Abstract:This paper proposed a deep-learning-based approach to predict the reachability of inputs before executing the target program, helping DGF filtering out the unreachable ones to boost the performance of fuzzing.
Abstract:A large-scale automated measurement of the WCD attack proposed in 2017.
Abstract:The paper presented USBFuzz, a portable, flexible, and modular framework for fuzz testing USB drivers.
Abstract:The paper presented a novel class of HTTP amplification attack, Range-based Amplification (RangeAmp) Attack.
Abstract:The paper proposed Sqirrel, a novel fuzzing framework that considers both language validity and coverage feedback to test DBMSs.
Abstract:The paper conducted a large-scale privacy analysis across multiple apps and app versions.
Abstract:Introduction to TLS Certificate Measurement.
Abstract:Fuzzing Android Native System Services via Automated Interface Analysis.
Abstract:Introduction to some uncommon types of atomic bugs in kernel.
Abstract:Introduction to DDoS Attacks.
Abstract:Introduction to the research about deep learning-based traffic detection.
Abstract:Introduction to Network Reconnaissance in IPv6 Networks.
Abstract:This paper proposes a tool for automatically synthesising fuzzers for complex libraries in a given environment.
Abstract:This paper proposed an energy-saving graybox fuzzing method using VAMAB Model.
Abstract:Brief introduction to differential privacy and related research.
Abstract:Android native process can exhaustively monopolize the system resources or the device computing resources in an unconfined manner.
Abstract:Researches on vulnerability assessment via device search engines.
Abstract:The paper presented ParmeSan, a sanitizer-guided greybox fuzzing pipeline.
Abstract:Security of MQTT protocol in IoT cloud.
Abstract:The paper proposes an alternative process for PoW-based block discovery that results in an inter-block time with lower variance.
Abstract:Security research on MQTT.
Abstract:The paper presents the first chatbot, called Aubrey, to actively collect intelligence through autonomous chats with real-world e-commerce miscreants.
Abstract:The paper proposes a cost-effective (no real car needed) and automatic (no human intervention required) solution CANHUNTER to reverse engineer CAN bus commands via analyzing mobile apps associated with cars.
Abstract:A novel fuzzer that aims at testing hypervisors in an efficient, effective, and precise way.
Abstract:The paper analyzes LTE layer-two security and presents three attacks.
Abstract:A survey on Spectre attack variants and defense solutions.
Abstract:A survey on existing adversarial text generation solutions and defense solutions.
Abstract:A Breif Talk on Represent Learning.
Abstract:The paper presents a novel attack for detecting the presence of an active TCP connection between a remote Linux server and an arbitrary client machine.