Follow
Jiashui Wang
Jiashui Wang
Verified email at zju.edu.cn
Title
Cited by
Cited by
Year
{APICraft}: Fuzz driver generation for closed-source {SDK} libraries
C Zhang, X Lin, Y Li, Y Xue, J Xie, H Chen, X Ying, J Wang, Y Liu
30th USENIX Security Symposium (USENIX Security 21), 2811-2828, 2021
332021
Towards understanding and mitigating audio adversarial examples for speaker recognition
G Chen, Z Zhao, F Song, S Chen, L Fan, F Wang, J Wang
IEEE Transactions on Dependable and Secure Computing, 2022
272022
V-shuttle: Scalable and semantics-aware hypervisor virtual device fuzzing
G Pan, X Lin, X Zhang, Y Jia, S Ji, C Wu, X Ying, J Wang, Y Wu
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
162021
Sequence-oriented DBMS fuzzing
J Liang, Y Chen, Z Wu, J Fu, M Wang, Y Jiang, X Huang, T Chen, J Wang, ...
2023 IEEE 39th International Conference on Data Engineering (ICDE), 668-681, 2023
72023
Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection
H He, X Lin, Z Weng, R Zhao, S Gan, L Chen, Y Ji, J Wang, Z Xue
33rd USENIX Security Symposium (USENIX Security 24), PHILADELPHIA, PA, 2024
2024
Detecting DBMS Bugs with Context-Sensitive Instantiation and Multi-Plan Execution
J Li, K Wang, Y Chen, Y Zhou, L Wu, J Wang
arXiv preprint arXiv:2312.04941, 2023
2023
Hodor: Shrinking attack surface on node. js via system call limitation
W Wang, X Lin, J Wang, W Gao, D Gu, W Lv, J Wang
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
2023
DeFiWarder: Protecting DeFi Apps from Token Leaking Vulnerabilities
J Su, X Lin, Z Fang, Z Zhu, J Chen, Z Zheng, W Lv, J Wang
2023 38th IEEE/ACM International Conference on Automated Software …, 2023
2023
Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition
G Chen, Z Zhao, F Song, S Chen, L Fan, F Wang, J Wang
IEEE Transactions on Dependable and Secure Computing 20 (05), 3970-3987, 2023
2023
The Best of Both Worlds: Integrating Semantic Features with Expert Features for Smart Contract Vulnerability Detection
X Lin, M Zhou, S Cao, J Wang, X Sun
International Conference on Blockchain and Trustworthy Systems, 17-31, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–10