KextFuzz: Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting Mitigations
macOS closed-source driver fuzzing
macOS closed-source driver fuzzing
we design and implement PG-VulNet, a tool for detecting Supply Chain Vulnerabilities in IoT Devices using Pseudo-code and Graphs.
state-aware fuzzing
Smart contracts static vulnerability detection
Protect sensitive operations with hardware support.
An optimized fair-exchange protocol
deduplicate crash samples
Bypass virtual protections towards AEG.
Finding vulnerabilities in embedded systems
Manipulate heap layouts automatically.
diagnosing data race bugs
discovering inconsistencies in ARM instruction processing
This work explored the vulnerabilities of the chain-based authentication structure in the email ecosystem. We conducted a large-scale analysis of 30 popular email services and 23 email clients.
Exploit vulnerabilities in blockchains
Similarities and differences in anonymous online market between Chinese and English Speaking Communities
Mitigate port-oriented programming attacks for macOS
we design and implement ICScope, a passive vulnerability assessment system based on device search engines.
Generate adversarial Chinese texts with Glyph and Pinyin mutation.
HTTPS MITM attacks based on the shared TLS certificates as HTTPS Context Confusion Attack (SCC Attack)
Measurement of CFI solutions’ security
A cache poisoning attack targeting DNS forwarders.
Improve fuzzing efficiency with lightweight data flow analysis.
Fuzzing Android Binder services with automated interface analysis.
AI-based Side Channel and Covert Channel Detection.
Empirical Study on Vulnerability Distribution within Projects.
Amplification Attacks Based on HTTP Range Requests
Mitigating DDoS Attacks with P4
Packet Hijacking in SDN
abuse CDN for DDoS attacks
A Survey of Security Vulnerability Analysis, Discovery, Detection, and Mitigation on IoT Devices. Selected as the journal issue cover Paper.
Measurement of a darknet market - dream market.
On the origin of Zhuge’s clan by the method of historical geography
Fake account detection for WeChat
Exploring the Reliability of CT Monitors
A fuzzing mutation scheduling strategy based on PSO.
Shared channels in SDN: attacks and defenses
Generate exploits for POCs that do not crash.
Detect binary code similarity with DNN.
Improve fuzzing efficiency with high accuracy control flow information.
Detect heap overflow vulnerabilities thoroughly with symbolic execution.
protecting virtual function calls for programs with source code
a control flow integrity (CFI) solution for JIT code
protecting virtual function calls for binaries
a control flow integrity (CFI) solution for JIT code
a control flow integrity (CFI) solution for binaries
a framework to mitigate backdoor threats