Welcome
Welcome
Home
Publications
Experience
Contact
Light
Dark
Automatic
Publications
Type
Conference paper
Journal article
Date
2026
2025
2024
2023
2022
2021
Breaking Isolation: A New Perspective on Hypervisor Exploitation via Cross-Domain Attacks
Gaoning Pan
,
Yiming Tao
,
Qinying Wang
,
Chunming Wu
,
Mingde Hu
,
Yizhi Ren
,
Shouling Ji
PDF
Cite
A Survey of Operating System Kernel Fuzzing
Jiacheng Xu
,
He Sun
,
Shihao Jiang
,
Qinying Wang
,
Mingming Zhang
,
Xiang Li
,
Kaiwen Shen
,
Peng Cheng
,
Jiming Chen
,
Chao Zhang
,
Shouling Ji
PDF
Cite
SmuFuzz: Enable Deep System Management Mode Fuzzing in Fully Featured UEFI Runtime Environment
Jianqiang Wang
,
Yi Xiang
,
Meng Wang
,
Qinying Wang
,
Ali Abbasi
,
Thorsten Holz
PDF
Cite
Unveiling Security Vulnerabilities in Git Large File Storage Protocol
Yuan Chen
,
Qinying Wang
,
Yong Yang
,
Yuanchao Chen
,
Yuwei Li
,
Shouling Ji
PDF
Cite
Code
Sysyphuzz: the Pressure of More Coverage
Zezhong Ren
,
Han Zheng
,
Zhiyao Feng
,
Qinying Wang
,
Marcel Busch
,
Yuqing Zhang
,
Chao Zhang
,
Mathias Payer
PDF
Cite
Code
AidFuzzer: Adaptive Interrupt-Driven Firmware Fuzzing via Run-Time State Recognition
Jianqiang Wang
,
Qinying Wang
,
Tobias Scharnowski
,
Li Shi
,
Simon Woerner
,
Thorsten Holz
PDF
Cite
Code
A Comprehensive Memory Safety Analysis of Bootloaders
Jianqiang Wang
,
Meng Wang
,
Qinying Wang
,
Nils Langius
,
Li Shi
,
Ali Abbasi
,
Thorsten Holz
PDF
Cite
Code
Slides
A Review of Smart Fuzzing: Problem Exploration and Method Classification
Qinying Wang
,
Jiacheng Xu
,
Yuwei Li
,
Zulie Pan
,
Yuqing Zhang
,
Chao Zhang
,
Shouling Ji
PDF
Cite
Pluggable Watermarking of Deepfake Models for Deepfake Detection
Han Bao
,
Xuhong Zhang
,
Qinying Wang
,
Kangming Liang
,
Zonghui Wang
,
Shouling Ji
,
Wenzhi Chen
PDF
Cite
Code
SURGEON: Performant, Flexible, and Accurate Re-Hosting via Transplantation
Florian Hofhammer
,
Marcel Busch
,
Qinying Wang
,
Manuel Egele
,
Mathias Payer
PDF
Cite
Code
SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices
Qinying Wang
,
Boyu Chang
,
Shouling Ji
,
Yuan Tian
,
Xuhong Zhang
,
Binbin Zhao
,
Gaoning Pan
,
Chenyang Lyu
,
Mathias Payer
,
Wenhai Wang
,
Raheem Beyah
PDF
Cite
Code
MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency
Jiacheng Xu
,
Xuhong Zhang
,
Shouling Ji
,
Yuan Tian
,
Binbin Zhao
,
Qinying Wang
,
Peng Cheng
,
Jiming Chen
PDF
Cite
Slides
UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware
Binbin Zhao
,
Shouling Ji
,
Xuhong Zhang
,
Yuan Tian
,
Qinying Wang
,
Yuwen Pu
,
Chenyang Lyu
,
Raheem Beyah
PDF
Cite
Slides
MINER: A Hybrid Data-Driven Approach for REST API Fuzzing
Chenyang Lyu
,
Jiacheng Xu
,
Shouling Ji
,
Xuhong Zhang
,
Qinying Wang
,
Binbin Zhao
,
Gaoning Pan
,
Wei Cao
,
Peng Chen
,
Raheem Beyah
PDF
Cite
Code
One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware
Binbin Zhao
,
Shouling Ji
,
Jiacheng Xu
,
Yuan Tian
,
Qiuyang Wei
,
Qinying Wang
,
Chenyang Lyu
,
Xuhong Zhang
,
Changting Lin
,
Jingzheng Wu
,
Raheem Beyah
PDF
Dataset
Slides
State-of-the-Art Survey of Open-source Software Supply Chain Security
Shouling Ji
,
Qinying Wang
,
Anying Chen
,
Binbin Zhao
,
Tong Ye
,
Xuhong Zhang
,
Jingzheng Wu
,
Yun Li
,
Jianwei Yin
,
Yanjun Wu
PDF
Cite
A Large-Scale Empirical Analysis of the Vulnerabilities Introduced by Third-party Components in IoT Firmware
Binbin Zhao
,
Shouling Ji
,
Jiacheng Xu
,
Yuan Tian
,
Qiuyang Wei
,
Qinying Wang
,
Chenyang Lyu
,
Xuhong Zhang
,
Changting Lin
,
Jingzheng Wu
,
Raheem Beyah
PDF
Cite
Code
Dataset
Slides
MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols
Qinying Wang
,
Shouling Ji
,
Yuan Tian
,
Xuhong Zhang
,
Binbin Zhao
,
Yuhong Kan
,
Zhaowei Lin
,
Changting Lin
,
Shuiguang Deng
,
Alex X. Liu
,
Raheem Beyah
PDF
Cite
Code
Cite
×