Cited By
View all- Zhao JLi YZou YLiang ZXiao YLi YPeng BZhong NWang XWang WHuo WBalzarotti DXu W(2024)Leveraging semantic relations in code and data to enhance taint analysis of embedded systemsProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699295(7067-7084)Online publication date: 14-Aug-2024
- Ye JFei Xde Carnavalet XZhao LWu LZhang M(2024)Detecting command injection vulnerabilities in Linux-based embedded firmware with LLM-based taint analysis of library functionsComputers & Security10.1016/j.cose.2024.103971144(103971)Online publication date: Sep-2024
- Li LCai RZhang YYin X(2023)Facilitating Web Vulnerability Detection on Embedded Devices with Root Path Pruning2023 3rd International Conference on Computer Science, Electronic Information Engineering and Intelligent Control Technology (CEI)10.1109/CEI60616.2023.10527954(41-46)Online publication date: 15-Dec-2023