default search action
Pengfei Wang 0010
Person information
- affiliation (PhD 2018): National University of Defense Technology, School of Computer Science, Changsha, China
Other persons with the same name
- Pengfei Wang (aka: Peng-fei Wang, Peng-Fei Wang) — disambiguation page
- Pengfei Wang 0001 — Harbin Institute of Technology, State Key Laboratory of Robotics and System, China
- Pengfei Wang 0002 — Hong Kong University of Science and Technology, Department of Economics, Hong Kong (and 1 more)
- Pengfei Wang 0003 — Hefei University of Technology, School of Electronic Science and Applied Physics, China
- Pengfei Wang 0004 — Harbin Institute of Technology, China
- Pengfei Wang 0005 — Peking University, School of Electronics Engineering and Computer Science, Beijing, China
- Pengfei Wang 0006 — Harbin Engineering University, College of Science, China (and 1 more)
- Pengfei Wang 0007 — Harbin Institute of Technology, Department of Mathematics, Weihai, China
- Pengfei Wang 0008 — Alibaba Group, DAMO Academy, Hangzhou, China (and 2 more)
- Pengfei Wang 0009 — Beijing University of Posts and Telecommunications, China
- Pengfei Wang 0011 — Nanyang Technological University, Singapore (and 2 more)
- Pengfei Wang 0012 — Hong Kong Polytechnic University, Hung Hom, Hong Kong
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Peihong Lin, Pengfei Wang, Xu Zhou, Wei Xie, Kai Lu, Gen Zhang:
HyperGo: Probability-based directed hybrid fuzzing. Comput. Secur. 142: 103851 (2024) - [j15]Pengfei Wang, Xu Zhou, Tai Yue, Peihong Lin, Yingying Liu, Kai Lu:
The progress, challenges, and perspectives of directed greybox fuzzing. Softw. Test. Verification Reliab. 34(2) (2024) - [j14]Gen Zhang, Pengfei Wang, Tai Yue, Danjun Liu, Yubei Guo, Kai Lu:
Instiller: Toward Efficient and Realistic RTL Fuzzing. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(7): 2177-2190 (2024) - [j13]Tai Yue, Fengwei Zhang, Zhenyu Ning, Pengfei Wang, Xu Zhou, Kai Lu, Lei Zhou:
Armor: Protecting Software Against Hardware Tracing Techniques. IEEE Trans. Inf. Forensics Secur. 19: 4247-4262 (2024) - [c11]Peihong Lin, Pengfei Wang, Xu Zhou, Wei Xie, Gen Zhang, Kai Lu:
DeepGo: Predictive Directed Greybox Fuzzing. NDSS 2024 - [c10]Tai Yue, Yibo Jin, Fengwei Zhang, Zhenyu Ning, Pengfei Wang, Xu Zhou, Kai Lu:
Efficiently Rebuilding Coverage in Hardware-Assisted Greybox Fuzzing. RAID 2024: 450-464 - [i5]Gen Zhang, Pengfei Wang, Tai Yue, Xiangdong Kong, Shan Huang, Xu Zhou, Kai Lu:
MobFuzz: Adaptive Multi-objective Optimization in Gray-box Fuzzing. CoRR abs/2401.15956 (2024) - [i4]Gen Zhang, Pengfei Wang, Tai Yue, Danjun Liu, Yubei Guo, Kai Lu:
INSTILLER: Towards Efficient and Realistic RTL Fuzzing. CoRR abs/2401.15967 (2024) - 2023
- [j12]Zhenhao Luo, Pengfei Wang, Wei Xie, Xu Zhou, Baosheng Wang:
IoTSim: Internet of Things-Oriented Binary Code Similarity Detection with Multiple Block Relations. Sensors 23(18): 7789 (2023) - [j11]Xu Zhou, Pengfei Wang, Lei Zhou, Peng Xun, Kai Lu:
A Survey of the Security Analysis of Embedded Devices. Sensors 23(22): 9221 (2023) - [j10]Danjun Liu, Pengfei Wang, Xu Zhou, Wei Xie, Gen Zhang, Zhenhao Luo, Tai Yue, Baosheng Wang:
From Release to Rebirth: Exploiting Thanos Objects in Linux Kernel. IEEE Trans. Inf. Forensics Secur. 18: 533-548 (2023) - [j9]Xu Zhou, Pengfei Wang, Chenyifan Liu, Tai Yue, Yingying Liu, Congxi Song, Kai Lu, Qidi Yin, Xu Han:
UltraFuzz: Towards Resource-Saving in Distributed Fuzzing. IEEE Trans. Software Eng. 49(4): 2394-2412 (2023) - [c9]Tai Yue, Pengfei Wang, Lei Zhou, Xu Zhou, Gen Zhang, Kai Lu, Huijun Wu:
ReForker: Patching x86_64 Binaries with the Fork Server to Improve Hardware-Assisted Fuzzing through Trampoline-Based Binary Rewriting. CNCIT 2023: 235-240 - [c8]Zhenhao Luo, Pengfei Wang, Baosheng Wang, Yong Tang, Wei Xie, Xu Zhou, Danjun Liu, Kai Lu:
VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search. NDSS 2023 - [i3]Peihong Lin, Pengfei Wang, Xu Zhou, Wei Xie, Kai Lu, Gen Zhang:
HyperGo: Probability-based Directed Hybrid Fuzzing. CoRR abs/2307.07815 (2023) - 2022
- [j8]Gen Zhang, Peng-Fei Wang, Tai Yue, Xiangdong Kong, Xu Zhou, Kai Lu:
ovAFLow: Detecting Memory Corruption Bugs with Fuzzing-Based Taint Inference. J. Comput. Sci. Technol. 37(2): 405-422 (2022) - [c7]Gen Zhang, Pengfei Wang, Tai Yue, Xiangdong Kong, Shan Huang, Xu Zhou, Kai Lu:
MobFuzz: Adaptive Multi-objective Optimization in Gray-box Fuzzing. NDSS 2022 - 2021
- [j7]Gen Zhang, Peng-Fei Wang, Tai Yue, Xu Zhou, Kai Lu:
MEBS: Uncovering Memory Life-Cycle Bugs in Operating System Kernels. J. Comput. Sci. Technol. 36(6): 1248-1268 (2021) - [c6]Wei Xie, Chao Zhang, Pengfei Wang, Zhenhua Wang, Qiang Yang:
ARGUS: Assessing Unpatched Vulnerable Devices on the Internet via Efficient Firmware Recognition. AsiaCCS 2021: 421-431 - [c5]Xiangdong Kong, Yong Tang, Pengfei Wang, Shuning Wei, Tai Yue:
HashMTI: Scalable Mutation-based Taint Inference with Hash Records. SANER 2021: 84-95 - 2020
- [j6]Pengfei Wang, Xu Zhou, Kai Lu:
Sabotaging the system boundary: A study of the inter-boundary vulnerability. J. Inf. Secur. Appl. 54: 102496 (2020) - [c4]Tai Yue, Pengfei Wang, Yong Tang, Enze Wang, Bo Yu, Kai Lu, Xu Zhou:
EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit. USENIX Security Symposium 2020: 2307-2324 - [i2]Pengfei Wang, Xu Zhou:
SoK: The Progress, Challenges, and Perspectives of Directed Greybox Fuzzing. CoRR abs/2005.11907 (2020) - [i1]Xu Zhou, Pengfei Wang, Chenyifan Liu, Tai Yue, Yingying Liu, Congxi Song, Kai Lu, Qidi Yin:
UniFuzz: Optimizing Distributed Fuzzing via Dynamic Centralized Task Scheduling. CoRR abs/2009.06124 (2020)
2010 – 2019
- 2019
- [j5]Tai Yue, Yong Tang, Bo Yu, Pengfei Wang, Enze Wang:
LearnAFL: Greybox Fuzzing With Knowledge Enhancement. IEEE Access 7: 117029-117043 (2019) - [j4]Pengfei Wang, Jens Krinke, Xu Zhou, Kai Lu:
AVPredictor: Comprehensive prediction and detection of atomicity violations. Concurr. Comput. Pract. Exp. 31(15) (2019) - [j3]Pengfei Wang, Kai Lu, Gen Li, Xu Zhou:
DFTracker: detecting double-fetch bugs by multi-taint parallel tracking. Frontiers Comput. Sci. 13(2): 247-263 (2019) - [c3]Bo Yu, Pengfei Wang, Tai Yue, Yong Tang:
Poster: Fuzzing IoT Firmware via Multi-stage Message Generation. CCS 2019: 2525-2527 - 2018
- [j2]Pengfei Wang, Kai Lu, Gen Li, Xu Zhou:
A survey of the double-fetch vulnerabilities. Concurr. Comput. Pract. Exp. 30(6) (2018) - [j1]Kai Lu, Peng-Fei Wang, Gen Li, Xu Zhou:
Untrusted Hardware Causes Double-Fetch Problems in the I/O Memory. J. Comput. Sci. Technol. 33(3): 587-602 (2018) - [c2]Yingqi Luo, Pengfei Wang, Xu Zhou, Kai Lu:
DFTinker: Detecting and Fixing Double-Fetch Bugs in an Automated Way. WASA 2018: 780-785 - 2017
- [c1]Pengfei Wang, Jens Krinke, Kai Lu, Gen Li, Steve Dodier-Lazaro:
How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel. USENIX Security Symposium 2017: 1-16
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint