IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing. J Chen, W Diao, Q Zhao, C Zuo, Z Lin, XF Wang, WC Lau, M Sun, R Yang, ... NDSS, 2018 | 427 | 2018 |
Stealthy porn: Understanding real-world adversarial images for illicit online promotion K Yuan, D Tang, X Liao, XF Wang, X Feng, Y Chen, M Sun, H Lu, K Zhang 2019 IEEE Symposium on Security and Privacy (SP), 952-966, 2019 | 66 | 2019 |
Your smart home can't keep a secret: Towards automated fingerprinting of iot traffic S Dong, Z Li, D Tang, J Chen, M Sun, K Zhang Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 55 | 2020 |
Your iots are (not) mine: On the remote binding between iot devices and users J Chen, C Zuo, W Diao, S Dong, Q Zhao, M Sun, Z Lin, Y Zhang, K Zhang 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019 | 40 | 2019 |
Your smart home can't keep a secret: Towards automated fingerprinting of iot traffic with neural networks S Dong, Z Li, D Tang, J Chen, M Sun, K Zhang arXiv preprint arXiv:1909.00104, 2019 | 20 | 2019 |
Security analysis of device binding for IP-based IoT devices J Chen, M Sun, K Zhang 2019 IEEE International Conference on Pervasive Computing and Communications …, 2019 | 8 | 2019 |
Understanding the Brains and Brawn of Illicit Streaming App K Huang, K Zhang, J Chen, M Sun, W Sun, D Tang, K Zhang International Conference on Digital Forensics and Cyber Crime, 194-214, 2021 | 1 | 2021 |
LiCA: A Fine-grained and Path-sensitive Linux Capability Analysis Framework M Sun, Z Song, X Ren, D Wu, K Zhang Proceedings of the 25th International Symposium on Research in Attacks …, 2022 | | 2022 |