Pengfei Wang
Orcid: 0000-0003-3408-4153Affiliations:
- National University of Defense Technology, School of Computer Science, Changsha, China (PhD 2018)
According to our database1,
Pengfei Wang
authored at least 30 papers
between 2017 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., July, 2024
Softw. Test. Verification Reliab., March, 2024
IEEE Trans. Inf. Forensics Secur., 2024
Proceedings of the 27th International Symposium on Research in Attacks, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
2023
IoTSim: Internet of Things-Oriented Binary Code Similarity Detection with Multiple Block Relations.
Sensors, September, 2023
IEEE Trans. Software Eng., April, 2023
IEEE Trans. Inf. Forensics Secur., 2023
VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
ReForker: Patching x86_64 Binaries with the Fork Server to Improve Hardware-Assisted Fuzzing through Trampoline-Based Binary Rewriting.
Proceedings of the 2nd International Conference on Networks, 2023
2022
J. Comput. Sci. Technol., 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
2021
J. Comput. Sci. Technol., 2021
Proceedings of the 28th IEEE International Conference on Software Analysis, 2021
ARGUS: Assessing Unpatched Vulnerable Devices on the Internet via Efficient Firmware Recognition.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
J. Inf. Secur. Appl., 2020
CoRR, 2020
CoRR, 2020
EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit.
Proceedings of the 29th USENIX Security Symposium, 2020
2019
Frontiers Comput. Sci., 2019
Concurr. Comput. Pract. Exp., 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
J. Comput. Sci. Technol., 2018
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018
2017
How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel.
Proceedings of the 26th USENIX Security Symposium, 2017