Follow
Pengfei Wang
Title
Cited by
Cited by
Year
EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit
T Yue, P Wang, Y Tang, E Wang, B Yu, K Lu, X Zhou
USENIX Security 2020, 2020
1772020
How double-fetch situations turn into double-fetch vulnerabilities: A study of double fetches in the Linux kernel
P Wang, J Krinke, K Lu, G Li, S Dodier-Lazaro
26th {USENIX} Security Symposium ({USENIX} Security 17), 1-16, 2017
842017
Poster: Fuzzing iot firmware via multi-stage message generation
B Yu, P Wang, T Yue, Y Tang
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
532019
VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search.
Z Luo, P Wang, B Wang, Y Tang, W Xie, X Zhou, D Liu, K Lu
NDSS, 2023
502023
The progress, challenges, and perspectives of directed greybox fuzzing
P Wang, X Zhou, P Lin, T Yue, Y Liu, K Lu
Software Testing, Verification and Reliability, 2023
39*2023
Learnafl: Greybox fuzzing with knowledge enhancement
T Yue, Y Tang, B Yu, P Wang, E Wang
IEEE Access 7, 117029-117043, 2019
392019
Mobfuzz: Adaptive multi-objective optimization in gray-box fuzzing
G Zhang, P Wang, T Yue, X Kong, S Huang, X Zhou, K Lu
arXiv preprint arXiv:2401.15956, 2024
302024
SIoTFuzzer: fuzzing web interface in IoT firmware via stateful message generation
H Zhang, K Lu, X Zhou, Q Yin, P Wang, T Yue
Applied Sciences 11 (7), 3120, 2021
202021
Unifuzz: Optimizing distributed fuzzing via dynamic centralized task scheduling
X Zhou, P Wang, C Liu, T Yue, Y Liu, C Song, K Lu, Q Yin
arXiv preprint arXiv:2009.06124, 2020
19*2020
A survey of the double‐fetch vulnerabilities
P Wang, K Lu, G Li, X Zhou
Concurrency and Computation: Practice and Experience, 2017
142017
DFTracker: detecting double-fetch bugs by multi-taint parallel tracking
P Wang, K Lu, G Li, X Zhou
Frontiers of Computer Science, 1-17, 2016
142016
Untrusted hardware causes double-fetch problems in the I/O memory
K Lu, PF Wang, G Li, X Zhou
Journal of Computer Science and Technology 33, 587-602, 2018
92018
From release to rebirth: Exploiting thanos objects in Linux kernel
D Liu, P Wang, X Zhou, W Xie, G Zhang, Z Luo, T Yue, B Wang
IEEE Transactions on Information Forensics and Security 18, 533-548, 2022
82022
ovAFLow: detecting memory corruption bugs with fuzzing-based taint inference
G Zhang, PF Wang, T Yue, XD Kong, X Zhou, K Lu
Journal of Computer Science and Technology 37 (2), 405-422, 2022
82022
SHFuzz: Selective hybrid fuzzing with branch scheduling based on binary instrumentation
X Mi, B Wang, Y Tang, P Wang, B Yu
Applied Sciences 10 (16), 5449, 2020
82020
Dftinker: Detecting and fixing double-fetch bugs in an automated way
Y Luo, P Wang, X Zhou, K Lu
Wireless Algorithms, Systems, and Applications: 13th International …, 2018
82018
AVPredictor: Comprehensive prediction and detection of atomicity violations
P Wang, J Krinke, X Zhou, K Lu
Concurrency and Computation: Practice and Experience 31 (15), e5160, 2019
72019
A Survey of the Security Analysis of Embedded Devices
X Zhou, P Wang, L Zhou, P Xun, K Lu
Sensors 23 (22), 9221, 2023
52023
IoTSim: Internet of Things-Oriented Binary Code Similarity Detection with Multiple Block Relations
Z Luo, P Wang, W Xie, X Zhou, B Wang
Sensors 23 (18), 7789, 2023
42023
ERACE: Toward Facilitating Exploit Generation for Kernel Race Vulnerabilities
D Liu, P Wang, X Zhou, B Wang
Applied Sciences 12 (23), 11925, 2022
42022
The system can't perform the operation now. Try again later.
Articles 1–20