Pengfei Wang

Orcid: 0000-0003-3408-4153

Affiliations:
  • National University of Defense Technology, School of Computer Science, Changsha, China (PhD 2018)


According to our database1, Pengfei Wang authored at least 25 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The progress, challenges, and perspectives of directed greybox fuzzing.
Softw. Test. Verification Reliab., March, 2024

2023
A Survey of the Security Analysis of Embedded Devices.
Sensors, November, 2023

IoTSim: Internet of Things-Oriented Binary Code Similarity Detection with Multiple Block Relations.
Sensors, September, 2023

UltraFuzz: Towards Resource-Saving in Distributed Fuzzing.
IEEE Trans. Software Eng., April, 2023

From Release to Rebirth: Exploiting Thanos Objects in Linux Kernel.
IEEE Trans. Inf. Forensics Secur., 2023

HyperGo: Probability-based Directed Hybrid Fuzzing.
CoRR, 2023

VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

ReForker: Patching x86_64 Binaries with the Fork Server to Improve Hardware-Assisted Fuzzing through Trampoline-Based Binary Rewriting.
Proceedings of the 2nd International Conference on Networks, 2023

2022
ovAFLow: Detecting Memory Corruption Bugs with Fuzzing-Based Taint Inference.
J. Comput. Sci. Technol., 2022

MobFuzz: Adaptive Multi-objective Optimization in Gray-box Fuzzing.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

2021
MEBS: Uncovering Memory Life-Cycle Bugs in Operating System Kernels.
J. Comput. Sci. Technol., 2021

HashMTI: Scalable Mutation-based Taint Inference with Hash Records.
Proceedings of the 28th IEEE International Conference on Software Analysis, 2021

ARGUS: Assessing Unpatched Vulnerable Devices on the Internet via Efficient Firmware Recognition.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Sabotaging the system boundary: A study of the inter-boundary vulnerability.
J. Inf. Secur. Appl., 2020

UniFuzz: Optimizing Distributed Fuzzing via Dynamic Centralized Task Scheduling.
CoRR, 2020

SoK: The Progress, Challenges, and Perspectives of Directed Greybox Fuzzing.
CoRR, 2020

EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit.
Proceedings of the 29th USENIX Security Symposium, 2020

2019
DFTracker: detecting double-fetch bugs by multi-taint parallel tracking.
Frontiers Comput. Sci., 2019

AVPredictor: Comprehensive prediction and detection of atomicity violations.
Concurr. Comput. Pract. Exp., 2019

LearnAFL: Greybox Fuzzing With Knowledge Enhancement.
IEEE Access, 2019

Poster: Fuzzing IoT Firmware via Multi-stage Message Generation.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Untrusted Hardware Causes Double-Fetch Problems in the I/O Memory.
J. Comput. Sci. Technol., 2018

A survey of the double-fetch vulnerabilities.
Concurr. Comput. Pract. Exp., 2018

DFTinker: Detecting and Fixing Double-Fetch Bugs in an Automated Way.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

2017
How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel.
Proceedings of the 26th USENIX Security Symposium, 2017


  Loading...