IOTFUZZER: Discovering Memory Corruptions in IoT Through App-based Fuzzing J Chen, W Diao, Q Zhao, C Zuo, Z Lin, XF Wang, WC Lau, M Sun, R Yang, ... Proceedings of the 25th Network and Distributed System Security Symposium …, 2018 | 459 | 2018 |
Badbluetooth: Breaking android security mechanisms via malicious bluetooth peripherals. F Xu, W Diao, Z Li, J Chen, K Zhang NDSS, 2019 | 64 | 2019 |
Your smart home can't keep a secret: Towards automated fingerprinting of iot traffic S Dong, Z Li, D Tang, J Chen, M Sun, K Zhang Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 61 | 2020 |
{CryptoREX}: Large-scale analysis of cryptographic misuse in {IoT} devices L Zhang, J Chen, W Diao, S Guo, J Weng, K Zhang 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 45 | 2019 |
Your iots are (not) mine: On the remote binding between iot devices and users J Chen, C Zuo, W Diao, S Dong, Q Zhao, M Sun, Z Lin, Y Zhang, K Zhang 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019 | 44 | 2019 |
Vetting Single {Sign-On}{SDK} Implementations via Symbolic Reasoning R Yang, WC Lau, J Chen, K Zhang 27th USENIX Security Symposium (USENIX Security 18), 1459-1474, 2018 | 22 | 2018 |
Your smart home can't keep a secret: Towards automated fingerprinting of iot traffic with neural networks S Dong, Z Li, D Tang, J Chen, M Sun, K Zhang arXiv preprint arXiv:1909.00104, 2019 | 20 | 2019 |
Game of hide-and-seek: Exposing hidden interfaces in embedded web applications of iot devices W Xie, J Chen, Z Wang, C Feng, E Wang, Y Gao, B Wang, K Lu Proceedings of the ACM Web Conference 2022, 524-532, 2022 | 14 | 2022 |
Sevuldet: A semantics-enhanced learnable vulnerability detector Z Tang, Q Hu, Y Hu, W Kuang, J Chen 2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems …, 2022 | 13 | 2022 |
DeFault: mutual information-based crash triage for massive crashes X Zhang, J Chen, C Feng, R Li, W Diao, K Zhang, J Lei, C Tang Proceedings of the 44th International Conference on Software Engineering …, 2022 | 9 | 2022 |
Security analysis of device binding for IP-based IoT devices J Chen, M Sun, K Zhang 2019 IEEE International Conference on Pervasive Computing and Communications …, 2019 | 9 | 2019 |
Demystifying Android non-SDK APIs: measurement and understanding S Yang, R Li, J Chen, W Diao, S Guo Proceedings of the 44th International Conference on Software Engineering …, 2022 | 8 | 2022 |
Automated Exploitable Heap Layout Generation for Heap Overflows Through Manipulation {Distance-Guided} Fuzzing B Zhang, J Chen, R Li, C Feng, R Li, C Tang 32nd USENIX Security Symposium (USENIX Security 23), 4499-4515, 2023 | 7 | 2023 |
Towards Automatic and Precise Heap Layout Manipulation for General-Purpose Programs. R Li, B Zhang, J Chen, W Lin, C Feng, C Tang NDSS, 2023 | 7 | 2023 |
{HOMESPY}: The Invisible Sniffer of Infrared Remote Control of Smart {TVs} K Huang, YT Zhou, K Zhang, J Xu, J Chen, D Tang, K Zhang 32nd USENIX Security Symposium (USENIX Security 23), 4553-4570, 2023 | 5 | 2023 |
Reducing Test Cases with Attention Mechanism of Neural Networks X Zhang, J Chen, C Feng, R Li, Y Su, B Zhang, J Lei, C Tang 30th USENIX Security Symposium (USENIX Security 21), 2075-2092, 2021 | 3 | 2021 |
Understanding the Brains and Brawn of Illicit Streaming App K Huang, K Zhang, J Chen, M Sun, W Sun, D Tang, K Zhang International Conference on Digital Forensics and Cyber Crime, 194-214, 2021 | 2 | 2021 |
Cast Away: On the Security of DLNA Deployments in the SmartTV Ecosystem G Tian, J Chen, K Yan, S Yang, W Diao 2022 IEEE 22nd International Conference on Software Quality, Reliability and …, 2022 | 1 | 2022 |
Authorisation inconsistency in IoT third‐party integration J Chen, F Xu, S Dong, W Sun, K Zhang IET Information Security 16 (2), 133-143, 2022 | 1 | 2022 |