Follow
Wei You
Title
Cited by
Cited by
Year
Semfuzz: Semantics-based automatic generation of proof-of-concept exploits
W You, P Zong, K Chen, XF Wang, X Liao, P Bian, B Liang
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
1482017
Profuzzer: On-the-fly input type probing for better zero-day vulnerability discovery
W You, X Wang, S Ma, J Huang, X Zhang, XF Wang, B Liang
2019 IEEE symposium on security and privacy (SP), 769-786, 2019
1452019
Cracking classifiers for evasion: a case study on the google's phishing pages filter
B Liang, M Su, W You, W Shi, G Yang
Proceedings of the 25th International Conference on World Wide Web, 345-356, 2016
1032016
Hunting vulnerable smart contracts via graph embedding based bytecode matching
J Huang, S Han, W You, W Shi, B Liang, J Wu, Y Wu
IEEE Transactions on Information Forensics and Security 16, 2144-2156, 2021
722021
AntMiner: mining more bugs by reducing noise interference
B Liang, P Bian, Y Zhang, W Shi, W You, Y Cai
Proceedings of the 38th International Conference on Software Engineering …, 2016
692016
SLF: Fuzzing without valid seed inputs
W You, X Liu, S Ma, D Perry, X Zhang, B Liang
2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019
662019
Taintman: An art-compatible dynamic taint analysis framework on unmodified and non-rooted android devices
W You, B Liang, W Shi, P Wang, X Zhang
IEEE Transactions on Dependable and Secure Computing 17 (1), 209-222, 2017
622017
Osprey: Recovery of variable and data structure via probabilistic analysis for stripped binary
Z Zhang, Y Ye, W You, G Tao, W Lee, Y Kwon, Y Aafer, X Zhang
2021 IEEE Symposium on Security and Privacy (SP), 813-832, 2021
412021
Stochfuzz: Sound and cost-effective fuzzing of stripped binaries by incremental and stochastic rewriting
Z Zhang, W You, G Tao, Y Aafer, X Liu, X Zhang
2021 IEEE Symposium on Security and Privacy (SP), 659-676, 2021
392021
Automatic Android GUI traversal with high coverage
P Wang, B Liang, W You, J Li, W Shi
2014 Fourth International Conference on Communication Systems and Network …, 2014
392014
Android {SmartTVs} vulnerability discovery via {log-guided} fuzzing
Y Aafer, W You, Y Sun, Y Shi, X Zhang, H Yin
30th USENIX Security Symposium (USENIX Security 21), 2759-2776, 2021
352021
Reference hijacking: Patching, protecting and analyzing on unmodified and non-rooted android devices
W You, B Liang, W Shi, S Zhu, P Wang, S Xie, X Zhang
Proceedings of the 38th International Conference on Software Engineering …, 2016
352016
Mass discovery of android traffic imprints through instantiated partial execution
Y Chen, W You, Y Lee, K Chen, XF Wang, W Zou
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
312017
BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation
Z Zhang, W You, G Tao, G Wei, Y Kwon, X Zhang
Proceedings of the ACM on Programming Languages 3 (OOPSLA), 1-31, 2019
302019
Pmp: Cost-effective forced execution with probabilistic memory pre-planning
W You, Z Zhang, Y Kwon, Y Aafer, F Peng, Y Shi, C Harmon, X Zhang
2020 IEEE Symposium on Security and Privacy (SP), 1121-1138, 2020
262020
Android implicit information flow demystified
W You, B Liang, J Li, W Shi, X Zhang
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
252015
Scriptless timing attacks on web browser privacy
B Liang, W You, L Liu, W Shi, M Heiderich
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
222014
Detecting stealthy malware with inter-structure and imported signatures
B Liang, W You, W Shi, Z Liang
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
192011
SLF: fuzzing without valid seed inputs. In 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE)
W You, X Liu, S Ma, D Perry, X Zhang, B Liang
IEEE, 712ś723, 2019
172019
Finding client-side business flow tampering vulnerabilities
IL Kim, Y Zheng, H Park, W Wang, W You, Y Aafer, X Zhang
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
122020
The system can't perform the operation now. Try again later.
Articles 1–20