Hong Hu

Postdoctoral Fellow
School of Computer Science
College of Computing
Georgia Institute of Technology

Office:
Room 3228, Klaus Advanced Computing Building
266 Ferst Dr NW, Atlanta, GA 30332-0765

Gmail: huhong789

CV

Biography

I am a postdoctoral fellow at Georgia Tech, working with Prof. Wenke Lee. I am a member of the Institute of Information Security and Privacy (IISP). I obtained my PhD degree at the School of Computing, National University of Singapore in 2016, supervised by Prof. LIANG Zhenkai. I recieved my B.E. degree in Information Security from Huazhong University of Science and Technology in 2011.

My research interests include system security, binary analysis and trusted computing. I like to work on vulnerability detection, exploitation and defense.

Publications

  1. The "Web/Local" Boundary Is Fuzzy – A Security Study of Chrome's Process-based Sandboxing.
    Yaoqi Jia, Zheng Leong Chua, Hong Hu, Shuo Chen, Prateek Saxena and Zhenkai Liang.
    In the Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS 2016).
    [Acc Rate: 16.5%] [PDF] [PPT Slides] [Webpage] [Demos] [Talk]
  2. Data-Oriented Programming: On the Expressiveness of Non-Control Data Attacks.
    Hong Hu, Shweta Shinde, Sendroiu Adrian, Zheng Leong Chua, Prateek Saxena and Zhenkai Liang.
    In the Proceedings of the 37th IEEE Symposium on Security and Privacy (Oakland 2016).
    [Acc Rate: 13.8%] [PDF] [PPT Slides, PDF Slides] [Webpage] [Demos] [Talk]
  3. Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software.
    Hong Hu, Zheng Leong Chua, Zhenkai Liang and Prateek Saxena.
    In the Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS 2015).
    [Acc Rate: 20%] [PDF] [Slides]
  4. Automatic Generation of Data-Oriented Exploits.
    Hong Hu, Zheng Leong Chua, Sendroiu Adrian, Prateek Saxena and Zhenkai Liang.
    In the Proceedings of the 24th USENIX Security Symposium (USENIX 2015).
    [Acc Rate: 16%] [PDF] [PPT Slides, PDF Slides] [Attack Benchmarks] [Talk]
  5. DroidVault: A Trusted Data Vault for Android Devices.
    Xiaolei Li, Hong Hu, Guangdong Bai, Yaoqi Jia, Zhenkai Liang and Prateek Saxena.
    In the Proceedings of the 19th International Conference on Engineering of Complex Computer Systems (ICECCS 2014).
    [Acc Rate: 27.4%] [PDF] * Awarded Best Paper.
  6. Practical Analysis Framework for Software-based Attestation Scheme.
    Li Li, Hong Hu, Jun Sun, Yang Liu and Jin Song Dong.
    In the Proceedings of the 16th International Conference on Formal Engineering Methods (ICFEM 2014).
    [Acc Rate: 30%] [PDF]
  7. A Quantitative Evaluation of Privilege Separation in Web Browser Designs.
    Xinshu Dong, Hong Hu, Zhenkai Liang and Prateek Saxena.
    In the Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS 2013),
    [Acc Rate: 17.8] [PDF]

Professional Experience