Zulie Pan

ORCID: 0000-0001-5775-5824
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Software Testing and Debugging Techniques
  • Software Engineering Research
  • Security and Verification in Computing
  • Network Security and Intrusion Detection
  • Web Application Security Vulnerabilities
  • Software Reliability and Analysis Research
  • Advanced Decision-Making Techniques
  • Industrial Vision Systems and Defect Detection
  • Software System Performance and Reliability
  • Digital and Cyber Forensics
  • Information and Cyber Security
  • Cell Image Analysis Techniques
  • Parallel Computing and Optimization Techniques
  • Web Data Mining and Analysis
  • Biometric Identification and Security
  • User Authentication and Security Systems
  • Technology and Data Analysis
  • Anomaly Detection Techniques and Applications
  • Innovation in Digital Healthcare Systems
  • Machine Learning and Data Classification
  • Infant Health and Development
  • Complex Network Analysis Techniques
  • Embedded Systems Design Techniques
  • Analytical Chemistry and Sensors

National University of Defense Technology
2018-2024

Anhui University
2021-2022

Computer Algorithms for Medicine
2020

PLA Electronic Engineering Institute
2006-2018

University of Science and Technology of China
1999

Multiparties in image secret sharing (ISS) need to verify (detect and recognize) each other, which is seldom considered realized traditional methods. In this paper, we introduce the definition of multiparty verification. It includes two stages, i.e., a detection stage recognition stage, with evaluation methods that are also discussed. A verification scheme without pixel expansion developed, suitable for both dealer attendance nonattendance. The classic hash function, public key cryptography...

10.1016/j.ins.2021.03.029 article EN cc-by-nc-nd Information Sciences 2021-03-18

Emerging feathers of mobile devices have given new threats to the phone security, which makes malware detection technology becoming more and necessary. Android is one newer operating systems based on Linux kernel in this way it vulnerable attacks. In paper, we proposed a method. It can monitor various features obtained from device then applies machine learning classify applications as benign or malicious. Also make improvements Naïve Bayesian Classification method combined with Chi-Square...

10.1109/imccc.2013.297 article EN 2013-09-01

User authentication plays a critical role in access control of man-machine system, where the knowledge factor, such as personal identification number, constitutes most widely used element. However, factors are usually vulnerable to spoofing attack. Recently, inheritance fingerprints, emerges an efficient alternative resilient malicious users, but it normally requires special equipment. To this end, article, we propose WiPass, device-free system only leveraging pervasive Wi-Fi infrastructure...

10.1109/tii.2021.3108850 article EN IEEE Transactions on Industrial Informatics 2021-09-01

With the popularity of network technology and expansion scale, security risks are increasingly serious. Network vulnerability assessment methods, a active defense, have attracted many researchers. Most existing methods store different types data in ways, which makes querying analyzing inefficient, especially complex large-scale environment. In order to solve this problem, paper proposes method based on graph database. The host information, association relationship between hosts information...

10.1109/itnec48623.2020.9085039 article EN 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) 2020-05-05

A webshell is a malicious backdoor that allows remote access and control to web server by executing arbitrary commands. The wide use of obfuscation encryption technologies has greatly increased the difficulty detection. To this end, we propose novel detection model leveraging grammatical features extracted from PHP code. key idea combine executable data characteristics code with static text for classification. verify proposed model, construct cleaned set consisting 2,917 samples 17...

10.1155/2021/5533963 article EN cc-by Wireless Communications and Mobile Computing 2021-01-01

gVisor is a Google-published application-level kernel for containers. As lightweight and has sound isolation, it been widely used in many IT enterprises [1],[2],[3]. When new vulnerability of the upstream found, important downstream developers to test corresponding code maintain security. To achieve this aim, directed fuzzing promising. Nevertheless, there are challenges applying existing methods gVisor. The core reason that fuzzers mainly general C/C++ applications, while an OS written Go...

10.1109/tdsc.2023.3244825 article EN IEEE Transactions on Dependable and Secure Computing 2023-02-22

The technique of binary code similarity detection (BCSD) has been applied in many fields, such as malware detection, plagiarism and vulnerability search, etc. Existing solutions for the BCSD problem usually compare specific features between binaries based on control flow graphs functions from or compute embedding vector solve deep learning algorithms. In this paper, another research perspective, we propose a new lightweight method to <italic xmlns:mml="http://www.w3.org/1998/Math/MathML"...

10.1109/access.2020.3004813 article EN cc-by IEEE Access 2020-01-01

Unrestricted file upload (UFU) vulnerabilities, especially unrestricted executable (UEFU) pose severe security risks to web servers. For instance, attackers can leverage such vulnerabilities execute arbitrary code gain the control of a whole server. Therefore, it is significant develop effective and efficient methods detect UFU UEFU vulnerabilities. Towards this, most state-of-the-art are designed based on dynamic testing. Nevertheless, they still entail two critical limitations. 1) They...

10.1109/tifs.2023.3335885 article EN IEEE Transactions on Information Forensics and Security 2023-11-21

With the rapid development of Internet, malware variants have increased exponentially, which poses a key threat to cyber security. Persistent efforts been made classify variants, but there are still many challenges, including incapacity deal with various belonging similar families, problem time and resource consuming, etc. This paper proposes novel method, called Malware Entropy Sequences Reflect Family (MESRF), improve classification based on entropy sequences features. In prior research,...

10.1109/access.2020.3020330 article EN cc-by IEEE Access 2020-01-01

By analyzing the binary executable files comparing technique, this paper presents a method to detect vulnerabilities in Windows system based on security patch comparison. The technology is mostly used for detecting which are patched by Microsoft but there no clear location and detailed information of vulnerabilities. Finally, result MS15-034 vulnerability experiment demonstrates effectiveness technique.

10.1109/imccc.2016.21 article EN 2016-07-01

Web applications widely use the logging functionality, but improper handling can bring serious security threats. An attacker trigger execution of malicious data by writing to web application logs and then accessing view–logs interface, resulting in a vulnerability log injection. However, detecting this type requires automatic discovery log-injectable interfaces interfaces, which is difficult. In addition, bypasssing application-specific input-filtering checks write an effective payload also...

10.3390/app12157681 article EN cc-by Applied Sciences 2022-07-30

Current automatic exploit generation solutions generally adopt an 1-step philosophy and neglect the potential difference between analysis-time environment runtime environment. Therefore, they usually fail in evaluating exploitability for vulnerable programs running ASLR We propose ExpGen, a 2-step vulnerability-exploitability evaluation solution binary environment, with three novel techniques introduced, separately partial-exploit sensitive-POC generation, exploitation context sensitive...

10.3390/app12136593 article EN cc-by Applied Sciences 2022-06-29

Stateful network protocol fuzzing is one of the essential means for ensuring communication security. However, existing methods have problems, including frequent auxiliary message interaction, no in-depth state-space exploration, and high shares invalid interaction time. To this end, we propose SATFuzz, a stateful framework. SATFuzz first prioritizes states identified by status codes in response messages, then randomly selects state to test among high-priority states, determines its...

10.3390/app12157459 article EN cc-by Applied Sciences 2022-07-25

Cross-architecture binary code similarity detection technology has been widely used in vulnerability discovery, reverse engineering and patch detection. The identification of file compilation information is conducive to the improvement accuracy files includes architecture, compiler, optimization option obfuscation strategy. For we build a compiling architecture feature library based on ELF header for identification; use Linux system commands identify; strategy, extract 70 static features...

10.1109/imcec55388.2022.10019958 article EN 2022 IEEE 5th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC) 2022-12-16

Modern operating systems set exploit mitigations to thwart the exploit, which has also become a barrier automated generation (AEG). Many current AEG solutions do not fully account for mitigations, and as result, they are unable accurately assess exploitability of vulnerabilities in such settings.This paper proposes AEMB, an solution bypassing generating useable exploits (EXPs). Initially, AEMB identifies system based on characteristics program execution environment. Then, implements payload...

10.3390/app11209727 article EN cc-by Applied Sciences 2021-10-18

Modern web applications offer various APIs for data interaction. However, as the number of these increases, so does potential security threats. Essentially, more in an application can lead to detectable vulnerabilities. Thus, it is crucial identify comprehensively possible applications. this task faces challenges due increasing complexity development techniques and abundance similar pages. In paper, we propose APIMiner, a framework identifying by dynamically traversing pages based on page...

10.3390/electronics13061112 article EN Electronics 2024-03-18

Modern web services widely provide RESTful APIs for clients to access their functionality programmatically. Fuzzing is an emerging technique ensuring the reliability of APIs. However, existing API fuzzers repeatedly generate invalid requests due unawareness errors in tested and lack effective strategy legal value incorrect parameters. Such limitations severely hinder fuzzing performance. In this paper, we propose DynER, a new test case generation method guided by dynamic error responses...

10.3390/electronics13173476 article EN Electronics 2024-09-01

Directed grey-box fuzzing (DGF) aims to discover vulnerabilities in specific code areas efficiently. Distance metric, which is used measure the quality of seed DGF, a crucial factor affecting performance. Despite distance metrics being widely applied existing DGF frameworks, it remains opaque about how different guide process and affect result practice. In this paper, we conduct first empirical study explore perform guiding DGFs. Specifically, systematically discuss aspect calculation method...

10.48550/arxiv.2409.12701 preprint EN arXiv (Cornell University) 2024-09-19
Coming Soon ...