Fuzzing of embedded systems: A survey J Yun, F Rustamov, J Kim, Y Shin ACM Computing Surveys 55 (7), 1-33, 2022 | 54 | 2022 |
FIRM-COV: High-coverage greybox fuzzing for IoT firmware via optimized process emulation J Kim, J Yu, H Kim, F Rustamov, J Yun IEEE Access 9, 101627-101642, 2021 | 17 | 2021 |
Exploratory review of hybrid fuzzing for automated vulnerability detection F Rustamov, J Kim, J Yu, J Yun IEEE Access 9, 131166-131190, 2021 | 7 | 2021 |
BugMiner: Mining the hard-to-reach software vulnerabilities through the target-oriented hybrid fuzzer F Rustamov, J Kim, J Yu, H Kim, J Yun Electronics 10 (1), 62, 2020 | 4 | 2020 |
DeepDiver: Diving into Abysmal Depth of the Binary for Hunting Deeply Hidden Software Vulnerabilities R Fayozbek, J K, Y JooBeom Future Internet 12 (4), 74, 2020 | 4 | 2020 |
Search-based concolic execution for SW vulnerability discovery R Fayozbek, M Choi, J Yun IEICE TRANSACTIONS on Information and Systems 101 (10), 2526-2529, 2018 | 3 | 2018 |
Adaptive Emulation Framework for Multi-Architecture IoT Firmware Testing. J Yu, J Kim, Y Lee, F Rustamov, J Yun Computers, Materials & Continua 75 (2), 2023 | 1 | 2023 |
Efficient block cipher mode for NVM J Khodjanov, A and Rustamov, F and Yun Journal of Physics: Conference Series, 2018 | 1 | 2018 |