What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Long Lu
Google Scholar
34
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/uss
CO3: Concolic Co-execution for Firmware.
Changming Liu
Alejandro Mera
Engin Kirda
Meng Xu
Long Lu
2024
conf/uss
SHiFT: Semi-hosted Fuzz Testing for Embedded Applications.
Alejandro Mera
Changming Liu
Ruimin Sun
Engin Kirda
Long Lu
2023
conf/uss
A Study of Multi-Factor and Risk-Based Authentication Availability.
Anthony Gavazzi
Ryan Williams
Engin Kirda
Long Lu
Andre King
Andy Davis
Tim Leek
2023
conf/sp
ShadowNet: A Secure and Efficient On-device Model Inference System for Convolutional Neural Networks.
Zhichuang Sun
Ruimin Sun
Changming Liu
Amrita Roy Chowdhury
Long Lu
Somesh Jha
2022
conf/ndss
D-Box: DMA-enabled Compartmentalization for Embedded Applications.
Alejandro Mera
Yi Hui Chen
Ruimin Sun
Engin Kirda
Long Lu
2021
conf/uss
Mind Your Weight(s): A Large-scale Study on Insufficient Machine Learning Model Protection in Mobile Apps.
Zhichuang Sun
Ruimin Sun
Long Lu
Alan Mislove
2021
conf/uss
Finding Bugs Using Your Own Code: Detecting Functionally-similar yet Inconsistent Code.
Mansour Ahmadi
Reza Mirzazade Farkhani
Ryan Williams
Long Lu
2021
conf/uss
PTAuth: Temporal Memory Safety via Robust Points-to Authentication.
Reza Mirzazade Farkhani
Mansour Ahmadi
Long Lu
2021
conf/sp
DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis.
Alejandro Mera
Bo Feng
Long Lu
Engin Kirda
2021
conf/eurosp
SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses.
Ruimin Sun
Alejandro Mera
Long Lu
David R. Choffnes
2021
conf/asiaccs
SoK: Enabling Security Analyses of Embedded Systems via Rehosting.
Andrew Fasano
Tiemoko Ballo
Marius Muench
Tim Leek
Alexander Bulekov
Brendan Dolan-Gavitt
Manuel Egele
Aurélien Francillon
Long Lu
Nick Gregory
Davide Balzarotti
William Robertson
2021
conf/ndss
KUBO: Precise and Scalable Detection of User-triggerable Undefined Behavior Bugs in OS Kernel.
Changming Liu
Yaohui Chen
Long Lu
2020
conf/ccs
FEAST'20: Fifth Workshop on Forming an Ecosystem Around Software Transformation.
Kevin W. Hamlen
Long Lu
2020
conf/uss
P2IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling.
Bo Feng
Alejandro Mera
Long Lu
2020
conf/sp
OAT: Attesting Operation Integrity of Embedded Devices.
Zhichuang Sun
Bo Feng
Long Lu
Somesh Jha
2020
conf/sp
SAVIOR: Towards Bug-Driven Hybrid Testing.
Yaohui Chen
Peng Li
Jun Xu
Shengjian Guo
Rundong Zhou
Yulong Zhang
Tao Wei
Long Lu
2019
conf/ccs
PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary.
Yaohui Chen
Dongliang Mu
Jun Xu
Zhichuang Sun
Wenbo Shen
Xinyu Xing
Long Lu
Bing Mao
2019
conf/acsac
Detecting (absent) app-to-app authentication on cross-device short-distance channels.
Stefano Cristalli
Long Lu
Danilo Bruschi
Andrea Lanzi
2018
conf/uss
An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications.
Xiaohan Zhang
Yuan Zhang
Qianqian Mo
Hao Xia
Zhemin Yang
Min Yang
Xiaofeng Wang
Long Lu
Hai-Xin Duan
2018
conf/sp
Compiler-Assisted Code Randomization.
Hyungjoon Koo
Yaohui Chen
Long Lu
Vasileios P. Kemerlis
Michalis Polychronakis
2018
conf/ndss
InstaGuard: Instantly Deployable Hot-patches for Vulnerable System Programs on Android.
Yaohui Chen
Yuping Li
Long Lu
Yueh-Hsun Lin
Hayawardh Vijayakumar
Zhi Wang
Xinming Ou
2017
conf/ccs
Secure Integration of Web Content and Applications on Commodity Mobile Operating Systems.
Drew Davidson
Yaohui Chen
Franklin George
Long Lu
Somesh Jha
2017
conf/sp
NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64.
Yaohui Chen
Dongli Zhang
Ruowen Wang
Rui Qiao
Ahmed M. Azab
Long Lu
Hayawardh Vijayakumar
Wenbo Shen
2016
conf/ccs
Sixth Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2016).
Long Lu
Mohammad Mannan
2016
conf/sp
Shreds: Fine-Grained Execution Units with Private Memory.
Yaohui Chen
Sebassujeen Reymondjohnson
Zhichuang Sun
Long Lu
2015
conf/ccs
WebCapsule: Towards a Lightweight Forensic Engine for Web Browsers.
Christopher Neasbitt
Bo Li
Roberto Perdisci
Long Lu
Kapil Singh
Kang Li
2015
conf/ndss
Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting.
Kangjie Lu
Zhichun Li
Vasileios P. Kemerlis
Zhenyu Wu
Long Lu
Cong Zheng
Zhiyun Qian
Wenke Lee
Guofei Jiang
2015
conf/ndss
Preventing Use-after-free with Dangling Pointers Nullification.
Byoungyoung Lee
Chengyu Song
Yeongjin Jang
Tielei Wang
Taesoo Kim
Long Lu
Wenke Lee
2014
conf/sp
From Zygote to Morula: Fortifying Weakened ASLR on Android.
Byoungyoung Lee
Long Lu
Tielei Wang
Taesoo Kim
Wenke Lee
2013
conf/uss
Jekyll on iOS: When Benign Apps Become Evil.
Tielei Wang
Kangjie Lu
Long Lu
Simon P. Chung
Wenke Lee
2012
conf/ccs
CHEX: statically vetting Android apps for component hijacking vulnerabilities.
Long Lu
Zhichun Li
Zhenyu Wu
Wenke Lee
Guofei Jiang
2011
conf/ccs
SURF: detecting and measuring search poisoning.
Long Lu
Roberto Perdisci
Wenke Lee
2010
conf/ccs
BLADE: an attack-agnostic approach for preventing drive-by malware infections.
Long Lu
Vinod Yegneswaran
Phillip A. Porras
Wenke Lee
2009
conf/ccs
Mapping kernel objects to enable systematic integrity checking.
Martim Carbone
Weidong Cui
Long Lu
Wenke Lee
Marcus Peinado
Xuxian Jiang
Coauthors
Ahmed M. Azab
(1)
Alan Mislove
(1)
Alejandro Mera
(6)
Alexander Bulekov
(1)
Amrita Roy Chowdhury
(1)
Andre King
(1)
Andrea Lanzi
(1)
Andrew Fasano
(1)
Andy Davis
(1)
Anthony Gavazzi
(1)
Aurélien Francillon
(1)
Bing Mao
(1)
Bo Feng
(3)
Bo Li
(1)
Brendan Dolan-Gavitt
(1)
Byoungyoung Lee
(2)
Changming Liu
(4)
Chengyu Song
(1)
Christopher Neasbitt
(1)
Cong Zheng
(1)
Danilo Bruschi
(1)
David R. Choffnes
(1)
Davide Balzarotti
(1)
Dongli Zhang
(1)
Dongliang Mu
(1)
Drew Davidson
(1)
Engin Kirda
(5)
Franklin George
(1)
Guofei Jiang
(2)
Hai-Xin Duan
(1)
Hao Xia
(1)
Hayawardh Vijayakumar
(2)
Hyungjoon Koo
(1)
Jun Xu
(2)
Kang Li
(1)
Kangjie Lu
(2)
Kapil Singh
(1)
Kevin W. Hamlen
(1)
Long Lu
(34)
Mansour Ahmadi
(2)
Manuel Egele
(1)
Marcus Peinado
(1)
Marius Muench
(1)
Martim Carbone
(1)
Meng Xu
(1)
Michalis Polychronakis
(1)
Min Yang
(1)
Mohammad Mannan
(1)
Nick Gregory
(1)
Peng Li
(1)
Phillip A. Porras
(1)
Qianqian Mo
(1)
Reza Mirzazade Farkhani
(2)
Roberto Perdisci
(2)
Rui Qiao
(1)
Ruimin Sun
(5)
Rundong Zhou
(1)
Ruowen Wang
(1)
Ryan Williams
(2)
Sebassujeen Reymondjohnson
(1)
Shengjian Guo
(1)
Simon P. Chung
(1)
Somesh Jha
(3)
Stefano Cristalli
(1)
Taesoo Kim
(2)
Tao Wei
(1)
Tielei Wang
(3)
Tiemoko Ballo
(1)
Tim Leek
(2)
Vasileios P. Kemerlis
(2)
Vinod Yegneswaran
(1)
Weidong Cui
(1)
Wenbo Shen
(2)
Wenke Lee
(8)
William Robertson
(1)
Xiaofeng Wang
(1)
Xiaohan Zhang
(1)
Xinming Ou
(1)
Xinyu Xing
(1)
Xuxian Jiang
(1)
Yaohui Chen
(8)
Yeongjin Jang
(1)
Yi Hui Chen
(1)
Yuan Zhang
(1)
Yueh-Hsun Lin
(1)
Yulong Zhang
(1)
Yuping Li
(1)
Zhemin Yang
(1)
Zhenyu Wu
(2)
Zhi Wang
(1)
Zhichuang Sun
(5)
Zhichun Li
(2)
Zhiyun Qian
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to