Browsing by Author Lee, Wenke

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 6 of 6
TitleAuthor(s)Issue DateViews
Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop
Proceeding/Conference:Proceedings - IEEE Symposium on Security and Privacy
2017
7
Efficient protection of path-sensitive control security
Proceeding/Conference:Proceedings of the 26th USENIX Security Symposium
2017
9
Enforcing unique code target property for control-flow integrity
Proceeding/Conference:Proceedings of the ACM Conference on Computer and Communications Security
2018
10
Rampart: Protecting web applications from CPU-exhaustion denial-of-service attacks
Proceeding/Conference:Proceedings of the 27th USENIX Security Symposium
2018
12
Razor: A framework for post-deployment software debloating
Proceeding/Conference:Proceedings of the 28th USENIX Security Symposium
2019
11
Slimium: Debloating the Chromium Browser with Feature Subsetting
Proceeding/Conference:Proceedings of the ACM Conference on Computer and Communications Security
2020
18