Follow
Haijun Wang
Haijun Wang
Verified email at xjtu.edu.cn - Homepage
Title
Cited by
Cited by
Year
Memlock: Memory usage guided fuzzing
C Wen, H Wang, Y Li, S Qin, Y Liu, Z Xu, H Chen, X Xie, G Pu, T Liu
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
1222020
Typestate-guided fuzzer for discovering use-after-free vulnerabilities
H Wang, X Xie, Y Li, C Wen, Y Li, Y Liu, S Qin, H Chen, Y Sui
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
1072020
{MUZZ}: Thread-aware grey-box fuzzing for effective bug hunting in multithreaded programs
H Chen, S Guo, Y Xue, Y Sui, C Zhang, Y Li, H Wang, Y Liu
29th USENIX Security Symposium (USENIX Security 20), 2325-2342, 2020
922020
Cerebro: context-aware adaptive fuzzing for effective vulnerability detection
Y Li, Y Xue, H Chen, X Wu, C Zhang, X Xie, H Wang, Y Liu
Proceedings of the 2019 27th ACM Joint Meeting on European Software …, 2019
902019
Diffchaser: Detecting disagreements for deep neural networks
X Xie, L Ma, H Wang, Y Li, Y Liu, X Li
International Joint Conferences on Artificial Intelligence Organization, 2019
792019
Vultron: catching vulnerable smart contracts once and for all
H Wang, Y Li, SW Lin, L Ma, Y Liu
2019 IEEE/ACM 41st International Conference on Software Engineering: New …, 2019
672019
Dependence guided symbolic execution
H Wang, T Liu, X Guan, C Shen, Q Zheng, Z Yang
IEEE Transactions on Software Engineering 43 (3), 252-271, 2016
532016
Oracle-supported dynamic exploit generation for smart contracts
H Wang, Y Liu, Y Li, SW Lin, C Artho, L Ma, Y Liu
IEEE Transactions on Dependable and Secure Computing 19 (3), 1795-1809, 2020
492020
Break the dead end of dynamic slicing: Localizing data and control omission bug
Y Lin, J Sun, L Tran, G Bai, H Wang, J Dong
Proceedings of the 33rd ACM/IEEE international conference on automated …, 2018
352018
xfuzz: Machine learning guided cross-contract fuzzing
Y Xue, J Ye, W Zhang, J Sun, L Ma, H Wang, J Zhao
IEEE Transactions on Dependable and Secure Computing, 2022
292022
Locating vulnerabilities in binaries via memory layout recovering
H Wang, X Xie, SW Lin, Y Lin, Y Li, S Qin, Y Liu, T Liu
Proceedings of the 2019 27th ACM Joint Meeting on European Software …, 2019
192019
Explaining regressions via alignment slicing and mending
H Wang, Y Lin, Z Yang, J Sun, Y Liu, J Dong, Q Zheng, T Liu
IEEE Transactions on Software Engineering 47 (11), 2421-2437, 2019
182019
An entropy-based method for attack detection in large scale network
T Liu, Z Wang, H Wang, K Lu
International Journal of Computers Communications & Control 7 (3), 509-517, 2012
142012
GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis
Y Sun, D Wu, Y Xue, H Liu, H Wang, Z Xu, X Xie, Y Liu
Proc. IEEE/ACM ICSE, 2024
102024
Vall-nut: Principled anti-grey box-fuzzing
Y Li, G Meng, J Xu, C Zhang, H Chen, X Xie, H Wang, Y Liu
2021 IEEE 32nd International Symposium on Software Reliability Engineering …, 2021
92021
Handedness recognition through keystroke-typing behavior in computer forensics analysis
C Shen, H Xu, H Wang, X Guan
2016 IEEE Trustcom/BigDataSE/ISPA, 1054-1060, 2016
92016
Method for test case reduction based on program behavior slices
X Guan, Q Zheng, T Liu, H Wang
US Patent 9,355,019, 2016
72016
DBPD: A Dynamic Birthmark-based Software Plagiarism Detection Tool.
Z Tian, Q Zheng, M Fan, E Zhuang, H Wang, T Liu
SEKE, 740-741, 2014
72014
Directed test suite augmentation via exploiting program dependency
H Wang, X Guan, Q Zheng, T Liu, C Shen, Z Yang
Proceedings of the 6th International Workshop on Constraints in Software …, 2014
62014
DAppHunter: Identifying Inconsistent Behaviors of Blockchain-based Decentralized Applications
J Zhou, T Jiang, H Wang, M Wu, T Chen
2023 IEEE/ACM 45th International Conference on Software Engineering …, 2023
12023
The system can't perform the operation now. Try again later.
Articles 1–20