Hong Hu

Research Scientist
School of Computer Science
College of Computing
Georgia Institute of Technology

Office: E0970A, Coda
756 W Peachtree St NW
Atlanta, GA 30308

Gmail: huhong789

Google Scholar

Biography

I am a research scientist at Georgia Tech, working with Prof. Wenke Lee and Prof. Taesoo Kim. I am a member of the Institute of Information Security and Privacy (IISP). I obtained my PhD degree at the School of Computing, National University of Singapore in 2016, supervised by Prof. LIANG Zhenkai. I recieved my B.E. degree in Information Security from Huazhong University of Science and Technology in 2011.

My research interests include system security and binary analysis. I like to work on vulnerability detection, exploitation and defense.

I am on the academic job market this year. Application Documents: CV - Research Statement - Teaching Statement - Diversity Statement

Publications

  1. Desensitization: Privacy-Aware and Attack-Preserving Crash Report. (to appear)
    Ren Ding*, Hong Hu*, Wen Xu, and Taesoo Kim.
    In Proceedings of the 27th Network and Distributed System Security Symposium (NDSS 2020).
    [Acc Rate: ??%] [Paper] [Source Code] * Co-first Author
  2. APOLLO: Automatic Detection and Diagnosis of Performance Regressions in Database Systems. (to appear)
    Jinho Jung, Hong Hu, Joy Arulraj, Taesoo Kim, and Woonhak Kang.
    In Proceedings of the 46th International Conference on Very Large Data Bases (VLDB 2020).
    [Acc Rate: ??%] [Paper] [Source Code]
  3. Where Does It Go? Refining Indirect-Call Targets with Multi-Layer Type Analysis.
    Kangjie Lu, and Hong Hu.
    In Proceedings of the 26th ACM Conference on Computer and Communications Security (CCS 2019).
    [Acc Rate: 16.0%] [Paper] [Slides] * Awarded Best Paper.
  4. RAZOR: A Framework for Post-deployment Software Debloating.
    Chenxiong Qian*, Hong Hu*, Mansour A Alharthi, Pak Ho Chung, Taesoo Kim, and Wenke Lee.
    In Proceedings of the 28th USENIX Security Symposium (USENIX 2019).
    [Acc Rate: 16%] [Paper] [Slides] [Source code] * Co-first Author
  5. Fuzzification: Anti-Fuzzing Techniques.
    Jinho Jung, Hong Hu, David Solodukhin, Daniel Pagan, Kyu Hyung Lee, and Taesoo Kim.
    In Proceedings of the 28th USENIX Security Symposium (USENIX 2019).
    [Acc Rate: 16%] [Paper] [Slides] [Source code]
  6. Enforcing Unique Code Target Property for Control-Flow Integrity.
    Hong Hu, Chenxiong Qian, Carter Yagemann, Simon Pak Ho Chung, William R. Harris, Taesoo Kim, and Wenke Lee.
    In Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS 2018).
    [Acc Rate: 16.6%] [Paper] [Slides] [Source Code]
  7. The "Web/Local" Boundary Is Fuzzy – A Security Study of Chrome's Process-based Sandboxing.
    Yaoqi Jia, Zheng Leong Chua, Hong Hu, Shuo Chen, Prateek Saxena and Zhenkai Liang.
    In Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS 2016).
    [Acc Rate: 16.5%] [Paper] [Slides] [Webpage] [Demos] [Talk]
  8. Data-Oriented Programming: On the Expressiveness of Non-Control Data Attacks.
    Hong Hu, Shweta Shinde, Sendroiu Adrian, Zheng Leong Chua, Prateek Saxena and Zhenkai Liang.
    In Proceedings of the 37th IEEE Symposium on Security and Privacy (Oakland 2016).
    [Acc Rate: 13.8%] [Paper] [Slides] [Webpage] [Demos] [Talk]
  9. Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software.
    Hong Hu, Zheng Leong Chua, Zhenkai Liang and Prateek Saxena.
    In Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS 2015).
    [Acc Rate: 20%] [Paper] [Slides]
  10. Automatic Generation of Data-Oriented Exploits.
    Hong Hu, Zheng Leong Chua, Sendroiu Adrian, Prateek Saxena and Zhenkai Liang.
    In Proceedings of the 24th USENIX Security Symposium (USENIX 2015).
    [Acc Rate: 16%] [Paper] [Slides] [Attack Benchmarks] [Talk]
  11. DroidVault: A Trusted Data Vault for Android Devices.
    Xiaolei Li, Hong Hu, Guangdong Bai, Yaoqi Jia, Zhenkai Liang and Prateek Saxena.
    In Proceedings of the 19th International Conference on Engineering of Complex Computer Systems (ICECCS 2014).
    [Acc Rate: 27.4%] [Paper] * Awarded Best Paper.
  12. Practical Analysis Framework for Software-based Attestation Scheme.
    Li Li, Hong Hu, Jun Sun, Yang Liu and Jin Song Dong.
    In Proceedings of the 16th International Conference on Formal Engineering Methods (ICFEM 2014).
    [Acc Rate: 30%] [Paper]
  13. A Quantitative Evaluation of Privilege Separation in Web Browser Designs.
    Xinshu Dong, Hong Hu, Zhenkai Liang and Prateek Saxena.
    In Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS 2013),
    [Acc Rate: 17.8%] [Paper]

Work Experience


Professional Experience