EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit T Yue, P Wang, Y Tang, E Wang, B Yu, K Lu, X Zhou USENIX Security 2020, 2020 | 177 | 2020 |
How double-fetch situations turn into double-fetch vulnerabilities: A study of double fetches in the Linux kernel P Wang, J Krinke, K Lu, G Li, S Dodier-Lazaro 26th {USENIX} Security Symposium ({USENIX} Security 17), 1-16, 2017 | 84 | 2017 |
Poster: Fuzzing iot firmware via multi-stage message generation B Yu, P Wang, T Yue, Y Tang Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 53 | 2019 |
VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search. Z Luo, P Wang, B Wang, Y Tang, W Xie, X Zhou, D Liu, K Lu NDSS, 2023 | 50 | 2023 |
The progress, challenges, and perspectives of directed greybox fuzzing P Wang, X Zhou, P Lin, T Yue, Y Liu, K Lu Software Testing, Verification and Reliability, 2023 | 39* | 2023 |
Learnafl: Greybox fuzzing with knowledge enhancement T Yue, Y Tang, B Yu, P Wang, E Wang IEEE Access 7, 117029-117043, 2019 | 39 | 2019 |
Mobfuzz: Adaptive multi-objective optimization in gray-box fuzzing G Zhang, P Wang, T Yue, X Kong, S Huang, X Zhou, K Lu arXiv preprint arXiv:2401.15956, 2024 | 30 | 2024 |
SIoTFuzzer: fuzzing web interface in IoT firmware via stateful message generation H Zhang, K Lu, X Zhou, Q Yin, P Wang, T Yue Applied Sciences 11 (7), 3120, 2021 | 20 | 2021 |
Unifuzz: Optimizing distributed fuzzing via dynamic centralized task scheduling X Zhou, P Wang, C Liu, T Yue, Y Liu, C Song, K Lu, Q Yin arXiv preprint arXiv:2009.06124, 2020 | 19* | 2020 |
A survey of the double‐fetch vulnerabilities P Wang, K Lu, G Li, X Zhou Concurrency and Computation: Practice and Experience, 2017 | 14 | 2017 |
DFTracker: detecting double-fetch bugs by multi-taint parallel tracking P Wang, K Lu, G Li, X Zhou Frontiers of Computer Science, 1-17, 2016 | 14 | 2016 |
Untrusted hardware causes double-fetch problems in the I/O memory K Lu, PF Wang, G Li, X Zhou Journal of Computer Science and Technology 33, 587-602, 2018 | 9 | 2018 |
From release to rebirth: Exploiting thanos objects in Linux kernel D Liu, P Wang, X Zhou, W Xie, G Zhang, Z Luo, T Yue, B Wang IEEE Transactions on Information Forensics and Security 18, 533-548, 2022 | 8 | 2022 |
ovAFLow: detecting memory corruption bugs with fuzzing-based taint inference G Zhang, PF Wang, T Yue, XD Kong, X Zhou, K Lu Journal of Computer Science and Technology 37 (2), 405-422, 2022 | 8 | 2022 |
SHFuzz: Selective hybrid fuzzing with branch scheduling based on binary instrumentation X Mi, B Wang, Y Tang, P Wang, B Yu Applied Sciences 10 (16), 5449, 2020 | 8 | 2020 |
Dftinker: Detecting and fixing double-fetch bugs in an automated way Y Luo, P Wang, X Zhou, K Lu Wireless Algorithms, Systems, and Applications: 13th International …, 2018 | 8 | 2018 |
AVPredictor: Comprehensive prediction and detection of atomicity violations P Wang, J Krinke, X Zhou, K Lu Concurrency and Computation: Practice and Experience 31 (15), e5160, 2019 | 7 | 2019 |
A Survey of the Security Analysis of Embedded Devices X Zhou, P Wang, L Zhou, P Xun, K Lu Sensors 23 (22), 9221, 2023 | 5 | 2023 |
IoTSim: Internet of Things-Oriented Binary Code Similarity Detection with Multiple Block Relations Z Luo, P Wang, W Xie, X Zhou, B Wang Sensors 23 (18), 7789, 2023 | 4 | 2023 |
ERACE: Toward Facilitating Exploit Generation for Kernel Race Vulnerabilities D Liu, P Wang, X Zhou, B Wang Applied Sciences 12 (23), 11925, 2022 | 4 | 2022 |