Dongliang Fang

Orcid: 0009-0005-7484-1333

According to our database1, Dongliang Fang authored at least 21 papers between 2021 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Fixseeker: An Empirical Driven Graph-based Approach for Detecting Silent Vulnerability Fixes in Open Source Software.
CoRR, March, 2025

EMFuzz: Use Electromagnetic Fuzzing for Automated Attack Surface Assessment of Actuators.
IEEE Trans. Inf. Forensics Secur., 2025

InvisiGuard: Data Integrity for Microcontroller-Based Devices via Hardware-Triggered Write Monitoring.
IEEE Trans. Dependable Secur. Comput., 2025

ICEPRE: ICS Protocol Reverse Engineering via Data-Driven Concolic Execution.
Proc. ACM Softw. Eng., 2025

SFACIF: A safety function attack and anomaly industrial condition identified framework.
Comput. Networks, 2025

ICSPFuzzer: An Efficient Fuzzing Technique for ICS Protocols.
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2025

Discovering PLC Web Application Vulnerabilities Impacting Physical Control Using LLM-Based Fuzzing.
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2025

Automated Flaw Detection for Industrial Robot RESTful Service.
Proceedings of the Verification, Model Checking, and Abstract Interpretation, 2025

PNetGPT: Proprietary Protocol Network Traffic Generation with Pre-trained Transformer.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025

2024
Bitmap-Based Security Monitoring for Deeply Embedded Systems.
ACM Trans. Softw. Eng. Methodol., September, 2024

PowerGuard: Using Power Side-Channel Signals to Secure Motion Controllers in ICS.
IEEE Trans. Inf. Forensics Secur., 2024

X-MBA: Towards Heterogeneous Mixed Boolean-Arithmetic Deobfuscation.
Proceedings of the IEEE Military Communications Conference, 2024

Adversarial Attack against Intrusion Detectors in Cyber-Physical Systems With Minimal Perturbations.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2024

MSGFuzzer: Message Sequence Guided Industrial Robot Protocol Fuzzing.
Proceedings of the IEEE Conference on Software Testing, Verification and Validation, 2024

2023
CEFI: Command Execution Flow Integrity for Embedded Devices.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2023

FITS: Inferring Intermediate Taint Sources for Effective Vulnerability Analysis of IoT Device Firmware.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023

2022
Fuzzing proprietary protocols of programmable controllers to find vulnerabilities that affect physical control.
J. Syst. Archit., 2022

Finding Vulnerabilities in Internal-binary of Firmware with Clues.
Proceedings of the IEEE International Conference on Communications, 2022

2021
Automatic Inference of Taint Sources to Discover Vulnerabilities in SOHO Router Firmware.
Proceedings of the ICT Systems Security and Privacy Protection, 2021

ICS3Fuzzer: A Framework for Discovering Protocol Implementation Bugs in ICS Supervisory Software by Fuzzing.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

DSS: Discrepancy-Aware Seed Selection Method for ICS Protocol Fuzzing.
Proceedings of the Applied Cryptography and Network Security, 2021


  Loading...