Jingzheng Wu
YOU?
Author Swipe
View article: The Seeds of the FUTURE Sprout from History: Fuzzing for Unveiling Vulnerabilities in Prospective Deep-Learning Libraries
The Seeds of the FUTURE Sprout from History: Fuzzing for Unveiling Vulnerabilities in Prospective Deep-Learning Libraries Open
The widespread application of large language models (LLMs) underscores the importance of deep learning (DL) technologies that rely on foundational DL libraries such as PyTorch and TensorFlow. Despite their robust features, these libraries …
View article: A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild
A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild Open
Given the remarkable achievements of existing learning-based malware detection in both academia and industry, this paper presents MalGuise, a practical black-box adversarial attack framework that evaluates the security risks of existing le…
View article: VulDL: Tree-based and Graph-based Neural Networks for Vulnerability Detection and Localization
VulDL: Tree-based and Graph-based Neural Networks for Vulnerability Detection and Localization Open
View article: When Large Language Models Confront Repository-Level Automatic Program Repair: How Well They Done?
When Large Language Models Confront Repository-Level Automatic Program Repair: How Well They Done? Open
In recent years, large language models (LLMs) have demonstrated substantial potential in addressing automatic program repair (APR) tasks. However, the current evaluation of these models for APR tasks focuses solely on the limited context o…
View article: When Large Language Models Confront Repository-Level Automatic Program Repair: How Well They Done?
When Large Language Models Confront Repository-Level Automatic Program Repair: How Well They Done? Open
In recent years, large language models (LLMs) have demonstrated substantial potential in addressing automatic program repair (APR) tasks. However, the current evaluation of these models for APR tasks focuses solely on the limited context o…
View article: MIMIR: Masked Image Modeling for Mutual Information-based Adversarial Robustness
MIMIR: Masked Image Modeling for Mutual Information-based Adversarial Robustness Open
Vision Transformers (ViTs) have emerged as a fundamental architecture and serve as the backbone of modern vision-language models. Despite their impressive performance, ViTs exhibit notable vulnerability to evasion attacks, necessitating th…
View article: A buffer overflow detection and defense method based on RISC-V instruction set extension
A buffer overflow detection and defense method based on RISC-V instruction set extension Open
Buffer overflow poses a serious threat to the memory security of modern operating systems. It overwrites the contents of other memory areas by breaking through the buffer capacity limit, destroys the system execution environment, and provi…
View article: One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware
One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware Open
Currently, the development of IoT firmware heavily depends on third-party components (TPCs) to improve development efficiency. Nevertheless, TPCs are not secure, and the vulnerabilities in TPCs will influence the security of IoT firmware. …
View article: A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware
A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware Open
As the core of IoT devices, firmware is undoubtedly vital. Currently, the development of IoT firmware heavily depends on third-party components (TPCs), which significantly improves the development efficiency and reduces the cost. Neverthel…
View article: Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art
Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art Open
Malware has been one of the most damaging threats to computers that span across multiple operating systems and various file formats. To defend against ever-increasing and ever-evolving malware, tremendous efforts have been made to propose …
View article: Open Source Software Supply Chain for Reliability Assurance of Operating Systems
Open Source Software Supply Chain for Reliability Assurance of Operating Systems Open
PDF HTML XML Export Cite reminder Open Source Software Supply Chain for Reliability Assurance of Operating Systems DOI: 10.21655/ijsi.1673-7288.00250 Author: Affiliation: Clc Number: Fund Project: Article | Figures | Metrics | Reference | …
View article: PassEye: Sniffing Your Password from HTTP Sessions by Deep Neural Network
PassEye: Sniffing Your Password from HTTP Sessions by Deep Neural Network Open
Passwords are the most widely used method for user authentication in HTTP websites. Password sniffing attacks are considered a common way to steal password. However, most existing methods have many deficiencies in versatility and automatio…
View article: VulSniper: Focus Your Attention to Shoot Fine-Grained Vulnerabilities
VulSniper: Focus Your Attention to Shoot Fine-Grained Vulnerabilities Open
With the explosive development of information technology, vulnerabilities have become one of the major threats to computer security. Most vulnerabilities with similar patterns can be detected effectively by static analysis methods. However…
View article: Inherit Differential Privacy in Distributed Setting: Multiparty Randomized Function Computation
Inherit Differential Privacy in Distributed Setting: Multiparty Randomized Function Computation Open
How to achieve differential privacy in the distributed setting, where the dataset is distributed among the distrustful parties, is an important problem. We consider in what condition can a protocol inherit the differential privacy property…
View article: POSTER
POSTER Open
A large fraction of source code in open-source systems such as Linux contain 1-day vulnerabilities. The command "patch" is used to apply the patches to source codes, and returns feedback information automatically. Unfortunately, this opera…