A Large-Scale Empirical Study on the Vulnerability of Deployed IoT Devices B Zhao, S Ji, WH Lee, C Lin, H Weng, J Wu, P Zhou, L Fang, R Beyah IEEE Transactions on Dependable and Secure Computing, 2020 | 52 | 2020 |
Towards understanding the security of modern image captchas and underground captcha-solving services H Weng, B Zhao, S Ji, J Chen, T Wang, Q He, R Beyah Big Data Mining and Analytics 2 (2), 118-144, 2019 | 38 | 2019 |
Towards evaluating the security of real-world deployed image captchas B Zhao, H Weng, S Ji, J Chen, T Wang, Q He, R Beyah Proceedings of the 11th acm workshop on artificial intelligence and security …, 2018 | 35 | 2018 |
MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols Q Wang, S Ji, Y Tian, X Zhang, B Zhao, Y Kan, Z Lin, C Lin, S Deng, ... 30th USENIX Security Symposium (USENIX Security 21), 4205-4222, 2021 | 30 | 2021 |
EMS: History-Driven Mutation for Coverage-based Fuzzing C Lyu, S Ji, X Zhang, H Liang, B Zhao, K Lu, R Beyah NDSS, 2022 | 23 | 2022 |
A Large-Scale Empirical Analysis of the Vulnerabilities Introduced by Third-Party Components in IoT Firmware B Zhao, S Ji, J Xu, Y Tian, Q Wei, Q Wang, C Lyu, X Zhang, C Lin, J Wu, ... ISSTA, 2022 | 21 | 2022 |
Slime: Program-Sensitive Energy Allocation for Fuzzing C Lyu, H Liang, S Ji, X Zhang, B Zhao, M Han, Y Li, Z Wang, W Wang, ... ISSTA, 2022 | 16 | 2022 |
MINER: A Hybrid Data-Driven Approach for REST API Fuzzing C Lyu, J Xu, S Ji, X Zhang, Q Wang, B Zhao, G Pan, W Cao, R Beyah 32nd USENIX Security Symposium (USENIX Security 23), 2023 | 5 | 2023 |
One bad apple spoils the barrel: Understanding the security risks introduced by third-party components in iot firmware B Zhao, S Ji, J Xu, Y Tian, Q Wei, Q Wang, C Lyu, X Zhang, C Lin, J Wu, ... IEEE Transactions on Dependable and Secure Computing, 2023 | 4 | 2023 |
SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices Q Wang, B Chang, S Ji, Y Tian, X Zhang, B Zhao, G Pan, C Lyu, M Payer, ... 2024 IEEE Symposium on Security and Privacy, 2023 | 2 | 2023 |
UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware B Zhao, S Ji, X Zhang, Y Tian, Q Wang, Y Pu, C Lyu, R Beyah 32nd USENIX Security Symposium (USENIX Security 23), 2023 | 2 | 2023 |
Cross-architecture automatic detection method and system for third-party components and security risks thereof M Han, C Lin, D Peng, MX Shan, L Zhang, Q Gong, B Zhao, H Xu, J Xu, ... US Patent App. 17/991,691, 2023 | 1 | 2023 |
MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency J Xu, X Zhang, S Ji, Y Tian, B Zhao, Q Wang, P Cheng, J Chen NDSS, 2024 | | 2024 |