Wenke Lee

Google Scholar
129 publications in security and cryptology related venues
Year
Venue
Title
2025
conf/uss
Hybrid Language Processor Fuzzing via LLM-Based Constraint Solving.
2024
conf/uss
Towards Generic Database Management System Fuzzing.
2024
conf/uss
WEBRR: A Forensic System for Replaying and Investigating Web-Based Attacks in The Modern Web.
2023
conf/uss
µFUZZ: Redesign of Parallel Fuzzing using Microservice Architecture.
2023
conf/uss
VulChecker: Graph-based Vulnerability Localization in Source Code.
2023
conf/uss
TRIDENT: Towards Detecting and Mitigating Web-based Social Engineering Attacks.
2023
conf/uss
PUMM: Preventing Use-After-Free Using Execution Unit Partitioning.
2021
conf/uss
ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems.
2021
conf/uss
DeepReflect: Discovering Malicious Functionality through Binary Reconstruction.
2021
conf/uss
Abusing Hidden Properties to Attack the Node.js Ecosystem.
2021
conf/uss
Fuzzy Labeled Private Set Intersection with Applications to Private Real-Time Biometric Search.
2021
conf/ndss
Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages.
2019
conf/uss
RAZOR: A Framework for Post-deployment Software Debloating.
2019
conf/ndss
Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries.
2018
conf/uss
Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.
2018
conf/uss
Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking.
2018
conf/ndss
Broken Fingers: On the Usage of the Fingerprint API in Android.
2018
conf/ndss
rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System.
2017
conf/uss
Efficient Protection of Path-Sensitive Control Security.
2017
conf/ndss
Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying.
2016
conf/ndss
Enforcing Kernel Security Invariants with Data Flow Integrity.
2016
conf/ndss
The Price of Free: Privacy Leakage in Personalized Mobile In-Apps Ads.
2016
conf/ndss
How to Make ASLR Win the Clone Wars: Runtime Re-Randomization.
2015
conf/uss
Type Casting Verification: Stopping an Emerging Attack Vector.
2015
conf/ndss
Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting.
2015
conf/ndss
Exploiting and Protecting Dynamic Code Generation.
2015
conf/ndss
Preventing Use-after-free with Dangling Pointers Nullification.
2014
conf/uss
On the Feasibility of Large-Scale Infections of iOS Devices.
2014
conf/uss
Mimesis Aegis: A Mimicry Privacy Shield-A System's Approach to Data Privacy on Public Cloud.
2014
conf/ndss
Gyrus: A Framework for User-Intent Monitoring of Text-based Networked Applications.
2013
conf/uss
Jekyll on iOS: When Benign Apps Become Evil.
2013
conf/uss
Take This Personally: Pollution Attacks on Personalized Services.
2013
conf/ndss
The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers.
2013
conf/ndss
Intention and Origination: An Inside Look at Large-Scale Bot Queries.
2012
conf/uss
From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware.
2012
conf/uss
Impeding Automated Malware Analysis with Environment-sensitive Malware.
2011
conf/uss
Detecting Malware Domains at the Upper DNS Hierarchy.
2011
conf/ndss
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.
2010
conf/uss
Building a Dynamic Reputation System for DNS.
2009
conf/uss
xBook: Redesigning Privacy Control in Social Networking Platforms.
2009
conf/ndss
K-Tracer: A System for Extracting Kernel Malware Behavior.
2009
conf/ndss
Recursive DNS Architectures and Vulnerability Implications.
2008
conf/uss
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection.
2008
conf/ndss
Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority.
2008
conf/ndss
Impeding Malware Analysis Using Conditional Code Obfuscation.
2008
conf/ndss
BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic.
2007
conf/uss
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation.
2006
conf/uss
Polymorphic Blending Attacks.
2006
conf/ndss
Modeling Botnet Propagation Using Time Zones.
1998
conf/uss
Data Mining Approaches for Intrusion Detection.

Coauthors

Abhinav Srivastava (1)
Adam Bates (1)
Alessandro Orso (2)
Alex C. Snoeren (1)
Alexander Moshchuk (1)
Alexandra Boldyreva (2)
Alvaro A. Cárdenas (1)
Ambra Demontis (1)
Andre dos Santos (1)
Andrea Lanzi (6)
Andrea Possemato (1)
Andrew Chang (1)
Anmol Sheth (1)
Antonio Bianchi (1)
Aravind Machiry (1)
Artem Dinaburg (1)
Ashish Bijlani (2)
Barton P. Miller (1)
Battista Biggio (1)
Billy Lau (2)
Boris Skoric (2)
Bradley Reaves (1)
Brendan Dolan-Gavitt (2)
Brendan Saltaformaggio (7)
Bryan D. Payne (3)
Burak Sahin (2)
Byoungyoung Lee (6)
Calton Pu (1)
Carter Yagemann (8)
ChangSeok Oh (2)
Chao Zhang (1)
Charles Lever (1)
Chengyu Song (11)
Chenxiong Qian (7)
Christopher Kruegel (2)
Christopher P. Lee (3)
Cliff Changchun Zou (1)
Cong Zheng (1)
Dan Doozan (1)
David Cash (1)
David Dagon (17)
David Melski (1)
David Pfaff (1)
David Soukal (1)
Dinghao Wu (3)
Dong Xiang (1)
Douglas M. Blough (1)
Edmond W. W. Chan (2)
Edward Omicienski (1)
Erkam Uzun (4)
Evan Downing (5)
Fang Yu (1)
Feng Xiao (4)
Gelei Deng (1)
George F. Riley (1)
George Macon (1)
Giovanni Vigna (2)
Grant Williams (1)
Guangliang Yang (3)
Guofei Gu (12)
Guofei Jiang (2)
Hangfan Zhang (2)
Haoran Wang (1)
Harrick M. Vin (1)
Harsh Grover (1)
Hassen Saïdi (1)
Helen J. Wang (1)
Henry Hanping Feng (2)
Hong Hu (7)
Hyungjoon Koo (2)
Hyungon Moon (1)
Igino Corona (1)
Insu Yun (1)
Irfan Essa (1)
J. Sukarno Mertoguno (1)
Jaidip Kotak (1)
Jean-Paul Watson (1)
Jennifer Stoll (1)
Jianwei Huang (1)
Jisheng Zhao (1)
Jizhou Chen (3)
Joey Allen (6)
Jonathon T. Giffin (5)
Josh Hodosh (1)
Junjie Zhang (8)
Kandy Phan (1)
Kangjie Lu (7)
Kapil Singh (3)
Keaton Sadoski (2)
Kennon Bittick (1)
Kevin Borgolte (1)
Kevin Day (1)
Key-whan Chung (1)
Kui W. Mok (1)
Kyuhong Park (2)
Leo Mark (1)
Ling Liu (1)
Liu Yang (1)
Long Lu (8)
Lorenzo Alvisi (1)
Manos Antonakakis (10)
Mansour Alharthi (1)
Marcus Peinado (1)
Marie-Therese Walter (1)
Martim Carbone (2)
Martin Andreoni (1)
Martin W. Fong (1)
Matthew Landen (5)
Matthew Pruett (2)
Mattia Fazzini (2)
Maura Pintor (1)
Meng Xu (2)
Michael Backes (2)
Michael D. Brown (1)
Michael Zhivich (1)
Mitch Halpin (1)
Mohammad A. Noureddine (1)
Monirul Islam Sharif (10)
Monjur Alam (1)
Moses Ike (4)
Mustaque Ahamad (1)
Nick Feamster (3)
Niels Provos (1)
Nikolaos Vasiloglou (2)
Oleg M. Kolesnikov (2)
Omar Alrawi (2)
Patrick Traynor (1)
Paul Royal (3)
Paul Vixie (1)
Peng Zhou (3)
Phillip A. Porras (4)
Prahlad Fogla (7)
Raghav Bhat (1)
Ram Shankar (1)
Ranjita Pai Kasturi (1)
Ren Ding (2)
Richard J. Lipton (2)
Robert Edmonds (1)
Roberto Perdisci (22)
Rocky K. C. Chang (3)
Romuald Valme (2)
Rui Zhong (4)
Ruian Duan (3)
Runze Zhang (1)
Ryan Elder (1)
Saeed Abu-Nimeh (1)
Sai Ragam (1)
Salvatore J. Stolfo (2)
Saman A. Zonouz (1)
Sangdon Park (1)
Sangho Lee (3)
Sanya Chaba (1)
Sarah Mackay (1)
Seulbae Kim (1)
Shabsi Walfish (1)
Shenglong Yao (1)
Shuang Hao (1)
Simon P. Chung (16)
Simon Pak Ho Chung (6)
Somesh Jha (1)
Son K. Dao (1)
Stefan Nümberger (1)
Stefan Nürnberger (1)
Steven Han (1)
Sumeer Bhola (1)
Taesoo Kim (16)
Tatuya Jinmei (1)
Tielei Wang (6)
Tim Leek (2)
Udi Weinsberg (1)
Unum Sarfraz (2)
Vasileios P. Kemerlis (1)
Vinod Yegneswaran (4)
Vladimir Kolesnikov (2)
Wajih Ul Hassan (1)
Wei Meng (4)
Weibo Gong (1)
Weidong Cui (2)
Weiren Wang (1)
Wenke Lee (129)
William Harris (2)
William R. Harris (1)
Willian T. Lunardi (1)
Xiangyu Zhang (1)
Xiapu Luo (9)
Xinyu Xing (3)
Xinzhou Qin (3)
Xuxian Jiang (1)
Yacin Nadji (4)
Yan Zong Ding (1)
Yang Ji (5)
Yanick Fratantonio (3)
Yeongjin Jang (6)
Yevgeniy Dodis (1)
Yibin Yang (1)
Yichang Xiong (1)
Yinglian Xie (1)
Yisroel Mirsky (3)
Yiyuan Xiong (1)
Yizheng Chen (2)
Yong Huang (1)
Yongguang Zhang (1)
Yongheng Chen (5)
Yunheung Paek (1)
Yupeng Yang (4)
Yuval Elovici (1)
Zheng Yang (6)
Zhenyu Wu (2)
Zhichun Li (2)
Zhiyun Qian (1)
Zhongfu Su (1)
Filters
Years:  to