Hong Hu

    Calculated based on number of publications stored in Pure and citations from Scopus
    20132022

    Research activity per year

    If you made any changes in Pure these will be visible here soon.

    Fingerprint

    Dive into the research topics where Hong Hu is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
    • 1 Similar Profiles

    Network

    Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
    • Who Goes First Detecting Go Concurrency Bugs via Message Reordering

      Liu, Z., Xia, S., Liang, Y., Song, L. & Hu, H., Feb 28 2022, ASPLOS 2022 - Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems. Falsafi, B., Ferdman, M., Lu, S. & Wenisch, T. F. (eds.). Association for Computing Machinery, p. 888-902 15 p. (International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Abusing hidden properties to attack the node.js ecosystem

      Xiao, F., Huang, J., Xiong, Y., Yang, G., Hu, H., Gu, G. & Lee, W., 2021, Proceedings of the 30th USENIX Security Symposium. USENIX Association, p. 2951-2968 18 p. (Proceedings of the 30th USENIX Security Symposium).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      2 Scopus citations
    • Identifying Behavior Dispatchers for Malware Analysis

      Park, K., Sahin, B., Chen, Y., Zhao, J., Downing, E., Hu, H. & Lee, W., May 24 2021, ASIA CCS 2021 - Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 759-773 15 p. (ASIA CCS 2021 - Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • One engine to fuzz 'em All: Generic language processor testing with semantic validation

      Chen, Y., Zhong, R., Hu, H., Zhang, H., Yang, Y., Wu, D. & Lee, W., May 2021, Proceedings - 2021 IEEE Symposium on Security and Privacy, SP 2021. Institute of Electrical and Electronics Engineers Inc., p. 642-658 17 p. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2021-May).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      7 Scopus citations
    • Preventing use-after-free attacks with fast forward allocation

      Wickman, B., Hu, H., Yun, I., Jang, D., Lim, J. W., Kashyap, S. & Kim, T., 2021, Proceedings of the 30th USENIX Security Symposium. USENIX Association, p. 2453-2470 18 p. (Proceedings of the 30th USENIX Security Symposium).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      6 Scopus citations