关注
Pengfei Wang
标题
引用次数
引用次数
年份
EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit
T Yue, P Wang, Y Tang, E Wang, B Yu, K Lu, X Zhou
USENIX Security 2020, 2020
1272020
How double-fetch situations turn into double-fetch vulnerabilities: A study of double fetches in the Linux kernel
P Wang, J Krinke, K Lu, G Li, S Dodier-Lazaro
26th {USENIX} Security Symposium ({USENIX} Security 17), 1-16, 2017
732017
Poster: Fuzzing iot firmware via multi-stage message generation
B Yu, P Wang, T Yue, Y Tang
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
442019
The progress, challenges, and perspectives of directed greybox fuzzing
P Wang, X Zhou, P Lin, T Yue, Y Liu, K Lu
Software Testing, Verification and Reliability, 2023
33*2023
Learnafl: Greybox fuzzing with knowledge enhancement
T Yue, Y Tang, B Yu, P Wang, E Wang
IEEE Access 7, 117029-117043, 2019
332019
VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search.
Z Luo, P Wang, B Wang, Y Tang, W Xie, X Zhou, D Liu, K Lu
NDSS, 2023
172023
Mobfuzz: Adaptive multi-objective optimization in gray-box fuzzing
G Zhang, P Wang, T Yue, X Kong, S Huang, X Zhou, K Lu
arXiv preprint arXiv:2401.15956, 2024
162024
A survey of the double‐fetch vulnerabilities
P Wang, K Lu, G Li, X Zhou
Concurrency and Computation: Practice and Experience, 2017
132017
SIoTFuzzer: fuzzing web interface in IoT firmware via stateful message generation
H Zhang, K Lu, X Zhou, Q Yin, P Wang, T Yue
Applied Sciences 11 (7), 3120, 2021
122021
DFTracker: detecting double-fetch bugs by multi-taint parallel tracking
P Wang, K Lu, G Li, X Zhou
Frontiers of Computer Science, 1-17, 2016
122016
Unifuzz: Optimizing distributed fuzzing via dynamic centralized task scheduling
X Zhou, P Wang, C Liu, T Yue, Y Liu, C Song, K Lu, Q Yin
arXiv preprint arXiv:2009.06124, 2020
10*2020
SHFuzz: Selective hybrid fuzzing with branch scheduling based on binary instrumentation
X Mi, B Wang, Y Tang, P Wang, B Yu
Applied Sciences 10 (16), 5449, 2020
72020
Untrusted hardware causes double-fetch problems in the i/o memory
K Lu, PF Wang, G Li, X Zhou
Journal of Computer Science and Technology 33, 587-602, 2018
72018
AVPredictor: Comprehensive prediction and detection of atomicity violations
P Wang, J Krinke, X Zhou, K Lu
Concurrency and Computation: Practice and Experience 31 (15), e5160, 2019
62019
Dftinker: Detecting and fixing double-fetch bugs in an automated way
Y Luo, P Wang, X Zhou, K Lu
Wireless Algorithms, Systems, and Applications: 13th International …, 2018
62018
From release to rebirth: Exploiting thanos objects in Linux kernel
D Liu, P Wang, X Zhou, W Xie, G Zhang, Z Luo, T Yue, B Wang
IEEE Transactions on Information Forensics and Security 18, 533-548, 2022
42022
ovAFLow: detecting memory corruption bugs with fuzzing-based taint inference
G Zhang, PF Wang, T Yue, XD Kong, X Zhou, K Lu
Journal of Computer Science and Technology 37 (2), 405-422, 2022
42022
Argus: assessing unpatched vulnerable devices on the internet via efficient firmware recognition
W Xie, C Zhang, P Wang, Z Wang, Q Yang
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
42021
ERACE: Toward Facilitating Exploit Generation for Kernel Race Vulnerabilities
D Liu, P Wang, X Zhou, B Wang
Applied Sciences 12 (23), 11925, 2022
22022
Sabotaging the system boundary: A study of the inter-boundary vulnerability
P Wang, X Zhou, K Lu
Journal of Information Security and Applications 54, 102496, 2020
22020
系统目前无法执行此操作,请稍后再试。
文章 1–20