Follow
Qinying Wang
Title
Cited by
Cited by
Year
{MPInspector}: A systematic and automatic approach for evaluating the security of {IoT} messaging protocols
Q Wang, S Ji, Y Tian, X Zhang, B Zhao, Y Kan, Z Lin, C Lin, S Deng, ...
30th USENIX Security Symposium (USENIX Security 21), 4205-4222, 2021
282021
A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware
B Zhao, S Ji, J Xu, Y Tian, Q Wei, Q Wang, C Lyu, X Zhang, C Lin, J Wu, ...
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022
172022
{MINER}: A Hybrid {Data-Driven} Approach for {REST}{API} Fuzzing
C Lyu, J Xu, S Ji, X Zhang, Q Wang, B Zhao, G Pan, W Cao, P Chen, ...
32nd USENIX Security Symposium (USENIX Security 23), 4517-4534, 2023
42023
SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices
Q Wang, B Chang, S Ji, Y Tian, X Zhang, B Zhao, G Pan, C Lyu, M Payer, ...
arXiv preprint arXiv:2309.14742, 2023
22023
One bad apple spoils the barrel: Understanding the security risks introduced by third-party components in iot firmware
B Zhao, S Ji, J Xu, Y Tian, Q Wei, Q Wang, C Lyu, X Zhang, C Lin, J Wu, ...
IEEE Transactions on Dependable and Secure Computing, 2023
22023
{UVSCAN}: Detecting {Third-Party} Component Usage Violations in {IoT} Firmware
B Zhao, S Ji, X Zhang, Y Tian, Q Wang, Y Pu, C Lyu, R Beyah
32nd USENIX Security Symposium (USENIX Security 23), 3421-3438, 2023
12023
开源软件供应链安全研究综述
纪守领, 王琴应, 陈安莹, 赵彬彬, 叶童, 张旭鸿, 吴敬征, 李昀, 尹建伟, ...
软件学报 34 (3), 1330-1364, 2022
2022
Survey on Open-source Software Supply Chain Security
纪守领, 王琴应, 陈安莹, 赵彬彬, 叶童, 张旭鸿, 吴敬征, 李昀, 尹建伟, ...
Journal of Software 34 (3), 1330-1364, 2022
2022
SURGEON: Performant, Flexible, and Accurate Re-Hosting via Transplantation
F Hofhammer, M Busch, Q Wang, M Egele, M Payer
MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency
J Xu, X Zhang, S Ji, Y Tian, B Zhao, Q Wang, P Cheng, J Chen
The system can't perform the operation now. Try again later.
Articles 1–10