Cited By
View all- Zhang YLiu TWang YQi YJi KTang JWang XLi XZuo Z(2024)HardTaint: Production-Run Dynamic Taint Analysis via Selective Hardware TracingProceedings of the ACM on Programming Languages10.1145/36897688:OOPSLA2(1615-1640)Online publication date: 8-Oct-2024
- Yue TJin YZhang FNing ZWang PZhou XLu K(2024)Efficiently Rebuilding Coverage in Hardware-Assisted Greybox FuzzingProceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3678890.3678933(450-464)Online publication date: 30-Sep-2024
- Yue TZhang FNing ZWang PZhou XLu KZhou L(2024)Armor: Protecting Software Against Hardware Tracing TechniquesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.337281619(4247-4262)Online publication date: 2024
- Show More Cited By