuan Chen, Sizhuang Liang, Wei-Han Lee, Yueyao Chen, Chenyang Lyu, Chunming Wu, Raheem Beyah, Peng Cheng, Kangjie Lu, Ting Wang:
UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers. USENIX Security Symposium 2021: 2777-2794 - [c25]Penghui Li, Wei Meng, Kangjie Lu, Changhua Luo:
On the Feasibility of Automated Built-in Function Modeling for PHP Symbolic Execution. WWW 2021: 58-69 - 2020
- [c24]Aditya Pakki, Kangjie Lu:
Exaggerated Error Handling Hurts! An In-Depth Study and Context-Aware Detection. CCS 2020: 1203-1218 - [c23]Peiyu Liu, Shouling Ji, Lirong Fu, Kangjie Lu, Xuhong Zhang, Wei-Han Lee, Tao Lu, Wenzhi Chen, Raheem Beyah:
Understanding the Security Risks of Docker Hub. ESORICS (1) 2020: 257-276 - [c22]Wenjia Zhao, Kangjie Lu, Yong Qi, Saiyu Qi:
MPTEE: bringing flexible and efficient memory protection to Intel SGX. EuroSys 2020: 18:1-18:15 - [c21]Qiushi Wu, Yang He, Stephen McCamant, Kangjie Lu:
Precisely Characterizing Security Impact in a Flood of Patches via Symbolic Rule Comparison. NDSS 2020 - [c20]Zhe Wang, Chenggang Wu, Mengyao Xie, Yinqian Zhang, Kangjie Lu, Xiaofeng Zhang, Yuanming Lai, Yan Kang, Min Yang:
SEIMI: Efficient and Secure SMAP-Enabled Intra-process Memory Isolation. SP 2020: 592-607 - [c19]Zu-Ming Jiang, Jia-Ju Bai, Kangjie Lu, Shi-Min Hu:
Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection. USENIX Security Symposium 2020: 2595-2612 - [i2]Yuwei Li, Shouling Ji, Yuan Chen, Sizhuang Liang, Wei-Han Lee, Yueyao Chen, Chenyang Lyu, Chunming Wu, Raheem Beyah, Peng Cheng, Kangjie Lu, Ting Wang:
UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers. CoRR abs/2010.01785 (2020)
2010 – 2019
- 2019
- [c18]Kangjie Lu, Hong Hu:
Where Does It Go?: Refining Indirect-Call Targets with Multi-Layer Type Analysis. CCS 2019: 1867-1881 - [c17]Kangjie Lu, Aditya Pakki, Qiushi Wu:
Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs. ESORICS (2) 2019: 3-25 - [c16]Kangjie Lu, Aditya Pakki, Qiushi Wu:
Detecting Missing-Check Bugs via Semantic- and Context-Aware Criticalness and Constraints Inferences. USENIX Security Symposium 2019: 1769-1786 - 2018
- [c15]Wenwen Wang, Kangjie Lu, Pen-Chung Yew:
Check It Again: Detecting Lacking-Recheck Bugs in OS Kernels. CCS 2018: 1899-1913 - [c14]Meng Xu, Chenxiong Qian, Kangjie Lu, Michael Backes, Taesoo Kim:
Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels. IEEE Symposium on Security and Privacy 2018: 661-678 - 2017
- [b1]Kangjie Lu:
Securing software systems by preventing information leaks. Georgia Institute of Technology, Atlanta, GA, USA, 2017 - [c13]Kangjie Lu, Marie-Therese Walter, David Pfaff, Stefan Nümberger, Wenke Lee, Michael Backes:
Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying. NDSS 2017 - [c12]Meng Xu, Kangjie Lu, Taesoo Kim, Wenke Lee:
Bunshin: Compositing Security Mechanisms through Diversification. USENIX ATC 2017: 271-283 - [i1]Meng Xu, Kangjie Lu, Taesoo Kim, Wenke Lee:
Bunshin: Compositing Security Mechanisms through Diversification (with Appendix). CoRR abs/1705.09165 (2017) - 2016
- [j1]Meng Xu, Chengyu Song, Yang Ji, Ming-Wei Shih, Kangjie Lu, Cong Zheng, Ruian Duan, Yeongjin Jang, Byoungyoung Lee, Chenxiong Qian, Sangho Lee, Taesoo Kim:
Toward Engineering a Secure Android Ecosystem: A Survey of Existing Techniques. ACM Comput. Surv. 49(2): 38:1-38:47 (2016) - [c11]Kangjie Lu, Chengyu Song, Taesoo Kim, Wenke Lee:
UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages. CCS 2016: 920-932 - [c10]Kangjie Lu, Wenke Lee, Stefan Nürnberger, Michael Backes:
How to Make ASLR Win the Clone Wars: Runtime Re-Randomization. NDSS 2016 - [c9]Chengyu Song, Byoungyoung Lee, Kangjie Lu, William Harris, Taesoo Kim, Wenke Lee:
Enforcing Kernel Security Invariants with Data Flow Integrity. NDSS 2016 - 2015
- [c8]Kangjie Lu, Chengyu Song, Byoungyoung Lee, Simon P. Chung, Taesoo Kim, Wenke Lee:
ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks. CCS 2015: 280-291 - [c7]Haoyu Ma, Kangjie Lu, Xinjie Ma, Haining Zhang, Chunfu Jia, Debin Gao:
Software Watermarking using Return-Oriented Programming. AsiaCCS 2015: 369-380 - [c6]Kangjie Lu, Zhichun Li, Vasileios P. Kemerlis, Zhenyu Wu, Long Lu, Cong Zheng, Zhiyun Qian, Wenke Lee, Guofei Jiang:
Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting. NDSS 2015 - [c5]Jianjun Huang, Zhichun Li, Xusheng Xiao, Zhenyu Wu, Kangjie Lu, Xiangyu Zhang, Guofei Jiang:
SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps. USENIX Security Symposium 2015: 977-992 - 2014
- [c4]Kangjie Lu, Siyang Xiong, Debin Gao:
RopSteg: program steganography with return oriented programming. CODASPY 2014: 265-272 - 2013
- [c3]Tielei Wang, Kangjie Lu, Long Lu, Simon P. Chung, Wenke Lee:
Jekyll on iOS: When Benign Apps Become Evil. USENIX Security Symposium 2013: 559-572 - 2011
- [c2]Kangjie Lu, Dabi Zou, Weiping Wen, Debin Gao:
deRop: removing return-oriented programming from malware. ACSAC 2011: 363-372 - [c1]Kangjie Lu, Dabi Zou, Weiping Wen, Debin Gao:
Packed, Printable, and Polymorphic Return-Oriented Programming. RAID 2011: 101-120
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint