Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Fuzzing for Stateful Protocol Implementations: Are We There Yet?

    Stateful protocols, such as FTP, SIP, and RTSP, play a significant role in computer systems. However, their implementation is prone to security vulnerabilities, which have drawn attention from both industry an...

    Kunpeng Jian, Yanyan Zou, Yeting Li in Theoretical Aspects of Software Engineering (2024)

  2. Article

    Open Access

    PosFuzz: augmenting greybox fuzzing with effective position distribution

    Mutation-based greybox fuzzing has been one of the most prevalent techniques for security vulnerability discovery and a great deal of research work has been proposed to improve both its efficiency and effectiv...

    Yanyan Zou, Wei Zou, JiaCheng Zhao, Nanyu Zhong, Yu Zhang, Ji Shi, Wei Huo in Cybersecurity (2023)

  3. Article

    Open Access

    NDFuzz: a non-intrusive coverage-guided fuzzing framework for virtualized network devices

    Network function virtualization provides programmable in-network middlewares by leveraging virtualization technologies and commodity hardware and has gained popularity among all mainstream network device manuf...

    Yu Zhang, Nanyu Zhong, Wei You, Yanyan Zou, Kunpeng Jian, Jiahuan Xu in Cybersecurity (2022)

  4. Article

    Open Access

    CAMFuzz: Explainable Fuzzing with Local Interpretation

    Grey-box fuzzing techniques have been widely used in software bug finding. In general, there are many decisions to make in the fuzzing process, including which code block in the target program should be explor...

    Ji Shi, Wei Zou, Chao Zhang, Lingxiao Tan, Yanyan Zou, Yue Peng, Wei Huo in Cybersecurity (2022)

  5. Article

    Open Access

    ESRFuzzer: an enhanced fuzzing framework for physical SOHO router devices to discover multi-Type vulnerabilities

    SOHO (small office/home office) routers provide services for end devices to connect to the Internet, playing an important role in cyberspace. Unfortunately, security vulnerabilities pervasively exist in these ...

    Yu Zhang, Wei Huo, Kunpeng Jian, Ji Shi, Longquan Liu, Yanyan Zou in Cybersecurity (2021)

  6. No Access

    Chapter and Conference Paper

    CLTR: Collectively Linking Temporal Records Across Heterogeneous Sources

    A huge volume of data on the Web are continually made available, which provides users rich amount of information to learn more about entities. In addition to attribute values of entities, there is often additi...

    Yanyan Zou, Kasun S. Perera in Database Systems for Advanced Applications (2017)