Publications

(2026). Bridge: High-Order Taint Vulnerabilities Detection in Linux-based IoT Firmware. 47th IEEE Symposium on Security and Privacym (S&P).

Cite

(2026). User-Space Dependency-Aware Rehosting for Linux-Based Firmware Binaries. Network and Distributed System Security (NDSS) Symposium.

Cite

(2026). ADGFUZZ: Assignment Dependency-Guided Fuzzing for Robotic Vehicles. Network and Distributed System Security (NDSS) Symposium.

Cite

(2025). Function Renaming in Reverse Engineering of Embedded Device Firmware with ChatGPT. Proceedings of the 1st ACM SIGPLAN International Workshop on Language Models and Programming Languages (LMPL 25 co-hosted by ICFP/SPLASH 2025).

Cite

(2025). LLM-Powered Static Binary Taint Analysis. ACM Transactions on Software Engineering and Methodology (TOSEM).

Cite

(2025). Automated Flaw Detection for Industrial Robot RESTful Service. 26th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI).

Cite

(2024). T-Rec: Fine-Grained Language-Agnostic Program Reduction Guided by Lexical Syntax. ACM Transactions on Software Engineering and Methodology (TOSEM).

Cite

(2024). MSGFuzzer: Message Sequence Guided Industrial Robot Protocol Fuzzing. 2024 IEEE International Conference on Software Testing, Verification and Validation (ICST).

Cite

(2024). Battling against Protocol Fuzzing: Protecting Networked Embedded Devices from Dynamic Fuzzers. ACM Transactions on Software Engineering and Methodology (TOSEM).

Cite

(2024). Adversarial Attack Against Intrusion Detectors in Cyber-Physical Systems With Minimal Perturbations. The 22nd IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA).

Cite

(2023). FITS: Inferring Intermediate Taint Sources for Effective Vulnerability Analysis of IoT Device Firmware. 2023 Architectural Support for Programming Languages and Operating Systems (ASPLOS).

Cite

(2023). UCRF: Static analyzing firmware to generate under-constrained seed for fuzzing SOHO router. Computers & Security.

Cite

(2023). MESCAL: Malicious Login Detection Based on Heterogeneous Graph Embedding with Supervised Contrastive Learning. 2023 IEEE Symposium on Computers and Communications (ISCC).

Cite

(2022). Survey of Research on Protocol Security of Industrial Control System. Journal of Computer Research and Development (Chinese).

Cite

(2022). Integrated Risk Assessment Algorithm for Functional Safety and Information Security of Industrial Control Systems. Journal of Cyber Security (Chinese).

Cite

(2022). Fuzzing proprietary protocols of programmable controllers to find vulnerabilities that affect physical control. Journal of Systems Architecture.

Cite

(2022). Finding Vulnerabilities in Internal-binary of Firmware with Clues. ICC 2022-IEEE International Conference on Communications (ICC).

Cite

(2021). Survey on the Integration of Safety and Security in Indus-trial Control Systems. Journal of Cyber Security (Chinese).

Cite

(2021). ICS$^3$fuzzer: A framework for discovering protocol implementation bugs in ics supervisory software by fuzzing. Annual Computer Security Applications Conference (ACSAC).

Cite

(2021). DSS: discrepancy-aware seed selection method for ICS protocol fuzzing. International Conference on Applied Cryptography and Network Security (ACNS).

Cite