Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jiongyi Chen
@inproceedings{DBLP:conf/ndss/LiZCLFT23, author = {Runhao Li and Bin Zhang and Jiongyi Chen and Wenfeng Lin and Chao Feng and Chaojing Tang}, title = {Towards Automatic and Precise Heap Layout Manipulation for General-Purpose Programs}, booktitle = {30th Annual Network and Distributed System Security Symposium, {NDSS} 2023, San Diego, California, USA, February 27 - March 3, 2023}, publisher = {The Internet Society}, year = {2023}, url = {https://www.ndss-symposium.org/ndss-paper/towards-automatic-and-precise-heap-layout-manipulation-for-general-purpose-programs/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/LiZCLFT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhangCLFLT23, author = {Bin Zhang and Jiongyi Chen and Runhao Li and Chao Feng and Ruilin Li and Chaojing Tang}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Automated Exploitable Heap Layout Generation for Heap Overflows Through Manipulation Distance-Guided Fuzzing}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {4499--4515}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/zhang-bin}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ZhangCLFLT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HuangZZXCTZ23, author = {Kong Huang and Yutong Zhou and Ke Zhang and Jiacen Xu and Jiongyi Chen and Di Tang and Kehuan Zhang}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {{HOMESPY:} The Invisible Sniffer of Infrared Remote Control of Smart TVs}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {4553--4570}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/huang}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/HuangZZXCTZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ChenXDSZ22, author = {Jiongyi Chen and Fenghao Xu and Shuaike Dong and Wei Sun and Kehuan Zhang}, title = {Authorisation inconsistency in IoT third-party integration}, journal = {{IET} Inf. Secur.}, volume = {16}, number = {2}, pages = {133--143}, year = {2022}, url = {https://doi.org/10.1049/ise2.12043}, doi = {10.1049/ISE2.12043}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ChenXDSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/TangHHKC22, author = {Zhiquan Tang and Qiao Hu and Yupeng Hu and Wenxin Kuang and Jiongyi Chen}, title = {SEVulDet: {A} Semantics-Enhanced Learnable Vulnerability Detector}, booktitle = {52nd Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2022, Baltimore, MD, USA, June 27-30, 2022}, pages = {150--162}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSN53405.2022.00026}, doi = {10.1109/DSN53405.2022.00026}, timestamp = {Fri, 29 Jul 2022 16:33:35 +0200}, biburl = {https://dblp.org/rec/conf/dsn/TangHHKC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/ZhangCFLDZ0T22, author = {Xing Zhang and Jiongyi Chen and Chao Feng and Ruilin Li and Wenrui Diao and Kehuan Zhang and Jing Lei and Chaojing Tang}, title = {Default: Mutual Information-based Crash Triage for Massive Crashes}, booktitle = {44th {IEEE/ACM} 44th International Conference on Software Engineering, {ICSE} 2022, Pittsburgh, PA, USA, May 25-27, 2022}, pages = {635--646}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3510003.3512760}, doi = {10.1145/3510003.3512760}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/ZhangCFLDZ0T22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/YangLCDG22, author = {Shishuai Yang and Rui Li and Jiongyi Chen and Wenrui Diao and Shanqing Guo}, title = {Demystifying Android Non-SDK APls: Measurement and Understanding}, booktitle = {44th {IEEE/ACM} 44th International Conference on Software Engineering, {ICSE} 2022, Pittsburgh, PA, USA, May 25-27, 2022}, pages = {647--658}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3510003.3510045}, doi = {10.1145/3510003.3510045}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/YangLCDG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/TianCYYD22, author = {Guangwei Tian and Jiongyi Chen and Kailun Yan and Shishuai Yang and Wenrui Diao}, title = {Cast Away: On the Security of {DLNA} Deployments in the SmartTV Ecosystem}, booktitle = {22nd {IEEE} International Conference on Software Quality, Reliability and Security, {QRS} 2022, Guangzhou, China, December 5-9, 2022}, pages = {105--116}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/QRS57517.2022.00021}, doi = {10.1109/QRS57517.2022.00021}, timestamp = {Tue, 28 Mar 2023 19:49:47 +0200}, biburl = {https://dblp.org/rec/conf/qrs/TianCYYD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/XieCWFWGWL22, author = {Wei Xie and Jiongyi Chen and Zhenhua Wang and Chao Feng and Enze Wang and Yifei Gao and Baosheng Wang and Kai Lu}, editor = {Fr{\'{e}}d{\'{e}}rique Laforest and Rapha{\"{e}}l Troncy and Elena Simperl and Deepak Agarwal and Aristides Gionis and Ivan Herman and Lionel M{\'{e}}dini}, title = {Game of Hide-and-Seek: Exposing Hidden Interfaces in Embedded Web Applications of IoT Devices}, booktitle = {{WWW} '22: The {ACM} Web Conference 2022, Virtual Event, Lyon, France, April 25 - 29, 2022}, pages = {524--532}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3485447.3512213}, doi = {10.1145/3485447.3512213}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/XieCWFWGWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/HuangZCSSTZ21, author = {Kong Huang and Ke Zhang and Jiongyi Chen and Menghan Sun and Wei Sun and Di Tang and Kehuan Zhang}, editor = {Pavel Gladyshev and Sanjay Goel and Joshua James and George Markowsky and Daryl Johnson}, title = {Understanding the Brains and Brawn of Illicit Streaming App}, booktitle = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference, {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {441}, pages = {194--214}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-06365-7\_12}, doi = {10.1007/978-3-031-06365-7\_12}, timestamp = {Fri, 19 Apr 2024 14:54:06 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/HuangZCSSTZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhangCFLSZLT21, author = {Xing Zhang and Jiongyi Chen and Chao Feng and Ruilin Li and Yunfei Su and Bin Zhang and Jing Lei and Chaojing Tang}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Reducing Test Cases with Attention Mechanism of Neural Networks}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2075--2092}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/zhang-xing}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/ZhangCFLSZLT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/LiWC20, author = {Runzhi Li and Jian Wang and Jiongyi Chen}, title = {Movable Platform-Based Topology Detection for a Geographic Routing Wireless Sensor Network}, journal = {Sensors}, volume = {20}, number = {13}, pages = {3726}, year = {2020}, url = {https://doi.org/10.3390/s20133726}, doi = {10.3390/S20133726}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/LiWC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Dong0TCSZ20, author = {Shuaike Dong and Zhou Li and Di Tang and Jiongyi Chen and Menghan Sun and Kehuan Zhang}, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic}, booktitle = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, pages = {47--59}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269.3384732}, doi = {10.1145/3320269.3384732}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Dong0TCSZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/ChenZDDZSLZZ19, author = {Jiongyi Chen and Chaoshun Zuo and Wenrui Diao and Shuaike Dong and Qingchuan Zhao and Menghan Sun and Zhiqiang Lin and Yinqian Zhang and Kehuan Zhang}, title = {Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users}, booktitle = {49th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2019, Portland, OR, USA, June 24-27, 2019}, pages = {222--233}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSN.2019.00034}, doi = {10.1109/DSN.2019.00034}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/ChenZDDZSLZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/XuDLCZ19, author = {Fenghao Xu and Wenrui Diao and Zhou Li and Jiongyi Chen and Kehuan Zhang}, title = {BadBluetooth: Breaking Android Security Mechanisms via Malicious Bluetooth Peripherals}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/badbluetooth-breaking-android-security-mechanisms-via-malicious-bluetooth-peripherals/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/XuDLCZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/ChenSZ19, author = {Jiongyi Chen and Menghan Sun and Kehuan Zhang}, title = {Security Analysis of Device Binding for IP-based IoT Devices}, booktitle = {{IEEE} International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2019, Kyoto, Japan, March 11-15, 2019}, pages = {900--905}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/PERCOMW.2019.8730580}, doi = {10.1109/PERCOMW.2019.8730580}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/percom/ChenSZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZhangCDGWZ19, author = {Li Zhang and Jiongyi Chen and Wenrui Diao and Shanqing Guo and Jian Weng and Kehuan Zhang}, title = {CryptoREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {151--164}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/zhang-li}, timestamp = {Wed, 10 Feb 2021 22:02:04 +0100}, biburl = {https://dblp.org/rec/conf/raid/ZhangCDGWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-00104, author = {Shuaike Dong and Zhou Li and Di Tang and Jiongyi Chen and Menghan Sun and Kehuan Zhang}, title = {Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Neural Networks}, journal = {CoRR}, volume = {abs/1909.00104}, year = {2019}, url = {http://arxiv.org/abs/1909.00104}, eprinttype = {arXiv}, eprint = {1909.00104}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-00104.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ChenDZZL0LSYZ18, author = {Jiongyi Chen and Wenrui Diao and Qingchuan Zhao and Chaoshun Zuo and Zhiqiang Lin and XiaoFeng Wang and Wing Cheong Lau and Menghan Sun and Ronghai Yang and Kehuan Zhang}, title = {IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_01A-1\_Chen\_paper.pdf}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/ChenDZZL0LSYZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/YangLCZ18, author = {Ronghai Yang and Wing Cheong Lau and Jiongyi Chen and Kehuan Zhang}, editor = {William Enck and Adrienne Porter Felt}, title = {Vetting Single Sign-On {SDK} Implementations via Symbolic Reasoning}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {1459--1474}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/yang}, timestamp = {Mon, 01 Feb 2021 08:43:20 +0100}, biburl = {https://dblp.org/rec/conf/uss/YangLCZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.