Empirical Study on Vulnerability Distribution within Projects.
Improve fuzzing efficiency with lightweight data flow analysis.
Fuzzing Android Binder services with automated interface analysis.
AI-based Side Channel and Covert Channel Detection.
Generate adversarial Chinese texts with Glyph and Pinyin mutation.
abuse CDN for DDoS attacks
A Survey of Security Vulnerability Analysis, Discovery, Detection, and Mitigation on IoT Devices. Selected as the journal issue cover Paper.
Measurement of a darknet market - dream market.
A fuzzing mutation scheduling strategy based on PSO.
Generate exploits for POCs that do not crash.
Detect binary code similarity with DNN.
Improve fuzzing efficiency with high accuracy control flow information.
Detect heap overflow vulnerabilities thoroughly with symbolic execution.