Yaowen Zheng

Orcid: 0000-0002-8953-0782

According to our database1, Yaowen Zheng authored at least 28 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An empirical study of attack-related events in DeFi projects development.
Empir. Softw. Eng., April, 2024

A Cross-Language Investigation into Jailbreak Attacks in Large Language Models.
CoRR, 2024

A Survey of Protocol Fuzzing.
CoRR, 2024

2023
A systematic mapping study for graphical user interface testing on mobile apps.
IET Softw., June, 2023

UCRF: Static analyzing firmware to generate under-constrained seed for fuzzing SOHO router.
Comput. Secur., May, 2023

Automated GUI widgets classification.
Frontiers Comput. Sci., February, 2023

Harnessing the Power of LLM to Support Binary Taint Analysis.
CoRR, 2023

Understanding Large Language Model Based Fuzz Driver Generation.
CoRR, 2023

Jailbreaking ChatGPT via Prompt Engineering: An Empirical Study.
CoRR, 2023

Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation.
Proceedings of the 32nd USENIX Security Symposium, 2023

Detecting Vulnerabilities in Linux-Based Embedded Firmware with SSE-Based On-Demand Alias Analysis.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

PumpChannel: An Efficient and Secure Communication Channel for Trusted Execution Environment on ARM-FPGA Embedded SoC.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023

FITS: Inferring Intermediate Taint Sources for Effective Vulnerability Analysis of IoT Device Firmware.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023

2022
Fuzzing proprietary protocols of programmable controllers to find vulnerabilities that affect physical control.
J. Syst. Archit., 2022

Inferring Device Interactions for Attack Path Discovery in Smart Home IoT.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

An Empirical Study of the Impact of COVID-19 on OSS Development.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

Efficient greybox fuzzing of applications in Linux-based IoT devices via enhanced user-mode emulation.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

More Secure Collaborative APIs resistant to Flush-Based Cache Attacks on Cortex-A9 Based Automotive System.
Proceedings of the Computer Science in Cars Symposium, 2022

IPSpex: Enabling Efficient Fuzzing via Specification Extraction on ICS Protocol.
Proceedings of the Applied Cryptography and Network Security, 2022

2021
Reviewing IoT Security via Logic Bugs in IoT Platforms and Systems.
IEEE Internet Things J., 2021

Automatic Inference of Taint Sources to Discover Vulnerabilities in SOHO Router Firmware.
Proceedings of the ICT Systems Security and Privacy Protection, 2021

ICS3Fuzzer: A Framework for Discovering Protocol Implementation Bugs in ICS Supervisory Software by Fuzzing.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2019
Logic Bugs in IoT Platforms and Systems: A Review.
CoRR, 2019

FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation.
Proceedings of the 28th USENIX Security Symposium, 2019

An Efficient Greybox Fuzzing Scheme for Linux-based IoT Programs Through Binary Static Analysis.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

2018
DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

2016
A Lightweight Method for Accelerating Discovery of Taint-Style Vulnerabilities in Embedded Systems.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

2014
Security of Cyber Physical System.
Proceedings of the Advances in Wireless Sensor Networks - The 8th China Conference, 2014


  Loading...