Name
Affiliation
Papers
WENKE LEE
Georgia Institute of Technology
176
Collaborators
Citations 
PageRank 
304
9351
628.83
Referers 
Referees 
References 
14003
3166
2600
Search Limit
1001000
Title
Citations
PageRank
Year
One Engine to Fuzz ’em All: Generic Language Processor Testing with Semantic Validation20.362021
Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks10.352021
SEPAL: Towards a Large-scale Analysis of SEAndroid Policy Customization00.342021
Stopping Memory Disclosures via Diversification and Replicated Execution10.352021
DeepReflect: Discovering Malicious Functionality through Binary Reconstruction00.342021
Quickest Detection of Advanced Persistent Threats: A Semi-Markov Game Approach00.342020
Machine Learning and Security: The Good, The Bad, and The Ugly00.342020
A Game-Theoretic Approach for Dynamic Information Flow Tracking to Detect Multistage Advanced Persistent Threats00.342020
SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback70.472020
Stochastic Dynamic Information Flow Tracking Game With Reinforcement Learning00.342019
Razor: A Framework For Post-Deployment Software Debloating10.352019
Enforcing Unique Code Target Property for Control-Flow Integrity.60.412018
Efficient Protection Of Path-Sensitive Control Security50.402017
Cloaker Catcher: A Client-based Cloaking Detection System.00.342017
Identifying Open-Source License Violation and 1-day Security Risk at Large Scale.70.422017
RecProv: Towards Provenance-Aware User Space Record and Replay.30.382016
From Physical to Cyber: Escalating Protection for Personalized Auto Insurance.30.402016
Financial Lower Bounds of Online Advertising Abuse - A Four Year Case Study of the TDSS/TDL4 Botnet.10.342016
UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages.160.912016
ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks400.932015
Preventing Use-after-free with Dangling Pointers Nullification.240.812015
Exploiting and Protecting Dynamic Code Generation.180.672015
Type casting verification: stopping an emerging attack vector150.672015
Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising40.412014
Mimesis aegis: a mimicry privacy shield a system's approach to data privacy on public cloud120.662014
On the feasibility of large-scale infections of iOS devices70.822014
Diagnosis And Emergency Patch Generation For Integer Overflow Exploits20.372014
A11y Attacks: Exploiting Accessibility in Operating Systems191.112014
Beheading hydras: performing effective botnet takedowns210.862013
Jekyll on iOS: when benign apps become evil521.962013
Intention and Origination: An Inside Look at Large-Scale Bot Queries.40.522013
Connected Colors: Unveiling The Structure Of Criminal Networks110.542013
Tappan Zee (north) bridge: mining memory accesses for introspection290.992013
Take this personally: pollution attacks on personalized services70.572013
An Empirical Study of Spam and Prevention Mechanisms in Online Video Chat Services00.342012
Secure and robust monitoring of virtual machines through guest-assisted introspection280.812012
Detecting and Tracking the Rise of DGA-Based Malware.00.342012
Impeding automated malware analysis with environment-sensitive malware90.572012
Practical end-to-end web content integrity50.572012
Exposing invisible timing-based traffic watermarks with BACKLIT200.822011
Detecting stealthy P2P botnets using statistical traffic fingerprints471.682011
SURF: detecting and measuring search poisoning311.282011
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.521.872011
ARROW: GenerAting SignatuRes to Detect DRive-By DOWnloads381.472011
PEASOUP: preventing exploits against software of uncertain provenance (position paper)40.442011
A centralized monitoring infrastructure for improving DNS security191.262010
On the secrecy of spread-spectrum flow watermarks160.642010
Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009262.332009
K-Tracer: A System for Extracting Kernel Malware Behavior562.292009
Automatic Reverse Engineering of Malware Emulators872.952009
  • 1
  • 2