Memlock: Memory usage guided fuzzing C Wen, H Wang, Y Li, S Qin, Y Liu, Z Xu, H Chen, X Xie, G Pu, T Liu Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 124 | 2020 |
Typestate-guided fuzzer for discovering use-after-free vulnerabilities H Wang, X Xie, Y Li, C Wen, Y Li, Y Liu, S Qin, H Chen, Y Sui Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 107 | 2020 |
{MUZZ}: Thread-aware grey-box fuzzing for effective bug hunting in multithreaded programs H Chen, S Guo, Y Xue, Y Sui, C Zhang, Y Li, H Wang, Y Liu 29th USENIX Security Symposium (USENIX Security 20), 2325-2342, 2020 | 95 | 2020 |
Cerebro: context-aware adaptive fuzzing for effective vulnerability detection Y Li, Y Xue, H Chen, X Wu, C Zhang, X Xie, H Wang, Y Liu Proceedings of the 2019 27th ACM Joint Meeting on European Software …, 2019 | 91 | 2019 |
Diffchaser: Detecting disagreements for deep neural networks X Xie, L Ma, H Wang, Y Li, Y Liu, X Li International Joint Conferences on Artificial Intelligence Organization, 2019 | 80 | 2019 |
Vultron: catching vulnerable smart contracts once and for all H Wang, Y Li, SW Lin, L Ma, Y Liu 2019 IEEE/ACM 41st International Conference on Software Engineering: New …, 2019 | 69 | 2019 |
Dependence guided symbolic execution H Wang, T Liu, X Guan, C Shen, Q Zheng, Z Yang IEEE Transactions on Software Engineering 43 (3), 252-271, 2016 | 53 | 2016 |
Oracle-supported dynamic exploit generation for smart contracts H Wang, Y Liu, Y Li, SW Lin, C Artho, L Ma, Y Liu IEEE Transactions on Dependable and Secure Computing 19 (3), 1795-1809, 2020 | 51 | 2020 |
Break the dead end of dynamic slicing: Localizing data and control omission bug Y Lin, J Sun, L Tran, G Bai, H Wang, J Dong Proceedings of the 33rd ACM/IEEE international conference on automated …, 2018 | 35 | 2018 |
xfuzz: Machine learning guided cross-contract fuzzing Y Xue, J Ye, W Zhang, J Sun, L Ma, H Wang, J Zhao IEEE Transactions on Dependable and Secure Computing, 2022 | 30 | 2022 |
Locating vulnerabilities in binaries via memory layout recovering H Wang, X Xie, SW Lin, Y Lin, Y Li, S Qin, Y Liu, T Liu Proceedings of the 2019 27th ACM Joint Meeting on European Software …, 2019 | 20 | 2019 |
Explaining regressions via alignment slicing and mending H Wang, Y Lin, Z Yang, J Sun, Y Liu, J Dong, Q Zheng, T Liu IEEE Transactions on Software Engineering 47 (11), 2421-2437, 2019 | 19 | 2019 |
Gptscan: Detecting logic vulnerabilities in smart contracts by combining gpt with program analysis Y Sun, D Wu, Y Xue, H Liu, H Wang, Z Xu, X Xie, Y Liu Proceedings of the IEEE/ACM 46th International Conference on Software …, 2024 | 16 | 2024 |
An entropy-based method for attack detection in large scale network T Liu, Z Wang, H Wang, K Lu International Journal of Computers Communications & Control 7 (3), 509-517, 2012 | 14 | 2012 |
Vall-nut: Principled anti-grey box-fuzzing Y Li, G Meng, J Xu, C Zhang, H Chen, X Xie, H Wang, Y Liu 2021 IEEE 32nd International Symposium on Software Reliability Engineering …, 2021 | 9 | 2021 |
Handedness recognition through keystroke-typing behavior in computer forensics analysis C Shen, H Xu, H Wang, X Guan 2016 IEEE Trustcom/BigDataSE/ISPA, 1054-1060, 2016 | 9 | 2016 |
Method for test case reduction based on program behavior slices X Guan, Q Zheng, T Liu, H Wang US Patent 9,355,019, 2016 | 7 | 2016 |
DBPD: A Dynamic Birthmark-based Software Plagiarism Detection Tool. Z Tian, Q Zheng, M Fan, E Zhuang, H Wang, T Liu SEKE, 740-741, 2014 | 7 | 2014 |
Directed test suite augmentation via exploiting program dependency H Wang, X Guan, Q Zheng, T Liu, C Shen, Z Yang Proceedings of the 6th International Workshop on Constraints in Software …, 2014 | 6 | 2014 |
DAppHunter: Identifying Inconsistent Behaviors of Blockchain-based Decentralized Applications J Zhou, T Jiang, H Wang, M Wu, T Chen 2023 IEEE/ACM 45th International Conference on Software Engineering …, 2023 | 1 | 2023 |