EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit T Yue, P Wang, Y Tang, E Wang, B Yu, K Lu, X Zhou USENIX Security 2020, 2020 | 143 | 2020 |
How double-fetch situations turn into double-fetch vulnerabilities: A study of double fetches in the Linux kernel P Wang, J Krinke, K Lu, G Li, S Dodier-Lazaro 26th {USENIX} Security Symposium ({USENIX} Security 17), 1-16, 2017 | 78 | 2017 |
Poster: Fuzzing iot firmware via multi-stage message generation B Yu, P Wang, T Yue, Y Tang Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 45 | 2019 |
The progress, challenges, and perspectives of directed greybox fuzzing P Wang, X Zhou, P Lin, T Yue, Y Liu, K Lu Software Testing, Verification and Reliability, 2023 | 34* | 2023 |
Learnafl: Greybox fuzzing with knowledge enhancement T Yue, Y Tang, B Yu, P Wang, E Wang IEEE Access 7, 117029-117043, 2019 | 33 | 2019 |
VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search. Z Luo, P Wang, B Wang, Y Tang, W Xie, X Zhou, D Liu, K Lu NDSS, 2023 | 24 | 2023 |
Mobfuzz: Adaptive multi-objective optimization in gray-box fuzzing G Zhang, P Wang, T Yue, X Kong, S Huang, X Zhou, K Lu arXiv preprint arXiv:2401.15956, 2024 | 20 | 2024 |
SIoTFuzzer: fuzzing web interface in IoT firmware via stateful message generation H Zhang, K Lu, X Zhou, Q Yin, P Wang, T Yue Applied Sciences 11 (7), 3120, 2021 | 16 | 2021 |
A survey of the double‐fetch vulnerabilities P Wang, K Lu, G Li, X Zhou Concurrency and Computation: Practice and Experience, 2017 | 14 | 2017 |
DFTracker: detecting double-fetch bugs by multi-taint parallel tracking P Wang, K Lu, G Li, X Zhou Frontiers of Computer Science, 1-17, 2016 | 14 | 2016 |
Unifuzz: Optimizing distributed fuzzing via dynamic centralized task scheduling X Zhou, P Wang, C Liu, T Yue, Y Liu, C Song, K Lu, Q Yin arXiv preprint arXiv:2009.06124, 2020 | 12* | 2020 |
Untrusted hardware causes double-fetch problems in the I/O memory K Lu, PF Wang, G Li, X Zhou Journal of Computer Science and Technology 33, 587-602, 2018 | 8 | 2018 |
Dftinker: Detecting and fixing double-fetch bugs in an automated way Y Luo, P Wang, X Zhou, K Lu Wireless Algorithms, Systems, and Applications: 13th International …, 2018 | 8 | 2018 |
SHFuzz: Selective hybrid fuzzing with branch scheduling based on binary instrumentation X Mi, B Wang, Y Tang, P Wang, B Yu Applied Sciences 10 (16), 5449, 2020 | 7 | 2020 |
AVPredictor: Comprehensive prediction and detection of atomicity violations P Wang, J Krinke, X Zhou, K Lu Concurrency and Computation: Practice and Experience 31 (15), e5160, 2019 | 6 | 2019 |
From release to rebirth: Exploiting thanos objects in Linux kernel D Liu, P Wang, X Zhou, W Xie, G Zhang, Z Luo, T Yue, B Wang IEEE Transactions on Information Forensics and Security 18, 533-548, 2022 | 5 | 2022 |
ovAFLow: detecting memory corruption bugs with fuzzing-based taint inference G Zhang, PF Wang, T Yue, XD Kong, X Zhou, K Lu Journal of Computer Science and Technology 37 (2), 405-422, 2022 | 4 | 2022 |
Argus: assessing unpatched vulnerable devices on the internet via efficient firmware recognition W Xie, C Zhang, P Wang, Z Wang, Q Yang Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021 | 4 | 2021 |
ERACE: Toward Facilitating Exploit Generation for Kernel Race Vulnerabilities D Liu, P Wang, X Zhou, B Wang Applied Sciences 12 (23), 11925, 2022 | 2 | 2022 |
Sabotaging the system boundary: A study of the inter-boundary vulnerability P Wang, X Zhou, K Lu Journal of Information Security and Applications 54, 102496, 2020 | 2 | 2020 |