Welcome
Welcome
Home
Publications
Experience
Contact
Light
Dark
Automatic
1
FirmRCA: Towards Post-Fuzzing Analysis on ARM Embedded Firmware with Efficient Event-based Fault Localization
Boyu Chang
,
Binbin Zhao
,
Qiao Zhang
,
Peiyu Liu
,
Yuan Tian
,
Raheem Beyah
,
Shouling Ji
MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency
Jiacheng Xu
,
Xuhong Zhang
,
Shouling Ji
,
Yuan Tian
,
Binbin Zhao
,
Qinying Wang
,
Peng Cheng
,
Jiming Chen
PDF
SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices
Qinying Wang
,
Boyu Chang
,
Shouling Ji
,
Yuan Tian
,
Xuhong Zhang
,
Binbin Zhao
,
Gaoning Pan
,
Chenyang Lyu
,
Wenhai Wang
,
Raheem Beyah
PDF
Code
One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware
Binbin Zhao
,
Shouling Ji
,
Jiacheng Xu
,
Yuan Tian
,
Qiuyang Wei
,
Qinying Wang
,
Chenyang Lyu
,
Xuhong Zhang
,
Changting Lin
,
Jingzheng Wu
,
Raheem Beyah
PDF
Dataset
Slides
UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware
Binbin Zhao
,
Shouling Ji
,
Xuhong Zhang
,
Yuan Tian
,
Qinying Wang
,
Yuwen Pu
,
Chenyang Lyu
,
Raheem Beyah
PDF
MINER: A Hybrid Data-Driven Approach for REST API Fuzzing
Chenyang Lyu
,
Jiacheng Xu
,
Shouling Ji
,
Xuhong Zhang
,
Qinying Wang
,
Binbin Zhao
,
Gaoning Pan
,
Wei Cao
,
Peng Chen
,
Raheem Beyah
PDF
Code
A Large-Scale Empirical Analysis of the Vulnerabilities Introduced by Third-Party Components in IoT Firmware
Binbin Zhao
,
Shouling Ji
,
Jiacheng Xu
,
Yuan Tian
,
Qiuyang Wei
,
Qinying Wang
,
Chenyang Lyu
,
Xuhong Zhang
,
Changting Lin
,
Jingzheng Wu
,
Raheem Beyah
PDF
Dataset
Slides
SLIME: Program-sensitive Energy Allocation for Fuzzing
Chenyang Lyu
,
Hong Liang
,
Shouling Ji
,
Xuhong Zhang
,
Binbin Zhao
,
Meng Han
,
Yun Li
,
Zhe Wang
,
Wenhai Wang
,
Raheem Beyah
PDF
Code
EMS: History-Driven Mutation for Coverage-based Fuzzing
Chenyang Lyu
,
Shouling Ji
,
Xuhong Zhang
,
Hong Liang
,
Binbin Zhao
,
Kangjie Lu
,
Raheem Beyah
PDF
Cite
Code
MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols
Qinying Wang
,
Shouling Ji
,
Yuan Tian
,
Xuhong Zhang
,
Binbin Zhao
,
Yuhong Kan
,
Zhaowei Lin
,
Changting Lin
,
Shuiguang Deng
,
Alex X. Liu
,
Raheem Beyah
PDF
Cite
Code
»
Cite
×