Publications

(2024). MSGFuzzer: Message Sequence Guided Industrial Robot Protocol Fuzzing. 2024 IEEE International Conference on Software Testing, Verification and Validation (ICST).

Cite

(2024). Battling against Protocol Fuzzing: Protecting Networked Embedded Devices from Dynamic Fuzzers. ACM Transactions on Software Engineering and Methodology (TOSEM).

Cite

(2023). FITS: Inferring Intermediate Taint Sources for Effective Vulnerability Analysis of IoT Device Firmware. 2023 Architectural Support for Programming Languages and Operating Systems (ASPLOS).

Cite

(2023). UCRF: Static analyzing firmware to generate under-constrained seed for fuzzing SOHO router. Computers & Security.

Cite

(2023). MESCAL: Malicious Login Detection Based on Heterogeneous Graph Embedding with Supervised Contrastive Learning. 2023 IEEE Symposium on Computers and Communications (ISCC).

Cite

(2023). Harnessing the power of llm to support binary taint analysis. arXiv preprint arXiv:2310.08275.

Cite

(2022). Survey of Research on Protocol Security of Industrial Control System. Journal of Computer Research and Development (Chinese).

Cite

(2022). Integrated Risk Assessment Algorithm for Functional Safety and Information Security of Industrial Control Systems. Journal of Cyber Security (Chinese).

Cite

(2022). Fuzzing proprietary protocols of programmable controllers to find vulnerabilities that affect physical control. Journal of Systems Architecture.

Cite

(2022). Finding Vulnerabilities in Internal-binary of Firmware with Clues. ICC 2022-IEEE International Conference on Communications (ICC).

Cite

(2021). Survey on the Integration of Safety and Security in Indus-trial Control Systems. Journal of Cyber Security (Chinese).

Cite

(2021). ICS$^3$fuzzer: A framework for discovering protocol implementation bugs in ics supervisory software by fuzzing. Annual Computer Security Applications Conference (ACSAC).

Cite

(2021). DSS: discrepancy-aware seed selection method for ICS protocol fuzzing. International Conference on Applied Cryptography and Network Security (ACNS).

Cite