Abstract:Select the most complementary base fuzzers for EnFuzz through a simple probabilistic model
Abstract:Text embedding from the General Purpose Language Model captures a lot of sensitive information from plain text, which can be reverse-engineered to disclose sensitive information about the victim for further harassment.
Abstract:Some small tips on writing a technical paper
Abstract:To analyze 15 binary code similarity approaches based on CFG.
Abstract:To simply share an overview of model learning on protocol state fuzzing
Abstract:A security analysis of popular TrustZone-assisted TEE systems
Abstract:To share an overview of ethical issues in current cybersecurity research
Abstract:A new metrics-driven platform for evaluating fuzzers
Abstract:In the current email ecosystem, how to bypass existing defense measures to conduct email spoofing attacks
Abstract:Isolates and identifies detection gaps by measuring the end-to-end life cycle of large-scale phishing attacks.
Abstract:Introduction to Rust programming language
Abstract:Use the context-sensitive software fault injection (SFI) method to Fuzz the error handling functions in the tested program
Abstract:A novel IMP4GT attack that completely breaks the mutual authentication of LTE network aim on the user plane.
Abstract:SISA training, a framework designed to achieve the largest improvements for stateful algorithms like stochastic gradient descent for deep neural networks, reduces the computational overhead associated with unlearning.
Abstract:We present a novel mobile/IoT device identification and abnormal device detection mechanism named OWL. OWL extracts features from structural and textual information embedded in the BC/MC packets.
Abstract:This paper proposed a deep-learning-based approach to predict the reachability of inputs before executing the target program, helping DGF filtering out the unreachable ones to boost the performance of fuzzing.
Abstract:A large-scale automated measurement of the WCD attack proposed in 2017.
Abstract:The paper presented USBFuzz, a portable, flexible, and modular framework for fuzz testing USB drivers.
Abstract:The paper presented a novel class of HTTP amplification attack, Range-based Amplification (RangeAmp) Attack.
Abstract:The paper proposed Sqirrel, a novel fuzzing framework that considers both language validity and coverage feedback to test DBMSs.
Abstract:The paper conducted a large-scale privacy analysis across multiple apps and app versions.
Abstract:Introduction to TLS Certificate Measurement.
Abstract:Fuzzing Android Native System Services via Automated Interface Analysis.
Abstract:Introduction to some uncommon types of atomic bugs in kernel.
Abstract:Introduction to DDoS Attacks.
Abstract:Introduction to the research about deep learning-based traffic detection.
Abstract:Introduction to Network Reconnaissance in IPv6 Networks.
Abstract:This paper proposes a tool for automatically synthesising fuzzers for complex libraries in a given environment.
Abstract:This paper proposed an energy-saving graybox fuzzing method using VAMAB Model.
Abstract:Brief introduction to differential privacy and related research.
Abstract:Android native process can exhaustively monopolize the system resources or the device computing resources in an unconfined manner.
Abstract:Researches on vulnerability assessment via device search engines.
Abstract:The paper presented ParmeSan, a sanitizer-guided greybox fuzzing pipeline.
Abstract:Security of MQTT protocol in IoT cloud.
Abstract:The paper proposes an alternative process for PoW-based block discovery that results in an inter-block time with lower variance.
Abstract:Security research on MQTT.
Abstract:The paper presents the first chatbot, called Aubrey, to actively collect intelligence through autonomous chats with real-world e-commerce miscreants.
Abstract:The paper proposes a cost-effective (no real car needed) and automatic (no human intervention required) solution CANHUNTER to reverse engineer CAN bus commands via analyzing mobile apps associated with cars.
Abstract:A novel fuzzer that aims at testing hypervisors in an efficient, effective, and precise way.
Abstract:The paper analyzes LTE layer-two security and presents three attacks.
Abstract:A survey on Spectre attack variants and defense solutions.
Abstract:A survey on existing adversarial text generation solutions and defense solutions.
Abstract:A Breif Talk on Represent Learning.
Abstract:The paper presents a novel attack for detecting the presence of an active TCP connection between a remote Linux server and an arbitrary client machine.