Author of the publication

1dFuzz: Reproduce 1-Day Vulnerabilities with Directed Differential Fuzzing.

, , , , , , , and . ISSTA, page 867-879. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Methodology for Calculating Greenhouse Effect of Aircraft Cruise Using Genetic Algorithm-Optimized Wavelet Neural Network., , , and . Complex., (2020)1dFuzz: Reproduce 1-Day Vulnerabilities with Directed Differential Fuzzing., , , , , , , and . ISSTA, page 867-879. ACM, (2023)A Location Privacy Preserving Method Based on Sensitive Diversity for LBS., , , , and . NPC, volume 8707 of Lecture Notes in Computer Science, page 409-422. Springer, (2014)An Improved Fine-Grained Encryption Method for Unstructured Big Data., , and . ICYCSEE, volume 503 of Communications in Computer and Information Science, page 361-369. Springer, (2015)A Particle Swarm Optimization Clustering-Based Attribute Generalization Privacy Protection Scheme., , , and . J. Circuits Syst. Comput., 27 (11): 1850179:1-1850179:21 (2018)High-Accuracy DOA Estimation based on Vectorized Fourth-Order Cumulant with Coprime Array., , , , , and . ICCT, page 210-215. IEEE, (2019)PACMem: Enforcing Spatial and Temporal Memory Safety via ARM Pointer Authentication., , , , , , and . CCS, page 1901-1915. ACM, (2022)A Voronoi-Based Location Privacy-Preserving Method for Continuous Query in LBS., , and . IJDSN, (2015)Finding Cracks in Shields: On the Security of Control Flow Integrity Mechanisms., , , , , and . CCS, page 1821-1835. ACM, (2020)TAICHI: Transform Your Secret Exploits Into Mine From a Victim's Perspective., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (6): 5278-5292 (November 2023)