Author of the publication

An Efficient Greybox Fuzzing Scheme for Linux-based IoT Programs Through Binary Static Analysis.

, , , , , and . IPCCC, page 1-8. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Greybox Fuzzing Scheme for Linux-based IoT Programs Through Binary Static Analysis., , , , , and . IPCCC, page 1-8. IEEE, (2019)Harnessing the Power of LLM to Support Binary Taint Analysis., , , , , , , and . CoRR, (2023)An Empirical Study of the Impact of COVID-19 on OSS Development., , , , and . QRS Companion, page 708-717. IEEE, (2022)IPSpex: Enabling Efficient Fuzzing via Specification Extraction on ICS Protocol., , , , , , and . ACNS, volume 13269 of Lecture Notes in Computer Science, page 356-375. Springer, (2022)Inferring Device Interactions for Attack Path Discovery in Smart Home IoT., , , , , and . WASA (1), volume 13471 of Lecture Notes in Computer Science, page 64-75. Springer, (2022)Reviewing IoT Security via Logic Bugs in IoT Platforms and Systems., , , , , , , , , and 3 other author(s). IEEE Internet Things J., 8 (14): 11621-11639 (2021)UCRF: Static analyzing firmware to generate under-constrained seed for fuzzing SOHO router., , , , , , and . Comput. Secur., (May 2023)FITS: Inferring Intermediate Taint Sources for Effective Vulnerability Analysis of IoT Device Firmware., , , , , , and . ASPLOS (4), page 138-152. ACM, (2023)Medusa: Unveil Memory Exhaustion DoS Vulnerabilities in Protocol Implementations., , , , , , , , , and 1 other author(s). WWW, page 1668-1679. ACM, (2024)Fuzzing proprietary protocols of programmable controllers to find vulnerabilities that affect physical control., , , , , and . J. Syst. Archit., (2022)