Follow
Xingwei Lin
Xingwei Lin
Senior Security Engineer, Ant Group
Verified email at antgroup.com
Title
Cited by
Cited by
Year
Jn-saf: Precise and efficient ndk/jni-aware inter-language static analysis framework for security vetting of android applications with native code
F Wei, X Lin, X Ou, T Chen, X Zhang
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
792018
Gptfuzzer: Red teaming large language models with auto-generated jailbreak prompts
J Yu, X Lin, X Xing
arXiv preprint arXiv:2309.10253, 2023
502023
APICraft: Fuzz Driver Generation for Closed-source SDK Libraries
C Zhang, X Lin, Y Li, Y Xue, J Xie, H Chen, X Ying, J Wang, Y Liu
30th {USENIX} Security Symposium ({USENIX} Security 21), 2811-2828, 2021
282021
V-shuttle: Scalable and semantics-aware hypervisor virtual device fuzzing
G Pan, X Lin, X Zhang, Y Jia, S Ji, C Wu, X Ying, J Wang, Y Wu
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
162021
When chatgpt meets smart contract vulnerability detection: How far are we?
C Chen, J Su, J Chen, Y Wang, T Bi, Y Wang, X Lin, T Chen, Z Zheng
arXiv preprint arXiv:2309.05520, 2023
72023
Scavenger: Misuse Error Handling Leading To QEMU/KVM Escape
G Pan, X Lin, X Ying, J Wang, C Wu
Black Hat Asia, 2021
42021
An ABI-based Classification Approach for Ethereum Smart Contracts
X Sun, X Lin, Z Liao
2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2021
32021
Better Pay Attention Whilst Fuzzing
S Zhu, J Wang, J Sun, J Yang, X Lin, T Wang, L Zhang, P Cheng
IEEE Transactions on Software Engineering, 2023
12023
DBAF: Dynamic Binary Analysis Framework and Its Applications
T Chen, Y Feng, X Lin, Z Li, X Zhang
Network and System Security: 12th International Conference, NSS 2018, Hong …, 2018
12018
Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection
H He, X Lin, Z Weng, R Zhao, S Gan, L Chen, Y Ji, J Wang, Z Xue
33rd USENIX Security Symposium (USENIX Security 24), PHILADELPHIA, PA, 2024
2024
HODOR: Reducing Attack Surface on Node.js via System Call Limitation
Wenya Wang, Xingwei Lin, Jingyi Wang, Wang Gao, Dawu Gu
BLACK HAT EUROPE 2023, 2023
2023
HODOR: Shrinking Attack Surface on Node. js via System Call Limitation
W Wang, X Lin, J Wang, W Gao, D Gu, W Lv, J Wang
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
2023
DeFiWarder: Protecting DeFi Apps from Token Leaking Vulnerabilities
J Su, X Lin, Z Fang, Z Zhu, J Chen, Z Zheng, W Lv, J Wang
2023 38th IEEE/ACM International Conference on Automated Software …, 2023
2023
The Best of Both Worlds: Integrating Semantic Features with Expert Features for Smart Contract Vulnerability Detection
X Lin, M Zhou, S Cao, J Wang, X Sun
International Conference on Blockchain and Trustworthy Systems, 17-31, 2023
2023
Better pay attention whilst fuzzing.(2023)
S ZHU, J WANG, J SUN, J YANG, X LIN, L ZHANG, P CHENG
IEEE Transactions on Software Engineering, 1-18, 0
The system can't perform the operation now. Try again later.
Articles 1–15