default search action
Wenke Lee
Person information
- affiliation: Georgia Institute of Technology, Atlanta GA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j24]Shana Moothedath, Dinuka Sahabandu, Joey Allen, Linda Bushnell, Wenke Lee, Radha Poovendran:
Stochastic Dynamic Information Flow Tracking game using supervised learning for detecting advanced persistent threats. Autom. 159: 111353 (2024) - [j23]Matthew Lau, Ismaïla Seck, Athanasios P. Meliopoulos, Wenke Lee, Eugène Ndiaye:
Revisiting Non-separable Binary Classification and its Applications in Anomaly Detection. Trans. Mach. Learn. Res. 2024 (2024) - [c184]Matthew Lau, Leyan Pan, Stefan Davidov, Athanasios P. Meliopoulos, Wenke Lee:
Geometric Implications of Classification on Reducing Open Space Risk. Tiny Papers @ ICLR 2024 - [c183]Joey Allen, Zheng Yang, Feng Xiao, Matthew Landen, Roberto Perdisci, Wenke Lee:
WEBRR: A Forensic System for Replaying and Investigating Web-Based Attacks in The Modern Web. USENIX Security Symposium 2024 - [c182]Yupeng Yang, Yongheng Chen, Rui Zhong, Jizhou Chen, Wenke Lee:
Towards Generic Database Management System Fuzzing. USENIX Security Symposium 2024 - [i17]Matthew Lau, Haoran Wang, Alec Helbling, Matthew Hull, Shengyun Peng, Martin Andreoni, Willian T. Lunardi, Wenke Lee:
Non-Robust Features are Not Always Useful in One-Class Classification. CoRR abs/2407.06372 (2024) - 2023
- [j22]Yisroel Mirsky, Ambra Demontis, Jaidip Kotak, Ram Shankar, Gelei Deng, Liu Yang, Xiangyu Zhang, Maura Pintor, Wenke Lee, Yuval Elovici, Battista Biggio:
The Threat of Offensive AI to Organizations. Comput. Secur. 124: 103006 (2023) - [c181]Moses Ike, Kandy Phan, Keaton Sadoski, Romuald Valme, Wenke Lee:
Scaphy: Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical. SP 2023: 20-37 - [c180]Carter Yagemann, Simon P. Chung, Brendan Saltaformaggio, Wenke Lee:
PUMM: Preventing Use-After-Free Using Execution Unit Partitioning. USENIX Security Symposium 2023: 823-840 - [c179]Yongheng Chen, Rui Zhong, Yupeng Yang, Hong Hu, Dinghao Wu, Wenke Lee:
µFUZZ: Redesign of Parallel Fuzzing using Microservice Architecture. USENIX Security Symposium 2023: 1325-1342 - [c178]Yisroel Mirsky, George Macon, Michael D. Brown, Carter Yagemann, Matthew Pruett, Evan Downing, J. Sukarno Mertoguno, Wenke Lee:
VulChecker: Graph-based Vulnerability Localization in Source Code. USENIX Security Symposium 2023: 6557-6574 - [c177]Zheng Yang, Joey Allen, Matthew Landen, Roberto Perdisci, Wenke Lee:
TRIDENT: Towards Detecting and Mitigating Web-based Social Engineering Attacks. USENIX Security Symposium 2023: 6701-6718 - [i16]Moses Ike, Kandy Phan, Anwesh Badapanda, Matthew Landen, Keaton Sadoski, Wanda Guo, Asfahan Shah, Saman A. Zonouz, Wenke Lee:
Bridging Both Worlds in Semantics and Time: Domain Knowledge Based Analysis and Correlation of Industrial Process. CoRR abs/2311.18539 (2023) - [i15]Matthew Lau, Ismaïla Seck, Athanasios P. Meliopoulos, Wenke Lee, Eugène Ndiaye:
Revisiting Non-separable Binary Classification and its Applications in Anomaly Detection. CoRR abs/2312.01541 (2023) - 2022
- [j21]Yisroel Mirsky, Wenke Lee:
The Creation and Detection of Deepfakes: A Survey. ACM Comput. Surv. 54(1): 7:1-7:41 (2022) - [c176]Matthew Landen, Key-whan Chung, Moses Ike, Sarah Mackay, Jean-Paul Watson, Wenke Lee:
DRAGON: Deep Reinforcement Learning for Autonomous Grid Operation and Attack Detection. ACSAC 2022: 13-27 - [c175]ChangSeok Oh, Sangho Lee, Chenxiong Qian, Hyungjoon Koo, Wenke Lee:
DeView: Confining Progressive Web Applications by Debloating Web APIs. ACSAC 2022: 881-895 - [c174]Feng Xiao, Zheng Yang, Joey Allen, Guangliang Yang, Grant Williams, Wenke Lee:
Understanding and Mitigating Remote Code Execution Vulnerabilities in Cross-platform Ecosystem. CCS 2022: 2975-2988 - [i14]Moses Ike, Kandy Phan, Keaton Sadoski, Romuald Valme, Wenke Lee:
SCAPHY: Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical. CoRR abs/2211.14642 (2022) - 2021
- [j20]Carter Yagemann, Simon Pak Ho Chung, Erkam Uzun, Sai Ragam, Brendan Saltaformaggio, Wenke Lee:
Modeling Large-Scale Manipulation in Open Stock Markets. IEEE Secur. Priv. 19(6): 58-65 (2021) - [j19]Kangjie Lu, Meng Xu, Chengyu Song, Taesoo Kim, Wenke Lee:
Stopping Memory Disclosures via Diversification and Replicated Execution. IEEE Trans. Dependable Secur. Comput. 18(1): 160-173 (2021) - [c173]Erkam Uzun, Carter Yagemann, Simon P. Chung, Vladimir Kolesnikov, Wenke Lee:
Cryptographic Key Derivation from Biometric Inferences for Remote Authentication. AsiaCCS 2021: 629-643 - [c172]Kyuhong Park, Burak Sahin, Yongheng Chen, Jisheng Zhao, Evan Downing, Hong Hu, Wenke Lee:
Identifying Behavior Dispatchers for Malware Analysis. AsiaCCS 2021: 759-773 - [c171]Carter Yagemann, Simon P. Chung, Brendan Saltaformaggio, Wenke Lee:
Automated Bug Hunting With Data-Driven Symbolic Root Cause Analysis. CCS 2021: 320-336 - [c170]Carter Yagemann, Mohammad A. Noureddine, Wajih Ul Hassan, Simon P. Chung, Adam Bates, Wenke Lee:
Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks. CCS 2021: 3337-3351 - [c169]Ruian Duan, Omar Alrawi, Ranjita Pai Kasturi, Ryan Elder, Brendan Saltaformaggio, Wenke Lee:
Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages. NDSS 2021 - [c168]Yongheng Chen, Rui Zhong, Hong Hu, Hangfan Zhang, Yupeng Yang, Dinghao Wu, Wenke Lee:
One Engine to Fuzz 'em All: Generic Language Processor Testing with Semantic Validation. SP 2021: 642-658 - [c167]Erkam Uzun, Simon P. Chung, Vladimir Kolesnikov, Alexandra Boldyreva, Wenke Lee:
Fuzzy Labeled Private Set Intersection with Applications to Private Real-Time Biometric Search. USENIX Security Symposium 2021: 911-928 - [c166]Carter Yagemann, Matthew Pruett, Simon P. Chung, Kennon Bittick, Brendan Saltaformaggio, Wenke Lee:
ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems. USENIX Security Symposium 2021: 1989-2006 - [c165]Feng Xiao, Jianwei Huang, Yichang Xiong, Guangliang Yang, Hong Hu, Guofei Gu, Wenke Lee:
Abusing Hidden Properties to Attack the Node.js Ecosystem. USENIX Security Symposium 2021: 2951-2968 - [c164]Evan Downing, Yisroel Mirsky, Kyuhong Park, Wenke Lee:
DeepReflect: Discovering Malicious Functionality through Binary Reconstruction. USENIX Security Symposium 2021: 3469-3486 - [c163]Dongsong Yu, Guangliang Yang, Guozhu Meng, Xiaorui Gong, Xiu Zhang, Xiaobo Xiang, Xiaoyu Wang, Yue Jiang, Kai Chen, Wei Zou, Wenke Lee, Wenchang Shi:
SEPAL: Towards a Large-scale Analysis of SEAndroid Policy Customization. WWW 2021: 2733-2744 - [i13]Dongsong Yu, Guangliang Yang, Guozhu Meng, Xiaorui Gong, Xiu Zhang, Xiaobo Xiang, Xiaoyu Wang, Yue Jiang, Kai Chen, Wei Zou, Wenke Lee, Wenchang Shi:
SEPAL: Towards a Large-scale Analysis of SEAndroid Policy Customization. CoRR abs/2102.09764 (2021) - [i12]Yisroel Mirsky, Ambra Demontis, Jaidip Kotak, Ram Shankar, Gelei Deng, Liu Yang, Xiangyu Zhang, Wenke Lee, Yuval Elovici, Battista Biggio:
The Threat of Offensive AI to Organizations. CoRR abs/2106.15764 (2021) - 2020
- [j18]Shana Moothedath, Dinuka Sahabandu, Joey Allen, Andrew Clark, Linda Bushnell, Wenke Lee, Radha Poovendran:
A Game-Theoretic Approach for Dynamic Information Flow Tracking to Detect Multistage Advanced Persistent Threats. IEEE Trans. Autom. Control. 65(12): 5248-5263 (2020) - [c162]Carter Yagemann, Simon P. Chung, Erkam Uzun, Sai Ragam, Brendan Saltaformaggio, Wenke Lee:
On the Feasibility of Automating Stock Market Manipulation. ACSAC 2020: 277-290 - [c161]Wenke Lee:
Machine Learning and Security: The Good, The Bad, and The Ugly. CCS 2020: 1-2 - [c160]Chenxiong Qian, Hyungjoon Koo, ChangSeok Oh, Taesoo Kim, Wenke Lee:
Slimium: Debloating the Chromium Browser with Feature Subsetting. CCS 2020: 461-476 - [c159]Joey Allen, Zheng Yang, Matthew Landen, Raghav Bhat, Harsh Grover, Andrew Chang, Yang Ji, Roberto Perdisci, Wenke Lee:
Mnemosyne: An Effective and Efficient Postmortem Watering Hole Attack Investigation System. CCS 2020: 787-802 - [c158]Rui Zhong, Yongheng Chen, Hong Hu, Hangfan Zhang, Wenke Lee, Dinghao Wu:
SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback. CCS 2020: 955-970 - [c157]Dinuka Sahabandu, Joey Allen, Shana Moothedath, Linda Bushnell, Wenke Lee, Radha Poovendran:
Quickest Detection of Advanced Persistent Threats: A Semi-Markov Game Approach. ICCPS 2020: 9-19 - [i11]Ruian Duan, Omar Alrawi, Ranjita Pai Kasturi, Ryan Elder, Brendan Saltaformaggio, Wenke Lee:
Measuring and Preventing Supply Chain Attacks on Package Managers. CoRR abs/2002.01139 (2020) - [i10]Yisroel Mirsky, Wenke Lee:
The Creation and Detection of Deepfakes: A Survey. CoRR abs/2004.11138 (2020) - [i9]Rui Zhong, Yongheng Chen, Hong Hu, Hangfan Zhang, Wenke Lee, Dinghao Wu:
SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback. CoRR abs/2006.02398 (2020) - [i8]Shana Moothedath, Dinuka Sahabandu, Joey Allen, Andrew Clark, Linda Bushnell, Wenke Lee, Radha Poovendran:
Dynamic Information Flow Tracking for Detection of Advanced Persistent Threats: A Stochastic Game Approach. CoRR abs/2006.12327 (2020) - [i7]Dinuka Sahabandu, Shana Moothedath, Joey Allen, Linda Bushnell, Wenke Lee, Radha Poovendran:
A Multi-Agent Reinforcement Learning Approach for Dynamic Information Flow Tracking Games for Advanced Persistent Threats. CoRR abs/2007.00076 (2020) - [i6]Shana Moothedath, Dinuka Sahabandu, Joey Allen, Linda Bushnell, Wenke Lee, Radha Poovendran:
Stochastic Dynamic Information Flow Tracking Game using Supervised Learning for Detecting Advanced Persistent Threats. CoRR abs/2007.12327 (2020)
2010 – 2019
- 2019
- [c156]Dinuka Sahabandu, Shana Moothedath, Linda Bushnell, Radha Poovendran, Joey Allen, Wenke Lee, Andrew Clark:
A Game Theoretic Approach for Dynamic Information Flow Tracking with Conditional Branching. ACC 2019: 2289-2296 - [c155]Dinuka Sahabandu, Shana Moothedath, Joey Allen, Andrew Clark, Linda Bushnell, Wenke Lee, Radha Poovendran:
Dynamic Information Flow Tracking Games for Simultaneous Detection of Multiple Attackers. CDC 2019: 567-574 - [c154]Shruti Misra, Shana Moothedath, Hossein Hosseini, Joey Allen, Linda Bushnell, Wenke Lee, Radha Poovendran:
Learning Equilibria in Stochastic Information Flow Tracking Games with Partial Knowledge. CDC 2019: 4053-4060 - [c153]Dinuka Sahabandu, Shana Moothedath, Joey Allen, Linda Bushnell, Wenke Lee, Radha Poovendran:
Stochastic Dynamic Information Flow Tracking Game with Reinforcement Learning. GameSec 2019: 417-438 - [c152]Carter Yagemann, Salmin Sultana, Li Chen, Wenke Lee:
Barnum: Detecting Document Malware via Control Flow Anomalies in Hardware Traces. ISC 2019: 341-359 - [c151]Ruian Duan, Ashish Bijlani, Yang Ji, Omar Alrawi, Yiyuan Xiong, Moses Ike, Brendan Saltaformaggio, Wenke Lee:
Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries. NDSS 2019 - [c150]Chenxiong Qian, Hong Hu, Mansour Alharthi, Simon Pak Ho Chung, Taesoo Kim, Wenke Lee:
RAZOR: A Framework for Post-deployment Software Debloating. USENIX Security Symposium 2019: 1733-1750 - 2018
- [c149]Joey Allen, Matthew Landen, Sanya Chaba, Yang Ji, Simon Pak Ho Chung, Wenke Lee:
Improving Accuracy of Android Malware Detection with Lightweight Contextual Awareness. ACSAC 2018: 210-221 - [c148]Andrea Possemato, Andrea Lanzi, Simon Pak Ho Chung, Wenke Lee, Yanick Fratantonio:
ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android. CCS 2018: 1120-1136 - [c147]Hong Hu, Chenxiong Qian, Carter Yagemann, Simon Pak Ho Chung, William R. Harris, Taesoo Kim, Wenke Lee:
Enforcing Unique Code Target Property for Control-Flow Integrity. CCS 2018: 1470-1486 - [c146]Dinuka Sahabandu, Baicen Xiao, Andrew Clark, Sangho Lee, Wenke Lee, Radha Poovendran:
DIFT Games: Dynamic Information Flow Tracking Games for Advanced Persistent Threats. CDC 2018: 1136-1143 - [c145]Shana Moothedath, Dinuka Sahabandu, Andrew Clark, Sangho Lee, Wenke Lee, Radha Poovendran:
Multi-stage Dynamic Information Flow Tracking Game. GameSec 2018: 80-101 - [c144]Antonio Bianchi, Yanick Fratantonio, Aravind Machiry, Christopher Kruegel, Giovanni Vigna, Simon Pak Ho Chung, Wenke Lee:
Broken Fingers: On the Usage of the Fingerprint API in Android. NDSS 2018 - [c143]Erkam Uzun, Simon Pak Ho Chung, Irfan Essa, Wenke Lee:
rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System. NDSS 2018 - [c142]Wei Meng, Chenxiong Qian, Shuang Hao, Kevin Borgolte, Giovanni Vigna, Christopher Kruegel, Wenke Lee:
Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks. USENIX Security Symposium 2018: 393-410 - [c141]Yang Ji, Sangho Lee, Mattia Fazzini, Joey Allen, Evan Downing, Taesoo Kim, Alessandro Orso, Wenke Lee:
Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking. USENIX Security Symposium 2018: 1705-1722 - [i5]Shana Moothedath, Dinuka Sahabandu, Joey Allen, Andrew Clark, Linda Bushnell, Wenke Lee, Radha Poovendran:
A Game Theoretic Approach for Dynamic Information Flow Tracking to Detect Multi-Stage Advanced Persistent Threats. CoRR abs/1811.05622 (2018) - 2017
- [c140]Yang Ji, Sangho Lee, Evan Downing, Weiren Wang, Mattia Fazzini, Taesoo Kim, Alessandro Orso, Wenke Lee:
RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking. CCS 2017: 377-390 - [c139]Ruian Duan, Ashish Bijlani, Meng Xu, Taesoo Kim, Wenke Lee:
Identifying Open-Source License Violation and 1-day Security Risk at Large Scale. CCS 2017: 2169-2185 - [c138]Kangjie Lu, Marie-Therese Walter, David Pfaff, Stefan Nümberger, Wenke Lee, Michael Backes:
Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying. NDSS 2017 - [c137]Yanick Fratantonio, Chenxiong Qian, Simon P. Chung, Wenke Lee:
Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop. IEEE Symposium on Security and Privacy 2017: 1041-1057 - [c136]Meng Xu, Kangjie Lu, Taesoo Kim, Wenke Lee:
Bunshin: Compositing Security Mechanisms through Diversification. USENIX ATC 2017: 271-283 - [c135]Ren Ding, Chenxiong Qian, Chengyu Song, William Harris, Taesoo Kim, Wenke Lee:
Efficient Protection of Path-Sensitive Control Security. USENIX Security Symposium 2017: 131-148 - [i4]Meng Xu, Kangjie Lu, Taesoo Kim, Wenke Lee:
Bunshin: Compositing Security Mechanisms through Diversification (with Appendix). CoRR abs/1705.09165 (2017) - [i3]Ruian Duan, Weiren Wang, Wenke Lee:
Cloaker Catcher: A Client-based Cloaking Detection System. CoRR abs/1710.01387 (2017) - 2016
- [c134]Kangjie Lu, Chengyu Song, Taesoo Kim, Wenke Lee:
UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages. CCS 2016: 920-932 - [c133]Yizheng Chen, Panagiotis Kintis, Manos Antonakakis, Yacin Nadji, David Dagon, Wenke Lee, Michael Farrell:
Financial Lower Bounds of Online Advertising Abuse - A Four Year Case Study of the TDSS/TDL4 Botnet. DIMVA 2016: 231-254 - [c132]Yang Ji, Sangho Lee, Wenke Lee:
RecProv: Towards Provenance-Aware User Space Record and Replay. IPAW 2016: 3-15 - [c131]Kangjie Lu, Wenke Lee, Stefan Nürnberger, Michael Backes:
How to Make ASLR Win the Clone Wars: Runtime Re-Randomization. NDSS 2016 - [c130]Wei Meng, Ren Ding, Simon P. Chung, Steven Han, Wenke Lee:
The Price of Free: Privacy Leakage in Personalized Mobile In-Apps Ads. NDSS 2016 - [c129]Chengyu Song, Byoungyoung Lee, Kangjie Lu, William Harris, Taesoo Kim, Wenke Lee:
Enforcing Kernel Security Invariants with Data Flow Integrity. NDSS 2016 - [c128]Le Guan, Jun Xu, Shuai Wang, Xinyu Xing, Lin Lin, Heqing Huang, Peng Liu, Wenke Lee:
From Physical to Cyber: Escalating Protection for Personalized Auto Insurance. SenSys 2016: 42-55 - [c127]Chengyu Song, Hyungon Moon, Monjur Alam, Insu Yun, Byoungyoung Lee, Taesoo Kim, Wenke Lee, Yunheung Paek:
HDFI: Hardware-Assisted Data-Flow Isolation. IEEE Symposium on Security and Privacy 2016: 1-17 - [c126]Wei Meng, Byoungyoung Lee, Xinyu Xing, Wenke Lee:
TrackMeOrNot: Enabling Flexible Control on Web Tracking. WWW 2016: 99-109 - [i2]Le Guan, Jun Xu, Shuai Wang, Xinyu Xing, Lin Lin, Heqing Huang, Peng Liu, Wenke Lee:
Exploiting Insurance Telematics for Fun and Profit. CoRR abs/1609.02234 (2016) - 2015
- [c125]Kangjie Lu, Chengyu Song, Byoungyoung Lee, Simon P. Chung, Taesoo Kim, Wenke Lee:
ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks. CCS 2015: 280-291 - [c124]Meng Xu, Yeongjin Jang, Xinyu Xing, Taesoo Kim, Wenke Lee:
UCognito: Private Browsing without Tears. CCS 2015: 438-449 - [c123]Byoungyoung Lee, Chengyu Song, Yeongjin Jang, Tielei Wang, Taesoo Kim, Long Lu, Wenke Lee:
Preventing Use-after-free with Dangling Pointers Nullification. NDSS 2015 - [c122]Kangjie Lu, Zhichun Li, Vasileios P. Kemerlis, Zhenyu Wu, Long Lu, Cong Zheng, Zhiyun Qian, Wenke Lee, Guofei Jiang:
Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting. NDSS 2015 - [c121]Chengyu Song, Chao Zhang, Tielei Wang, Wenke Lee, David Melski:
Exploiting and Protecting Dynamic Code Generation. NDSS 2015 - [c120]Byoungyoung Lee, Chengyu Song, Taesoo Kim, Wenke Lee:
Type Casting Verification: Stopping an Emerging Attack Vector. USENIX Security Symposium 2015: 81-96 - [c119]Xinyu Xing, Wei Meng, Byoungyoung Lee, Udi Weinsberg, Anmol Sheth, Roberto Perdisci, Wenke Lee:
Understanding Malvertising Through Ad-Injecting Browser Extensions. WWW 2015: 1286-1295 - 2014
- [j17]Junjie Zhang, Roberto Perdisci, Wenke Lee, Xiapu Luo, Unum Sarfraz:
Building a Scalable System for Stealthy P2P-Botnet Detection. IEEE Trans. Inf. Forensics Secur. 9(1): 27-38 (2014) - [c118]Yeongjin Jang, Chengyu Song, Simon P. Chung, Tielei Wang, Wenke Lee:
A11y Attacks: Exploiting Accessibility in Operating Systems. CCS 2014: 103-115 - [c117]Wei Meng, Xinyu Xing, Anmol Sheth, Udi Weinsberg, Wenke Lee:
Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising. CCS 2014: 129-140 - [c116]Tielei Wang, Chengyu Song, Wenke Lee:
Diagnosis and Emergency Patch Generation for Integer Overflow Exploits. DIMVA 2014: 255-275 - [c115]Yizheng Chen, Manos Antonakakis, Roberto Perdisci, Yacin Nadji, David Dagon, Wenke Lee:
DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS Traffic. DSN 2014: 598-609 - [c114]Yeongjin Jang, Simon P. Chung, Bryan D. Payne, Wenke Lee:
Gyrus: A Framework for User-Intent Monitoring of Text-based Networked Applications. NDSS 2014 - [c113]Xinyu Xing, Wei Meng, Dan Doozan, Nick Feamster, Wenke Lee, Alex C. Snoeren:
Exposing Inconsistent Web Search Results with Bobble. PAM 2014: 131-140 - [c112]Byoungyoung Lee, Long Lu, Tielei Wang, Taesoo Kim, Wenke Lee:
From Zygote to Morula: Fortifying Weakened ASLR on Android. IEEE Symposium on Security and Privacy 2014: 424-439 - [c111]Billy Lau, Simon P. Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, Alexandra Boldyreva:
Mimesis Aegis: A Mimicry Privacy Shield-A System's Approach to Data Privacy on Public Cloud. USENIX Security Symposium 2014: 33-48 - [c110]Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon P. Chung, Billy Lau, Wenke Lee:
On the Feasibility of Large-Scale Infections of iOS Devices. USENIX Security Symposium 2014: 79-93 - 2013
- [c109]Yacin Nadji, Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee:
Beheading hydras: performing effective botnet takedowns. CCS 2013: 121-132 - [c108]Brendan Dolan-Gavitt, Tim Leek, Josh Hodosh, Wenke Lee:
Tappan Zee (north) bridge: mining memory accesses for introspection. CCS 2013: 839-850 - [c107]Charles Lever, Manos Antonakakis, Bradley Reaves, Patrick Traynor, Wenke Lee:
The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers. NDSS 2013 - [c106]Junjie Zhang, Yinglian Xie, Fang Yu, David Soukal, Wenke Lee:
Intention and Origination: An Inside Look at Large-Scale Bot Queries. NDSS 2013 - [c105]Yacin Nadji, Manos Antonakakis, Roberto Perdisci, Wenke Lee:
Connected Colors: Unveiling the Structure of Criminal Networks. RAID 2013: 390-410 - [c104]Tielei Wang, Kangjie Lu, Long Lu, Simon P. Chung, Wenke Lee:
Jekyll on iOS: When Benign Apps Become Evil. USENIX Security Symposium 2013: 559-572 - [c103]Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee:
Take This Personally: Pollution Attacks on Personalized Services. USENIX Security Symposium 2013: 671-686 - 2012
- [j16]Manos Antonakakis, Roberto Perdisci, Nikolaos Vasiloglou, Wenke Lee:
Detecting and Tracking the Rise of DGA-Based Malware. login Usenix Mag. 37(6) (2012) - [c102]Long Lu, Zhichun Li, Zhenyu Wu, Wenke Lee, Guofei Jiang:
CHEX: statically vetting Android apps for component hijacking vulnerabilities. CCS 2012: 229-240 - [c101]Martim Carbone, Matthew Conover, Bruce Montague, Wenke Lee:
Secure and Robust Monitoring of Virtual Machines through Guest-Assisted Introspection. RAID 2012: 22-41 - [c100]Manos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos Vasiloglou, Saeed Abu-Nimeh, Wenke Lee, David Dagon:
From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware. USENIX Security Symposium 2012: 491-506 - [c99]Chengyu Song, Paul Royal, Wenke Lee:
Impeding Automated Malware Analysis with Environment-sensitive Malware. HotSec 2012 - [c98]