{MPInspector}: A systematic and automatic approach for evaluating the security of {IoT} messaging protocols Q Wang, S Ji, Y Tian, X Zhang, B Zhao, Y Kan, Z Lin, C Lin, S Deng, ... 30th USENIX Security Symposium (USENIX Security 21), 4205-4222, 2021 | 30 | 2021 |
A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware B Zhao, S Ji, J Xu, Y Tian, Q Wei, Q Wang, C Lyu, X Zhang, C Lin, J Wu, ... Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022 | 21 | 2022 |
{MINER}: A Hybrid {Data-Driven} Approach for {REST}{API} Fuzzing C Lyu, J Xu, S Ji, X Zhang, Q Wang, B Zhao, G Pan, W Cao, P Chen, ... 32nd USENIX Security Symposium (USENIX Security 23), 4517-4534, 2023 | 5 | 2023 |
One bad apple spoils the barrel: Understanding the security risks introduced by third-party components in iot firmware B Zhao, S Ji, J Xu, Y Tian, Q Wei, Q Wang, C Lyu, X Zhang, C Lin, J Wu, ... IEEE Transactions on Dependable and Secure Computing 21 (3), 1372-1389, 2023 | 4 | 2023 |
SyzTrust: State-aware fuzzing on trusted OS designed for IoT devices Q Wang, B Chang, S Ji, Y Tian, X Zhang, B Zhao, G Pan, C Lyu, M Payer, ... arXiv preprint arXiv:2309.14742, 2023 | 2 | 2023 |
{UVSCAN}: Detecting {Third-Party} Component Usage Violations in {IoT} Firmware B Zhao, S Ji, X Zhang, Y Tian, Q Wang, Y Pu, C Lyu, R Beyah 32nd USENIX Security Symposium (USENIX Security 23), 3421-3438, 2023 | 2 | 2023 |
SURGEON: Performant, Flexible, and Accurate Re-Hosting via Transplantation F Hofhammer, M Busch, Q Wang, M Egele, M Payer Workshop on Binary Analysis Research (BAR'24), 2024 | | 2024 |
开源软件供应链安全研究综述 纪守领, 王琴应, 陈安莹, 赵彬彬, 叶童, 张旭鸿, 吴敬征, 李昀, 尹建伟, ... 软件学报 34 (3), 1330-1364, 2022 | | 2022 |
Survey on Open-source Software Supply Chain Security 纪守领, 王琴应, 陈安莹, 赵彬彬, 叶童, 张旭鸿, 吴敬征, 李昀, 尹建伟, ... Journal of Software 34 (3), 1330-1364, 2022 | | 2022 |
MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency J Xu, X Zhang, S Ji, Y Tian, B Zhao, Q Wang, P Cheng, J Chen | | |