Opening a Pandora's box: things you should know in the era of custom GPTs G Tao, S Cheng, Z Zhang, J Zhu, G Shen, X Zhang arXiv preprint arXiv:2401.00905, 2023 | 10 | 2023 |
CoCo: Efficient Browser Extension Vulnerability Detection via Coverage-guided, Concurrent Abstract Interpretation J Yu, S Li, J Zhu, Y Cao Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 10 | 2023 |
From Exposed to Exploited: Drawing the Picture of Industrial Control Systems Security Status in the Internet Age. Y Wu, J Zhuge, T Yin, T Li, J Zhu, G Guo, Y Liu, J Hu ICISSP, 237-248, 2021 | 7 | 2021 |
Vulnerability-oriented testing for restful apis W Du, J Li, Y Wang, L Chen, R Zhao, J Zhu, Z Han, Y Wang, Z Xue 33rd USENIX Security Symposium (USENIX Security 24), 739-755, 2024 | 3 | 2024 |
Icscope: Detecting and measuring vulnerable ics devices exposed on the internet Y Wu, S Song, J Zhuge, T Yin, T Li, J Zhu, G Guo, Y Liu, J Hu International Conference on Information Systems Security and Privacy, 1-24, 2021 | 3 | 2021 |
SAWD: Structural-Aware Webshell Detection System with Control Flow Graph. J Zhu, Y Yao, X Deng, Y Yong, Y Wang, L Chen, Z Xue, R Zhao SEKE, 351-356, 2023 | | 2023 |