Suivre
Xingwei Lin
Xingwei Lin
Adresse e-mail validée de zju.edu.cn
Titre
Citée par
Citée par
Année
Gptfuzzer: Red teaming large language models with auto-generated jailbreak prompts
J Yu, X Lin, Z Yu, X Xing
arXiv preprint arXiv:2309.10253, 2023
2442023
Jn-saf: Precise and efficient ndk/jni-aware inter-language static analysis framework for security vetting of android applications with native code
F Wei, X Lin, X Ou, T Chen, X Zhang
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1102018
When chatgpt meets smart contract vulnerability detection: How far are we?
C Chen, J Su, J Chen, Y Wang, T Bi, J Yu, Y Wang, X Lin, T Chen, ...
ACM Transactions on Software Engineering and Methodology, 2023
482023
APICraft: Fuzz Driver Generation for Closed-source SDK Libraries
C Zhang, X Lin, Y Li, Y Xue, J Xie, H Chen, X Ying, J Wang, Y Liu
30th {USENIX} Security Symposium ({USENIX} Security 21), 2811-2828, 2021
452021
V-shuttle: Scalable and semantics-aware hypervisor virtual device fuzzing
G Pan, X Lin, X Zhang, Y Jia, S Ji, C Wu, X Ying, J Wang, Y Wu
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
302021
Code is not natural language: Unlock the power of semantics-oriented graph representation for binary code similarity detection
H He, X Lin, Z Weng, R Zhao, S Gan, L Chen, Y Ji, J Wang, Z Xue
33rd USENIX Security Symposium (USENIX Security 24), PHILADELPHIA, PA, 2024
132024
{LLM-Fuzzer}: Scaling assessment of large language model jailbreaks
J Yu, X Lin, Z Yu, X Xing
33rd USENIX Security Symposium (USENIX Security 24), 4657-4674, 2024
92024
DeFiWarder: Protecting DeFi Apps from Token Leaking Vulnerabilities
J Su, X Lin, Z Fang, Z Zhu, J Chen, Z Zheng, W Lv, J Wang
2023 38th IEEE/ACM International Conference on Automated Software …, 2023
92023
An ABI-based classification approach for Ethereum smart contracts
X Sun, X Lin, Z Liao
2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2021
42021
HODOR: Shrinking Attack Surface on Node. js via System Call Limitation
W Wang, X Lin, J Wang, W Gao, D Gu, W Lv, J Wang
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
32023
Scavenger: Misuse Error Handling Leading To QEMU/KVM Escape
G Pan, X Lin, X Ying, J Wang, C Wu
Black Hat Asia, 2021
32021
Better Pay Attention Whilst Fuzzing
S Zhu, J Wang, J Sun, J Yang, X Lin, T Wang, L Zhang, P Cheng
IEEE Transactions on Software Engineering, 2023
22023
SmartOracle: Generating Smart Contract Oracle via Fine-Grained Invariant Detection
J Su, J Chen, Z Fang, X Lin, Y Tang, Z Zheng
IEEE Transactions on Software Engineering, 2025
12025
Snopy: Bridging Sample Denoising with Causal Graph Learning for Effective Vulnerability Detection
S Cao, X Sun, X Wu, D Lo, L Bo, B Li, X Liu, X Lin, W Liu
Proceedings of the 39th IEEE/ACM International Conference on Automated …, 2024
12024
Hyperion: Unveiling DApp Inconsistencies using LLM and Dataflow-Guided Symbolic Execution
S Yang, X Lin, J Chen, Q Zhong, L Xiao, R Huang, Y Wang, Z Zheng
arXiv preprint arXiv:2408.06037, 2024
12024
The Best of Both Worlds: Integrating Semantic Features with Expert Features for Smart Contract Vulnerability Detection
X Lin, M Zhou, S Cao, J Wang, X Sun
International Conference on Blockchain and Trustworthy Systems, 17-31, 2023
12023
DBAF: Dynamic Binary Analysis Framework and Its Applications
T Chen, Y Feng, X Lin, Z Li, X Zhang
Network and System Security: 12th International Conference, NSS 2018, Hong …, 2018
12018
Midas: Mining Profitable Exploits in On-Chain Smart Contracts via Feedback-Driven Fuzzing and Differential Analysis
M Ye, X Lin, Y Nan, J Wu, Z Zheng
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software …, 2024
2024
Scuzer: A Scheduling Optimization Fuzzer for TVM
X Chen, X Lin, J Wang, J Sun, J Wang, W Wang
ACM Transactions on Software Engineering and Methodology, 2024
2024
HODOR: Reducing Attack Surface on Node.js via System Call Limitation
Wenya Wang, Xingwei Lin, Jingyi Wang, Wang Gao, Dawu Gu
BLACK HAT EUROPE 2023, 2023
2023
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20