Sysyphuzz: the Pressure of More Coverage
A kernel fuzzer designed to boost exploration of under-tested code regions.
A kernel fuzzer designed to boost exploration of under-tested code regions.
Leveraging fuzzing to assist LLM agents with IoT firmware vulnerability discovery.
Improving LLM-based log parsing by learning from errors in reasoning traces.
A neural disassembler without structural constraint violations based on post-dominance relations.
An intelligent directed grey-box fuzzing solution with neural network guided input mutation.
A comprehensive benchmark for evaluating decompiler effectiveness in real-world reverse engineering scenarios.
A defense approach to enhance robustness of multi-agent systems against adversarial attacks.
A flexible framework for fine-grained, runtime-adaptive fuzzing strategy composition.
Clue framework achieves superior smart contract security analysis with high true positive rates and low false positive rates using Execution Property Graphs.
A novel framework for retrieving binary functions using natural language queries.
Enhancing JPEG compression via diffusion-based DC coefficients estimation method.
Targeted bit-flip attacks on vision transformers via scale factor manipulation.
A benchmark for semantic sensitive information in LLM’s outputs.
An engorgio prompt makes large language model babble on.
Protecting vulnerable code before deploying patches with automated security policies.
Constructing device behavior models from OS drivers to fuzz virtual devices.
Exposing hidden web interfaces in IoT devices via routing analysis and LLM context understanding.
A configurable and combinable tagged architecture for memory safety protection.
Sublinear distributed product checks on replicated secret-shared data over Z2𝑘 without ring extensions.
Test suites guided vulnerability validation for Node.js applications.
Learning transferable binary code representations with natural language supervision.
A cost-effective framework for large-scale binary code similarity detection.
Virtual compiler is all you need for assembly code search.
Target states driven directed fuzzing.
Optimization path guided fuzzing for JavaScript JIT compilers.
Improving ml-based binary function similarity detection by assessing and deprioritizing control flow graph features.
A physical defense with polarizer against laser attacks on autonomous driving systems.
Automated discovery of protocol-level evasion vulnerabilities in web application firewalls.
Response guided directed fuzzing for black-box IoT devices.
Towards large scale fuzz testing of smart contracts in Ethereum.
On the effectiveness of function-level vulnerability detectors for inter-procedural vulnerabilities.
Efficient fuzzing via Shapley-guided byte selection.
Automated discovery of CDN forwarding request inconsistencies and DoS attacks with grammar-based fuzzing.
Uncovering the unprotected components of android against overlay attack.
Detecting vulnerabilities in linux-based iot firmware with optimized reaching definition analysis.
Finding vulnerabilities in SGX applications.
Unmasking role-play attack strategies in exploiting decentralized finance systems.
A systematic study of stealthy mining pools abuse in the wild.
An analysis of refcounting bugs in all modern Linux kernels.
Exploring bit-flip attacks in the context of model training.
Profiling and improving the performance of syzkaller.
A feasible and practical memory sanitizer for fuzzing COTS binaries.
Finding concurrency UAF vulnerabilities in Linux drivers with directed fuzzing.
A CDN-assisted practical pulsing DDoS attack.
An expert system for identifying security-sensitive kernel objects.
Smart fuzzing based on automatic input format reverse engineering.
Mitigating targeted bit-flip attacks against deep neural networks.
Efficient 3PC for binary circuits with application to maliciously-secure DNN inference.
macOS closed-source driver fuzzing
Reproduce 1-day vulnerabilities with directed differential fuzzing.
A triggerable and observable concurrency bug benchmark.
Lightweight architectural support for page table isolation.
Bypassing learning-based static malware detectors.
Discovering Java deserialization vulnerabilities via structure-aware directed greybox fuzzing.
Recovering call graphs for binaries with transfer and contrastive learning.
Towards robust bert fine-tuning for chinese.
Enforcing spatial and temporal memory safety via ARM pointer authentication.
Conjuring bug capabilities from a single poc.
heap temporal vulnerability fuzzing
we design and implement PG-VulNet, a tool for detecting Supply Chain Vulnerabilities in IoT Devices using Pseudo-code and Graphs.
Automated decision-based iterative adversarial attacks.
state-aware fuzzing
driver fuzzing based on virtual device simulation
Hardware-assisted analyzer for native code in android apps.
Jump-aware transformer for binary code similarity detection.
Black-box efficient testing for convolutional neural networks.
Detecting and characterizing scam tokens on uniswap decentralized exchange.
Smart contracts static vulnerability detection
面向缓解机制评估的自动化信息泄露方法
Protect sensitive operations with hardware support.
An optimized fair-exchange protocol
deduplicate crash samples
Bypass virtual protections towards AEG.
Finding vulnerabilities in embedded systems
Manipulate heap layouts automatically.
diagnosing data race bugs
discovering inconsistencies in ARM instruction processing
Assessing unpatched vulnerable devices on the internet via efficient firmware recognition.
This work explored the vulnerabilities of the chain-based authentication structure in the email ecosystem. We conducted a large-scale analysis of 30 popular email services and 23 email clients.
Exploit vulnerabilities in blockchains
Similarities and differences in anonymous online market between Chinese and English Speaking Communities
Deceiving two ECUs with one frame.
Mitigate port-oriented programming attacks for macOS
we design and implement ICScope, a passive vulnerability assessment system based on device search engines.
Generate adversarial Chinese texts with Glyph and Pinyin mutation.
HTTPS MITM attacks based on the shared TLS certificates as HTTPS Context Confusion Attack (SCC Attack)
Measurement of CFI solutions’ security
A cache poisoning attack targeting DNS forwarders.
Improve fuzzing efficiency with lightweight data flow analysis.
Fuzzing Android Binder services with automated interface analysis.
AI-based Side Channel and Covert Channel Detection.
Empirical Study on Vulnerability Distribution within Projects.
Amplification Attacks Based on HTTP Range Requests
Mitigating DDoS Attacks with P4
Packet Hijacking in SDN
A Survey of Security Vulnerability Analysis, Discovery, Detection, and Mitigation on IoT Devices. Selected as the journal issue cover Paper.
Measurement of a darknet market - dream market.
An automatic fuzzing framework for physical SOHO router devices to discover multi-type vulnerabilities.
以历史地理学方法考证诸葛氏之起源,发表于2019年诸葛亮研究会年会
Fake account detection for WeChat
Exploring the Reliability of CT Monitors
Fuzzing IPC with knowledge inference.
A fuzzing mutation scheduling strategy based on PSO.
Shared channels in SDN: attacks and defense
Generate exploits for POCs that do not crash.
Security issues in CDNs origin validation.
Fuzzing ICU library for exploitable bugs in multiple software.
Detect binary code similarity with DNN.
Improve fuzzing efficiency with high accuracy control flow information.
Detect heap overflow vulnerabilities thoroughly with symbolic execution.
protecting virtual function calls for programs with source code
a control flow integrity (CFI) solution for JIT code
protecting virtual function calls for binaries
a control flow integrity (CFI) solution for JIT code
The store-and-flood distributed reflective denial of service attack.
Demystifying low entropy issues in Android systems.
A split-based crawler of the BT-DHT network and its applications.
a control flow integrity (CFI) solution for binaries
Protecting function pointers in binary.
a framework to mitigate backdoor threats
Automatically fix integer-overflow-to-buffer-overflow vulnerability at compile-time.