팔로우
Chenyang Lyu
Chenyang Lyu
zju.edu.cn의 이메일 확인됨
제목
인용
인용
연도
{MOPT}: Optimized mutation scheduling for fuzzers
C Lyu, S Ji, C Zhang, Y Li, WH Lee, Y Song, R Beyah
28th USENIX Security Symposium (USENIX Security 19), 1949-1966, 2019
2702019
{UNIFUZZ}: A holistic and pragmatic {Metrics-Driven} platform for evaluating fuzzers
Y Li, S Ji, Y Chen, S Liang, WH Lee, Y Chen, C Lyu, C Wu, R Beyah, ...
30th USENIX Security Symposium (USENIX Security 21), 2777-2794, 2021
902021
V-fuzz: Vulnerability-oriented evolutionary fuzzing
Y Li, S Ji, C Lv, Y Chen, J Chen, Q Gu, C Wu
arXiv preprint arXiv:1901.01142, 2019
622019
Smartseed: Smart seed generation for efficient fuzzing
C Lyu, S Ji, Y Li, J Zhou, J Chen, J Chen
arXiv preprint arXiv:1807.02606, 2018
452018
V-fuzz: Vulnerability prediction-assisted evolutionary fuzzing for binary programs
Y Li, S Ji, C Lyu, Y Chen, J Chen, Q Gu, C Wu, R Beyah
IEEE transactions on cybernetics 52 (5), 3745-3756, 2020
372020
EMS: History-Driven Mutation for Coverage-based Fuzzing.
C Lyu, S Ji, X Zhang, H Liang, B Zhao, K Lu, R Beyah
NDSS, 2022
182022
A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware
B Zhao, S Ji, J Xu, Y Tian, Q Wei, Q Wang, C Lyu, X Zhang, C Lin, J Wu, ...
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022
172022
Slime: Program-sensitive energy allocation for fuzzing
C Lyu, H Liang, S Ji, X Zhang, B Zhao, M Han, Y Li, Z Wang, W Wang, ...
Proceedings of the 31st ACM SIGSOFT international symposium on software …, 2022
132022
{MINER}: A Hybrid {Data-Driven} Approach for {REST}{API} Fuzzing
C Lyu, J Xu, S Ji, X Zhang, Q Wang, B Zhao, G Pan, W Cao, P Chen, ...
32nd USENIX Security Symposium (USENIX Security 23), 4517-4534, 2023
42023
One bad apple spoils the barrel: Understanding the security risks introduced by third-party components in iot firmware
B Zhao, S Ji, J Xu, Y Tian, Q Wei, Q Wang, C Lyu, X Zhang, C Lin, J Wu, ...
IEEE Transactions on Dependable and Secure Computing, 2023
22023
{UVSCAN}: Detecting {Third-Party} Component Usage Violations in {IoT} Firmware
B Zhao, S Ji, X Zhang, Y Tian, Q Wang, Y Pu, C Lyu, R Beyah
32nd USENIX Security Symposium (USENIX Security 23), 3421-3438, 2023
12023
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–11