Author of the publication

A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware.

, , , , , , , , , , and . ISSTA, page 442-454. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VulSniper: Focus Your Attention to Shoot Fine-Grained Vulnerabilities., , , , , , and . IJCAI, page 4665-4671. ijcai.org, (2019)Policykeeper: Recommending Proper Security Mechanisms Based on the Severity of Vulnerability Considering User Experience., , , and . SERE (Companion), page 227-228. IEEE, (2013)Droidrevealer: Automatically detecting Mysterious Codes in Android applications., , , , , and . DSC, page 535-536. IEEE, (2017)AI-CTO: Knowledge graph for automated and dependable software stack solution., , , , , , and . J. Intell. Fuzzy Syst., 40 (1): 799-812 (2021)A Large-Scale Study on Vulnerabilities in Linux using Vtopia., , , , and . QRS Companion, page 1-10. IEEE, (2021)One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware., , , , , , , , , and 1 other author(s). CoRR, (2022)Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art., , , , , , , , , and 2 other author(s). Comput. Secur., (May 2023)POSTER: biTheft: Stealing Your Secrets by Bidirectional Covert Channel Communication with Zero-Permission Android Application., , , , , and . CCS, page 1690-1692. ACM, (2015)A Needle is an Outlier in a Haystack: Hunting Malicious PyPI Packages with Code Clustering., , , , and . ASE, page 307-318. IEEE, (2023)C2Detector: a covert channel detection framework in cloud computing., , , , , and . Secur. Commun. Networks, 7 (3): 544-557 (2014)