Follow
Long Lu
Long Lu
Associate Professor of Computer Science, Northeastern University
Verified email at northeastern.edu - Homepage
Title
Cited by
Cited by
Year
Chex: statically vetting android apps for component hijacking vulnerabilities
L Lu, Z Li, Z Wu, W Lee, G Jiang
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
8102012
Blade: an attack-agnostic approach for preventing drive-by malware infections
L Lu, V Yegneswaran, P Porras, W Lee
Proceedings of the 17th ACM conference on Computer and communications …, 2010
2252010
Mapping kernel objects to enable systematic integrity checking
M Carbone, W Cui, L Lu, W Lee, M Peinado, X Jiang
Proceedings of the 16th ACM conference on Computer and communications …, 2009
2192009
Jekyll on {iOS}: When Benign Apps Become Evil
T Wang, K Lu, L Lu, S Chung, W Lee
22nd USENIX Security Symposium (USENIX Security 13), 559-572, 2013
1702013
Preventing use-after-free with dangling pointers nullification.
B Lee, C Song, Y Jang, T Wang, T Kim, L Lu, W Lee
NDSS, 2015
1622015
SURF: detecting and measuring search poisoning
L Lu, R Perdisci, W Lee
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1302011
Remix: On-demand live randomization
Y Chen, Z Wang, D Whalley, L Lu
Proceedings of the sixth ACM conference on data and application security and …, 2016
1082016
Checking more and alerting less: detecting privacy leakages via enhanced data-flow analysis and peer voting.
K Lu, Z Li, VP Kemerlis, Z Wu, L Lu, C Zheng, Z Qian, W Lee, G Jiang
NDSS, 2015
942015
Savior: Towards bug-driven hybrid testing
Y Chen, P Li, J Xu, S Guo, R Zhou, Y Zhang, T Wei, L Lu
2020 IEEE Symposium on Security and Privacy (SP), 1580-1596, 2020
872020
Shreds: Fine-grained execution units with private memory
Y Chen, S Reymondjohnson, Z Sun, L Lu
2016 IEEE Symposium on Security and Privacy (SP), 56-71, 2016
862016
{P2IM}: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling
B Feng, A Mera, L Lu
29th USENIX Security Symposium (USENIX Security 20), 1237-1254, 2020
772020
Scareware detection
C Seifert, J Stokes, L Lu, D Heckerman, C Colcernian, S Parthasarathy, ...
US Patent 9,130,988, 2015
772015
From zygote to morula: Fortifying weakened aslr on android
B Lee, L Lu, T Wang, T Kim, W Lee
2014 IEEE Symposium on Security and Privacy, 424-439, 2014
732014
Compiler-assisted code randomization
H Koo, Y Chen, L Lu, VP Kemerlis, M Polychronakis
2018 IEEE Symposium on Security and Privacy (SP), 461-477, 2018
622018
NORAX: Enabling execute-only memory for COTS binaries on AArch64
Y Chen, D Zhang, R Wang, R Qiao, AM Azab, L Lu, H Vijayakumar, ...
2017 IEEE Symposium on Security and Privacy (SP), 304-319, 2017
462017
OAT: Attesting operation integrity of embedded devices
Z Sun, B Feng, L Lu, S Jha
2020 IEEE Symposium on Security and Privacy (SP), 1433-1449, 2020
422020
{StreamBox-TZ}: Secure Stream Analytics at the Edge with {TrustZone}
H Park, S Zhai, L Lu, FX Lin
2019 USENIX Annual Technical Conference (USENIX ATC 19), 537-554, 2019
382019
Vbutton: Practical attestation of user-driven operations in mobile apps
W Li, S Luo, Z Sun, Y Xia, L Lu, H Chen, B Zang, H Guan
Proceedings of the 16th annual international conference on mobile systems …, 2018
362018
TEEv: Virtualizing trusted execution environments on mobile platforms
W Li, Y Xia, L Lu, H Chen, B Zang
Proceedings of the 15th ACM SIGPLAN/SIGOPS International Conference on …, 2019
332019
Ptrix: Efficient hardware-assisted fuzzing for cots binary
Y Chen, D Mu, J Xu, Z Sun, W Shen, X Xing, L Lu, B Mao
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
312019
The system can't perform the operation now. Try again later.
Articles 1–20