Memlock: Memory usage guided fuzzing C Wen, H Wang, Y Li, S Qin, Y Liu, Z Xu, H Chen, X Xie, G Pu, T Liu Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 79 | 2020 |
Typestate-guided fuzzer for discovering use-after-free vulnerabilities H Wang, X Xie, Y Li, C Wen, Y Li, Y Liu, S Qin, H Chen, Y Sui Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 60 | 2020 |
State-taint analysis for detecting resource bugs Z Xu, C Wen, S Qin Science of Computer Programming 162, 93-109, 2018 | 13 | 2018 |
Typestate-guided fuzzer for discovering use-after-free vulnerabilities. In 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE) H Wang, X Xie, Y Li, C Wen, Y Li, Y Liu, S Qin, H Chen, Y Sui IEEE, New York, NY, USA, 999-1010, 2020 | 12 | 2020 |
Learning types for binaries Z Xu, C Wen, S Qin Formal Methods and Software Engineering: 19th International Conference on …, 2017 | 11 | 2017 |
Effective malware detection based on behaviour and data features Z Xu, C Wen, S Qin, Z Ming Smart Computing and Communication: Second International Conference, SmartCom …, 2018 | 8 | 2018 |
Type learning for binaries and its applications Z Xu, C Wen, S Qin IEEE Transactions on Reliability 68 (3), 893-912, 2018 | 4 | 2018 |
Controlled concurrency testing via periodical scheduling C Wen, M He, B Wu, Z Xu, S Qin Proceedings of the 44th International Conference on Software Engineering …, 2022 | 3 | 2022 |
Extracting automata from neural networks using active learning Z Xu, C Wen, S Qin, M He PeerJ Computer Science 7, e436, 2021 | 2 | 2021 |