Pengfei Wang

Orcid: 0000-0003-3408-4153

Affiliations:
  • National University of Defense Technology, School of Computer Science, Changsha, China (PhD 2018)


According to our database1, Pengfei Wang authored at least 30 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Instiller: Toward Efficient and Realistic RTL Fuzzing.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., July, 2024

The progress, challenges, and perspectives of directed greybox fuzzing.
Softw. Test. Verification Reliab., March, 2024

Armor: Protecting Software Against Hardware Tracing Techniques.
IEEE Trans. Inf. Forensics Secur., 2024

INSTILLER: Towards Efficient and Realistic RTL Fuzzing.
CoRR, 2024

HyperGo: Probability-based directed hybrid fuzzing.
Comput. Secur., 2024

Efficiently Rebuilding Coverage in Hardware-Assisted Greybox Fuzzing.
Proceedings of the 27th International Symposium on Research in Attacks, 2024

DeepGo: Predictive Directed Greybox Fuzzing.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

2023
A Survey of the Security Analysis of Embedded Devices.
Sensors, November, 2023

IoTSim: Internet of Things-Oriented Binary Code Similarity Detection with Multiple Block Relations.
Sensors, September, 2023

UltraFuzz: Towards Resource-Saving in Distributed Fuzzing.
IEEE Trans. Software Eng., April, 2023

From Release to Rebirth: Exploiting Thanos Objects in Linux Kernel.
IEEE Trans. Inf. Forensics Secur., 2023

VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

ReForker: Patching x86_64 Binaries with the Fork Server to Improve Hardware-Assisted Fuzzing through Trampoline-Based Binary Rewriting.
Proceedings of the 2nd International Conference on Networks, 2023

2022
ovAFLow: Detecting Memory Corruption Bugs with Fuzzing-Based Taint Inference.
J. Comput. Sci. Technol., 2022

MobFuzz: Adaptive Multi-objective Optimization in Gray-box Fuzzing.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

2021
MEBS: Uncovering Memory Life-Cycle Bugs in Operating System Kernels.
J. Comput. Sci. Technol., 2021

HashMTI: Scalable Mutation-based Taint Inference with Hash Records.
Proceedings of the 28th IEEE International Conference on Software Analysis, 2021

ARGUS: Assessing Unpatched Vulnerable Devices on the Internet via Efficient Firmware Recognition.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Sabotaging the system boundary: A study of the inter-boundary vulnerability.
J. Inf. Secur. Appl., 2020

UniFuzz: Optimizing Distributed Fuzzing via Dynamic Centralized Task Scheduling.
CoRR, 2020

SoK: The Progress, Challenges, and Perspectives of Directed Greybox Fuzzing.
CoRR, 2020

EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit.
Proceedings of the 29th USENIX Security Symposium, 2020

2019
DFTracker: detecting double-fetch bugs by multi-taint parallel tracking.
Frontiers Comput. Sci., 2019

AVPredictor: Comprehensive prediction and detection of atomicity violations.
Concurr. Comput. Pract. Exp., 2019

LearnAFL: Greybox Fuzzing With Knowledge Enhancement.
IEEE Access, 2019

Poster: Fuzzing IoT Firmware via Multi-stage Message Generation.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Untrusted Hardware Causes Double-Fetch Problems in the I/O Memory.
J. Comput. Sci. Technol., 2018

A survey of the double-fetch vulnerabilities.
Concurr. Comput. Pract. Exp., 2018

DFTinker: Detecting and Fixing Double-Fetch Bugs in an Automated Way.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

2017
How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel.
Proceedings of the 26th USENIX Security Symposium, 2017


  Loading...