-
1Report
المؤلفون: Liu, Puzhuo, Sun, Chengnian, Zheng, Yaowen, Feng, Xuan, Qin, Chuan, Wang, Yuncheng, Xu, Zhenyang, Li, Zhi, Di, Peng, Jiang, Yu, Sun, Limin
المصدر: TOSEM 2025
مصطلحات موضوعية: Computer Science - Cryptography and Security, Computer Science - Software Engineering
URL الوصول: http://arxiv.org/abs/2310.08275
-
2Book
المؤلفون: Wang, Yuncheng, Liu, Puzhuo, Zheng, Yaowen, Fang, Dongliang, Si, Shuaizong, Pan, Zhiwen, Zhang, Weidong, Sun, Limin
المصدر: Lecture Notes in Computer Science ; Verification, Model Checking, and Abstract Interpretation ; page 163-184 ; ISSN 0302-9743 1611-3349 ; ISBN 9783031827020 9783031827037
-
3Academic Journal
المؤلفون: Xu, Zhenyang, Tian, Yongqiang, Zhang, Mengxiao, Zhang, Jiarui, Liu, Puzhuo, Jiang, Yu, Sun, Chengnian
المساهمون: Natural Sciences and Engineering Research Council of Canada
المصدر: ACM Transactions on Software Engineering and Methodology ; volume 34, issue 2, page 1-31 ; ISSN 1049-331X 1557-7392
-
4Conference
المؤلفون: Liu, Puzhuo, Zheng,Yaowen, Sun,Chengnian, Qin,Chuan, Fang,Dongliang, Liu,Mingdong, Sun,Limin
Relation: https://doi.org/10.5281/zenodo.8376900; https://doi.org/10.5281/zenodo.8376901; oai:zenodo.org:8376901
-
5Conference
المؤلفون: Zhang, Yang, Fang, Dongliang, Liu, Puzhuo, Xi, Laile, Lu, Xiao, Chen, Xin, Si, Shuaizong, Sun, Limin
المصدر: 2024 IEEE Conference on Software Testing, Verification and Validation (ICST) ; volume 388, page 140-150
-
6Academic Journal
المؤلفون: Liu, Puzhuo, Zheng, Yaowen, Sun, Chengnian, Li, Hong, Li, Zhi, Sun, Limin
المساهمون: School of Computer Science and Engineering
مصطلحات موضوعية: Computer and Information Science, Anti-fuzzing, Protocol fuzzing
Relation: ACM Transactions on Software Engineering and Methodology; https://hdl.handle.net/10356/179415; 33; 3641847
-
7
المؤلفون: Liu, Puzhuo
Relation: https://doi.org/10.5281/zenodo.11186196; https://doi.org/10.5281/zenodo.14032136; oai:zenodo.org:14032136
-
8Conference
المؤلفون: Liu, Puzhuo, Zheng, Yaowen, Sun, Chengnian, Qin, Chuan, Fang, Dongliang, Liu, Mingdong, Sun, Limin
المساهمون: National key research and development program of china, The national natural science foundation of china
المصدر: Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 4
-
9Academic Journal
المؤلفون: Qin, Chuan, Peng, Jiaqian, Liu, Puzhuo, Zheng, Yaowen, Cheng, Kai, Zhang, Weidong, Sun, Limin
المساهمون: School of Computer Science and Engineering
مصطلحات موضوعية: Engineering::Computer science and engineering, Binary Static Analysis, Vulnerability Detection
Relation: Computers and Security; Qin, C., Peng, J., Liu, P., Zheng, Y., Cheng, K., Zhang, W. & Sun, L. (2023). UCRF: static analyzing firmware to generate under-constrained seed for fuzzing SOHO router. Computers and Security, 128, 103157-. https://dx.doi.org/10.1016/j.cose.2023.103157; https://hdl.handle.net/10356/172200; 2-s2.0-85149169642; 128; 103157
-
10Academic Journal
المؤلفون: Liu, Puzhuo, Zheng, Yaowen, Song, Zhanwei, Fang, Dongliang, Lv, Shichao, Sun, Limin
المساهمون: National Natural Science Foundation of China, Ministry of Science and Technology of the People's Republic of China, Key Technologies Research and Development Program
المصدر: Journal of Systems Architecture ; volume 127, page 102483 ; ISSN 1383-7621
-
11Book
المؤلفون: Bai, Shuangpeng, Wen, Hui, Fang, Dongliang, Sun, Yue, Liu, Puzhuo, Sun, Limin
المصدر: Applied Cryptography and Network Security ; Lecture Notes in Computer Science ; page 27-48 ; ISSN 0302-9743 1611-3349 ; ISBN 9783030783747 9783030783754