[1] Z. Hu, S. Lee, and M. Peinado, “Hacksaw: Hardware-centric kernel debloating via device inventory and dependency analysis,” in Proceedings of the 2023 acm sigsac conference on computer and communications security (ccs) (to appear) , 2023.
[2] Z. Hu and B. Dolan-Gavitt, “IRQDebloat: Reducing driver attack surface in embedded devices,” in 2022 ieee symposium on security and privacy (sp) , 2022, pp. 1608–1622. Available: [ github ] [ pdf ]
[3] Z. Hu, Y. Hu, and B. Dolan-Gavitt, “Towards deceptive defense in software security with chaff bugs,” in Proceedings of the 25th international symposium on research in attacks, intrusions and defenses , 2022, pp. 43–55.
[4] Z. Hu, Y. Hu, and B. Dolan-Gavitt, “Chaff bugs: Deterring attackers by making software buggier,” arXiv preprint arXiv:1808.00659 , 2018. Available: [ ctf ] [ github ] [ arXiv ]
[5] Z. Hu, “MIRAGE: Randomizing large chunk allocation via dynamic binary instrumentation,” in 2017 ieee conference on dependable and secure computing , 2017, pp. 98–106, doi: 10.1109/DESEC.2017.8073800 . Available: [ github ]