P2IM: Scalable and hardware-independent firmware testing via automatic peripheral interface modeling B Feng, A Mera, L Lu 29th USENIX Security Symposium (USENIX Security 20), 1237-1254, 2020 | 204 | 2020 |
OAT: Attesting operation integrity of embedded devices Z Sun, B Feng, L Lu, S Jha 2020 IEEE Symposium on Security and Privacy (SP), 1433-1449, 2020 | 114* | 2020 |
DICE: Automatic emulation of dma input channels for dynamic firmware analysis A Mera, B Feng, L Lu, E Kirda 2021 IEEE Symposium on Security and Privacy (SP), 1938-1954, 2021 | 82 | 2021 |
Recovery of heavily fragmented JPEG files Y Tang, J Fang, KP Chow, SM Yiu, J Xu, B Feng, Q Li, Q Han Digital Investigation 18, S108-S117, 2016 | 32 | 2016 |
On the Complexity of the Web's PKI: Evaluating Certificate Validation of Mobile Browsers M Luo, B Feng, L Lu, E Kirda, K Ren IEEE Transactions on Dependable and Secure Computing, 2023 | 8 | 2023 |
AIM: Automatic Interrupt Modeling for Dynamic Firmware Analysis B Feng, M Luo, C Liu, L Lu, E Kirda IEEE Transactions on Dependable and Secure Computing, 2023 | 3 | 2023 |