Follow
Binbin Zhao
Title
Cited by
Cited by
Year
A Large-scale Empirical Study on the Vulnerability of Deployed IoT Devices
B Zhao, S Ji, WH Lee, C Lin, H Weng, J Wu, P Zhou, L Fang, R Beyah
IEEE Transactions on Dependable and Secure Computing, 2020
402020
Towards understanding the security of modern image captchas and underground captcha-solving services
H Weng, B Zhao, S Ji, J Chen, T Wang, Q He, R Beyah
Big Data Mining and Analytics 2 (2), 118-144, 2019
352019
Towards evaluating the security of real-world deployed image captchas
B Zhao, H Weng, S Ji, J Chen, T Wang, Q He, R Beyah
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security …, 2018
332018
MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols
Q Wang, S Ji, Y Tian, X Zhang, B Zhao, Y Kan, Z Lin, C Lin, S Deng, ...
30th USENIX Security Symposium (USENIX Security 21), 4205-4222, 2021
272021
EMS: History-Driven Mutation for Coverage-based Fuzzing
C Lyu, S Ji, X Zhang, H Liang, B Zhao, K Lu, R Beyah
NDSS, 2022
162022
A Large-Scale Empirical Analysis of the Vulnerabilities Introduced by Third-Party Components in IoT Firmware
B Zhao, S Ji, J Xu, Y Tian, Q Wei, Q Wang, C Lyu, X Zhang, C Lin, J Wu, ...
ISSTA, 2022
142022
Slime: Program-Sensitive Energy Allocation for Fuzzing
C Lyu, H Liang, S Ji, X Zhang, B Zhao, M Han, Y Li, Z Wang, W Wang, ...
ISSTA, 2022
112022
MINER: A Hybrid Data-Driven Approach for REST API Fuzzing
C Lyu, J Xu, S Ji, X Zhang, Q Wang, B Zhao, G Pan, W Cao, R Beyah
32nd USENIX Security Symposium (USENIX Security 23), 2023
42023
One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware
B Zhao, S Ji, J Xu, Y Tian, Q Wei, Q Wang, C Lyu, X Zhang, C Lin, J Wu, ...
IEEE Transactions on Dependable and Secure Computing, 2023
22023
SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices
Q Wang, B Chang, S Ji, Y Tian, X Zhang, B Zhao, G Pan, C Lyu, M Payer, ...
2024 IEEE Symposium on Security and Privacy, 2023
12023
UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware
B Zhao, S Ji, X Zhang, Y Tian, Q Wang, Y Pu, C Lyu, R Beyah
32nd USENIX Security Symposium (USENIX Security 23), 2023
12023
MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency
J Xu, X Zhang, S Ji, Y Tian, B Zhao, Q Wang, P Cheng, J Chen
NDSS, 2024
2024
Cross-architecture automatic detection method and system for third-party components and security risks thereof
M Han, C Lin, D Peng, MX Shan, L Zhang, Q Gong, B Zhao, H Xu, J Xu, ...
US Patent App. 17/991,691, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–13