Bo Yu

Orcid: 0000-0001-6576-5555

Affiliations:
  • National University of Defense Technology, College of Computer, Changsha, China


According to our database1, Bo Yu authored at least 17 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Automatic discovery of stateful variables in network protocol software based on replay analysis.
Frontiers Inf. Technol. Electron. Eng., March, 2023

2022
SEEKER: A Root Cause Analysis Method Based on Deterministic Replay for Multi-Type Network Protocol Vulnerabilities.
Proceedings of the IEEE International Conference on Trust, 2022

Anatomist: Enhanced Firmware Vulnerability Discovery Based on Program State Abnormality Determination with Whole-System Replay.
Proceedings of the Information Security - 25th International Conference, 2022

NAFuzzer: Augmenting Network Protocol Fuzzers via Automatic Template and Seed Generation.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

A Component Vulnerability Matching Approach for IoT Firmware.
Proceedings of the 6th Asia-Pacific Workshop on Networking, 2022

WThreadAFL: Deterministic Greybox Fuzzing for Multi-thread Network Servers.
Proceedings of the 6th Asia-Pacific Workshop on Networking, 2022

2020
EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit.
Proceedings of the 29th USENIX Security Symposium, 2020

2019
LearnAFL: Greybox Fuzzing With Knowledge Enhancement.
IEEE Access, 2019

Poster: Fuzzing IoT Firmware via Multi-stage Message Generation.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
A survey of malware behavior description and analysis.
Frontiers Inf. Technol. Electron. Eng., 2018

Automated Vulnerability Detection in Embedded Devices.
Proceedings of the Advances in Digital Forensics XIV, 2018

2017
Automatic malware classification and new malware detection using machine learning.
Frontiers Inf. Technol. Electron. Eng., 2017

Matching Function-Call Graph of Binary Codes and Its Applications (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

A New Malware Classification Approach Based on Malware Dynamic Analysis.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
A Novel Selective Ensemble Learning Based on K-means and Negative Correlation.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

Unbounded Revocable Hierarchical Identity-Based Encryption with Adaptive-ID Security.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

2015
Malware Clustering Based on SNN Density Using System Calls.
Proceedings of the Cloud Computing and Security - First International Conference, 2015


  Loading...