Jiongyi Chen

Orcid: 0000-0003-0776-4073

According to our database1, Jiongyi Chen authored at least 22 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Bin2Summary: Beyond Function Name Prediction in Stripped Binaries with Functionality-Specific Code Embeddings.
Proc. ACM Softw. Eng., 2024

FIRMRES: Exposing Broken Device-Cloud Access Control in IoT Through Static Firmware Analysis.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

2023
Automated Exploitable Heap Layout Generation for Heap Overflows Through Manipulation Distance-Guided Fuzzing.
Proceedings of the 32nd USENIX Security Symposium, 2023

HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVs.
Proceedings of the 32nd USENIX Security Symposium, 2023

Towards Automatic and Precise Heap Layout Manipulation for General-Purpose Programs.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

2022
Authorisation inconsistency in IoT third-party integration.
IET Inf. Secur., 2022

Game of Hide-and-Seek: Exposing Hidden Interfaces in Embedded Web Applications of IoT Devices.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Cast Away: On the Security of DLNA Deployments in the SmartTV Ecosystem.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

Default: Mutual Information-based Crash Triage for Massive Crashes.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Demystifying Android Non-SDK APls: Measurement and Understanding.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

SEVulDet: A Semantics-Enhanced Learnable Vulnerability Detector.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2021
Reducing Test Cases with Attention Mechanism of Neural Networks.
Proceedings of the 30th USENIX Security Symposium, 2021

Understanding the Brains and Brawn of Illicit Streaming App.
Proceedings of the Digital Forensics and Cyber Crime - 12th EAI International Conference, 2021

2020
Movable Platform-Based Topology Detection for a Geographic Routing Wireless Sensor Network.
Sensors, 2020

Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Neural Networks.
CoRR, 2019

CryptoREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Security Analysis of Device Binding for IP-based IoT Devices.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019

BadBluetooth: Breaking Android Security Mechanisms via Malicious Bluetooth Peripherals.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

2018
Vetting Single Sign-On SDK Implementations via Symbolic Reasoning.
Proceedings of the 27th USENIX Security Symposium, 2018

IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018


  Loading...