Publications

[16] Norax: Enabling Execute-Only Memory for COTS Binaries on AArch64
Yaohui Chen, Dongli Zhang, Ruowen Wang, Ahmed Azab, Long Lu, Hayawardh Vijayakumar, Wenbo Shen
In Proceedings of the 38th IEEE Symposium on Security and Privacy (S&P/Oakland'17). [acceptance rate 12.9% = 60/450] [pdf]
[15] Secure Integration of Web Content and Applications on Commodity Mobile Operating Systems
Drew Davidson, Yaohui Chen, Franklin George, Long Lu, Somesh Jha
In Proceedings of the 12th ACM on Asia Conference on Computer and Communications Security (AsiaCCS'17). [acceptance rate 18.6% = 67/359] [pdf]
[14] Where is the Weakest Link? A Study on Security Discrepancies between Android Apps and Their Website Counterparts
Arash Alavi, Alan Quach, Hang Zhang, Bryan Marsh, Farhan Ul Haq, Zhiyun Qian, Long Lu, Rajiv Gupta
In International Conference on Passive and Active Network Measurement (PAM'17). [acceptance rate 23% = 20/87] [pdf]
[13] CASE: Comprehensive Application Security Enforcement on COTS Mobile Devices
Suwen Zhu, Long Lu, Kapil Singh
In Proceedings of the 14th International Conference on Mobile Systems, Applications, and Services (MobiSys'16). [acceptance rate 15% = 31/197] [pdf] [slides] [doi]
[12] Shreds: Fine-grained Execution Units with Private Memory
Yaohui Chen, Sebassujeen Reymondjohnson, Zhichuang Sun, Long Lu
In Proceedings of the 37th IEEE Symposium on Security and Privacy (S&P/Oakland'16). [acceptance rate 13.3% = 55/413] [pdf] [slides] [doi]
[11] Remix: On-demand Live Randomization
Yue Chen, Zhi Wang, David Whalley, Long Lu
In Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (CODASPY'16). [pdf] [doi]
[10] WebCapsule: Towards a Lightweight Forensic Engine for Web Browsers
Christopher Neasbitt, Bo Li, Roberto Perdisci, Long Lu, Kapil Singh, Kang Li
In Proceedings of the 2015 ACM Conference on Computer and Communications Security (CCS'15). [acceptance rate 20% = 128/646] [pdf] [doi]
[9] Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting
Kangjie Lu, Zhichun Li, Vasileios Kemerlis, Zhenyu Wu, Long Lu, Cong Zheng, Zhiyun Qian, Wenke Lee, Guofei Jiang
In Proceedings of the 2015 Network and Distributed System Security Symposium (NDSS'15). [acceptance rate 17% = 51/302] [pdf]
[8] Preventing Use-after-free with Dangling Pointers Nullification
Byoungyoung Lee, Chengyu Song, Yeongjin Jang, Tielei Wang, Taesoo Kim, Long Lu, Wenke Lee
In Proceedings of the 2015 Network and Distributed System Security Symposium (NDSS'15). [acceptance rate 17% = 51/302] [pdf]
[7] From Zygote to Morula: Fortifying Weakened ASLR on Android
Byoungyoung Lee, Long Lu, Tielei Wang, Taesoo Kim, Wenke Lee
In Proceedings of the 35th IEEE Symposium on Security and Privacy (S&P/Oakland'14).
[acceptance rate 13.6% = 44/324] [pdf]
[doi]
[6] Jekyll on iOS: When Benign Apps Become Evil
Tielei Wang, Kangjie Lu, Long Lu, Simon Chong, Wenke Lee
In Proceedings of the 22nd USENIX Security Symposium (USENIX Security'13).
[acceptance rate 16% = 45/277] [pdf]
[5] Robust Scareware Image Detection
Christian Seifert, Jack W Stokes, Christina Colcernian, John C Platt, Long Lu
In Proceedings of the 38th International Conference on Acoustics, Speech, and Signal Processing (ICASSP '13).
[4] CHEX: statically vetting Android apps for component hijacking vulnerabilities
Long Lu, Zhichun Li, Zhenyu Wu, Wenke Lee, Guofei Jiang
In Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS '12). [acceptance rate 19% = 80/423] [pdf] [slides] [doi]
[3] SURF: detecting and measuring search poisoning
Long Lu, Roberto Perdisci, Wenke Lee
In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11). [acceptance rate 14% = 60/429] [pdf] [slides] [doi]
[2] BLADE: an attack-agnostic approach for preventing drive-by malware infections
Long Lu, Vinod Yegneswaran, Phillip Porras, Wenke Lee
In Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS '10). [acceptance rate 17% = 55/320] [pdf] [slides] [doi]
[1] Mapping kernel objects to enable systematic integrity checking
Martim Carbone, Weidong Cui, Long Lu, Wenke Lee, Marcus Peinado, Xuxian Jiang
In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09). [acceptance rate 18% = 58/325] [pdf] [doi]