Follow
Jiongyi Chen
Jiongyi Chen
Verified email at nudt.edu.cn - Homepage
Title
Cited by
Cited by
Year
IOTFUZZER: Discovering Memory Corruptions in IoT Through App-based Fuzzing
J Chen, W Diao, Q Zhao, C Zuo, Z Lin, XF Wang, WC Lau, M Sun, R Yang, ...
Proceedings of the 25th Network and Distributed System Security Symposium …, 2018
3832018
Your smart home can't keep a secret: Towards automated fingerprinting of iot traffic
S Dong, Z Li, D Tang, J Chen, M Sun, K Zhang
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
642020
Badbluetooth: Breaking android security mechanisms via malicious bluetooth peripherals.
F Xu, W Diao, Z Li, J Chen, K Zhang
NDSS, 2019
522019
{CryptoREX}: Large-scale analysis of cryptographic misuse in {IoT} devices
L Zhang, J Chen, W Diao, S Guo, J Weng, K Zhang
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
352019
Your iots are (not) mine: On the remote binding between iot devices and users
J Chen, C Zuo, W Diao, S Dong, Q Zhao, M Sun, Z Lin, Y Zhang, K Zhang
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019
342019
Vetting Single {Sign-On}{SDK} Implementations via Symbolic Reasoning
R Yang, WC Lau, J Chen, K Zhang
27th USENIX Security Symposium (USENIX Security 18), 1459-1474, 2018
182018
Game of hide-and-seek: Exposing hidden interfaces in embedded web applications of iot devices
W Xie, J Chen, Z Wang, C Feng, E Wang, Y Gao, B Wang, K Lu
Proceedings of the ACM Web Conference 2022, 524-532, 2022
102022
Security analysis of device binding for IP-based IoT devices
J Chen, M Sun, K Zhang
2019 IEEE International Conference on Pervasive Computing and Communications …, 2019
72019
DeFault: mutual information-based crash triage for massive crashes
X Zhang, J Chen, C Feng, R Li, W Diao, K Zhang, J Lei, C Tang
Proceedings of the 44th International Conference on Software Engineering …, 2022
62022
SeVulDet: A semantics-enhanced learnable vulnerability detector
Z Tang, Q Hu, Y Hu, W Kuang, J Chen
2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems …, 2022
52022
{HOMESPY}: The Invisible Sniffer of Infrared Remote Control of Smart {TVs}
K Huang, YT Zhou, K Zhang, J Xu, J Chen, D Tang, K Zhang
32nd USENIX Security Symposium (USENIX Security 23), 4553-4570, 2023
42023
Demystifying Android non-SDK APIs: measurement and understanding
S Yang, R Li, J Chen, W Diao, S Guo
Proceedings of the 44th International Conference on Software Engineering …, 2022
42022
Automated Exploitable Heap Layout Generation for Heap Overflows Through Manipulation {Distance-Guided} Fuzzing
B Zhang, J Chen, R Li, C Feng, R Li, C Tang
32nd USENIX Security Symposium (USENIX Security 23), 4499-4515, 2023
32023
Towards Automatic and Precise Heap Layout Manipulation for General-Purpose Programs.
R Li, B Zhang, J Chen, W Lin, C Feng, C Tang
NDSS, 2023
32023
Reducing Test Cases with Attention Mechanism of Neural Networks
X Zhang, J Chen, C Feng, R Li, Y Su, B Zhang, J Lei, C Tang
30th USENIX Security Symposium (USENIX Security 21), 2075-2092, 2021
32021
Understanding the Brains and Brawn of Illicit Streaming App
K Huang, K Zhang, J Chen, M Sun, W Sun, D Tang, K Zhang
International Conference on Digital Forensics and Cyber Crime, 194-214, 2021
12021
Cast Away: On the Security of DLNA Deployments in the SmartTV Ecosystem
G Tian, J Chen, K Yan, S Yang, W Diao
2022 IEEE 22nd International Conference on Software Quality, Reliability and …, 2022
2022
Authorisation inconsistency in IoT third‐party integration
J Chen, F Xu, S Dong, W Sun, K Zhang
IET Information Security 16 (2), 133-143, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–18