Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface.
Secur. Commun. Networks, 2019
A Large-Scale Empirical Study on Control Flow Identification of Smart Contracts.
Proceedings of the 2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2019
Resetting Your Password Is Vulnerable: A Security Study of Common SMS-Based Authentication in IoT Device.
Wirel. Commun. Mob. Comput., 2018
Modeling Attack Process of Advanced Persistent Threat Using Network Evolution.
IEICE Trans. Inf. Syst., 2017
Propagation modeling of active P2P worms based on ternary matrix.
J. Netw. Comput. Appl., 2013