Sysyphuzz: the Pressure of More Coverage
A kernel fuzzer designed to boost exploration of under-tested code regions.
A kernel fuzzer designed to boost exploration of under-tested code regions.
Leveraging fuzzing to assist LLM agents with IoT firmware vulnerability discovery.
A neural disassembler without structural constraint violations based on post-dominance relations.
An intelligent directed grey-box fuzzing solution with neural network guided input mutation.
A comprehensive benchmark for evaluating decompiler effectiveness in real-world reverse engineering scenarios.
A defense approach to enhance robustness of multi-agent systems against adversarial attacks.
A flexible framework for fine-grained, runtime-adaptive fuzzing strategy composition.
A novel framework for retrieving binary functions using natural language queries.
Enhancing JPEG compression via diffusion-based DC coefficients estimation method.
Protecting vulnerable code before deploying patches with automated security policies.
Constructing device behavior models from OS drivers to fuzz virtual devices.
Exposing hidden web interfaces in IoT devices via routing analysis and LLM context understanding.
A configurable and combinable tagged architecture for memory safety protection.
Learning transferable binary code representations with natural language supervision.
A cost-effective framework for large-scale binary code similarity detection.
Target states driven directed fuzzing.
Optimization path guided fuzzing for JavaScript JIT compilers.
A physical defense with polarizer against laser attacks on autonomous driving systems.
Response guided directed fuzzing for black-box IoT devices.
Towards large scale fuzz testing of smart contracts in Ethereum.
Efficient fuzzing via Shapley-guided byte selection.
Automated discovery of CDN forwarding request inconsistencies and DoS attacks with grammar-based fuzzing.
Finding vulnerabilities in SGX applications.
macOS closed-source driver fuzzing
heap temporal vulnerability fuzzing
we design and implement PG-VulNet, a tool for detecting Supply Chain Vulnerabilities in IoT Devices using Pseudo-code and Graphs.
state-aware fuzzing
driver fuzzing based on virtual device simulation
Smart contracts static vulnerability detection
Protect sensitive operations with hardware support.
An optimized fair-exchange protocol
deduplicate crash samples
Bypass virtual protections towards AEG.
Finding vulnerabilities in embedded systems
Manipulate heap layouts automatically.
diagnosing data race bugs
discovering inconsistencies in ARM instruction processing
This work explored the vulnerabilities of the chain-based authentication structure in the email ecosystem. We conducted a large-scale analysis of 30 popular email services and 23 email clients.
Exploit vulnerabilities in blockchains
Similarities and differences in anonymous online market between Chinese and English Speaking Communities
Mitigate port-oriented programming attacks for macOS
we design and implement ICScope, a passive vulnerability assessment system based on device search engines.
Generate adversarial Chinese texts with Glyph and Pinyin mutation.
HTTPS MITM attacks based on the shared TLS certificates as HTTPS Context Confusion Attack (SCC Attack)
Measurement of CFI solutions’ security
A cache poisoning attack targeting DNS forwarders.
Improve fuzzing efficiency with lightweight data flow analysis.
Fuzzing Android Binder services with automated interface analysis.
AI-based Side Channel and Covert Channel Detection.
Empirical Study on Vulnerability Distribution within Projects.
Amplification Attacks Based on HTTP Range Requests
Mitigating DDoS Attacks with P4
Packet Hijacking in SDN
A Survey of Security Vulnerability Analysis, Discovery, Detection, and Mitigation on IoT Devices. Selected as the journal issue cover Paper.
Measurement of a darknet market - dream market.
以历史地理学方法考证诸葛氏之起源,发表于2019年诸葛亮研究会年会
Fake account detection for WeChat
Exploring the Reliability of CT Monitors
A fuzzing mutation scheduling strategy based on PSO.
Shared channels in SDN: attacks and defense
Generate exploits for POCs that do not crash.
Detect binary code similarity with DNN.
Improve fuzzing efficiency with high accuracy control flow information.
Detect heap overflow vulnerabilities thoroughly with symbolic execution.
protecting virtual function calls for programs with source code
a control flow integrity (CFI) solution for JIT code
protecting virtual function calls for binaries
a control flow integrity (CFI) solution for JIT code
a control flow integrity (CFI) solution for binaries
a framework to mitigate backdoor threats