Yuan Zhang

ORCID: 0000-0003-0726-9996
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software Testing and Debugging Techniques
  • Advanced Malware Detection Techniques
  • Real-time simulation and control systems
  • Security and Verification in Computing
  • Software Engineering Research
  • Autonomous Vehicle Technology and Safety
  • Web Application Security Vulnerabilities
  • Network Security and Intrusion Detection
  • Cybercrime and Law Enforcement Studies
  • Digital and Cyber Forensics
  • Drilling and Well Engineering
  • Software System Performance and Reliability
  • Hydraulic Fracturing and Reservoir Analysis
  • Vehicular Ad Hoc Networks (VANETs)
  • Oil and Gas Production Techniques
  • Cloud Data Security Solutions
  • Scientific Computing and Data Management
  • Access Control and Trust
  • Spam and Phishing Detection
  • Software Reliability and Analysis Research
  • Blockchain Technology Applications and Security
  • Parallel Computing and Optimization Techniques

Fudan University
2022-2025

Halliburton (United States)
2024

Bug reports and patch commits are dramatically increasing for OS kernels, incentivizing a critical need kernel-level bug reproduction testing. Directed greybox fuzzing (DGF), aiming to stress-test specific part of code, is promising approach However, the existing DGF methods exclusively target user-space applications, presenting intrinsic limitations in handling kernels. In particular, these cannot pinpoint appropriate system calls needed syscall parameter values reach location,resulting low...

10.1145/3576915.3623146 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2023-11-15

Learning-based malware detectors are widely used in practice to safeguard real-world computers. One major challenge is known as model aging, where the effectiveness of these models drops drastically variants keep evolving. To tackle most existing works choose label new samples retrain aged models. However, such data-perspective methods often require excessive costs labeling and retraining. In this article, we observe that during evolution, preserve similar malicious semantics while switching...

10.1109/tdsc.2022.3144697 article EN IEEE Transactions on Dependable and Secure Computing 2022-01-25

For the safety assessment of autonomous driving systems (ADS), simulation testing has become an important complementary technique to physical road testing. In essence, is a scenario-driven approach, whose effectiveness highly dependent on quality given scenarios. Moreover, scenarios should be encoded into well-formatted files, otherwise, ADS platforms cannot take them as inputs. Without large public datasets scenario both industry and academic applications are hindered.

10.1145/3597503.3623350 article EN 2024-02-06

Detecting recurring vulnerabilities has become a popular means of static vulnerability detection in recent years because they do not require labor-intensive modeling. Recently, body work, with HiddenCPG as representative, redefined the problem statically identifying subgraph isomorphism problem. More specifically, these approaches represent known vulnerable code graph-based structures (e.g., PDG or CPG), and then identify subgraphs within target applications that match graphs. However, since...

10.1145/3589334.3645530 article EN Proceedings of the ACM Web Conference 2022 2024-05-08

Nowadays, mobile apps have greatly facilitated our daily work and lives. They are often designed to closely interact with each other through app components for data functionality sharing. The security of has been extensively studied various component attacks proposed. Meanwhile, Android system vendors developers introduced a series defense measures mitigate these threats. However, we discovered that as evolve develop, existing defenses become inadequate address the emerging requirements....

10.1145/3643730 article EN Proceedings of the ACM on software engineering. 2024-07-12

Fuzzing is one of the most popular and practical techniques for security analysis. In this work, we aim to address critical problem high-quality input generation with a novel input-aware fuzzing approach called NestFuzz. NestFuzz can universally automatically model format specifications generate valid input.

10.1145/3576915.3623103 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2023-11-15

Cryptocurrencies, while revolutionary, have become a magnet for malicious actors. With numerous reports underscoring cyberattacks and scams in this domain, our paper takes the lead characterizing visual associated with cryptocurrency wallets---a fundamental component of Web3. Specifically, scammers capitalize on omission vital wallet interface details, such as token symbols, addresses, smart contract function names, to mislead users, potentially resulting unintended financial losses....

10.1145/3589334.3645348 article EN Proceedings of the ACM Web Conference 2022 2024-05-08

Abstract Conventional approaches to addressing stuck pipe scenarios in oil field operations have typically depended on established tools and procedures. While previous research has delved into the causes of drill sticking suggested adjustments operational methodologies, current methods often fall short predicting incidents comprehensively, particularly light diverse wellbore conditions. This paper presents a novel methodology that merges principles physics, data science, uncertainty modeling...

10.2118/222762-ms article EN 2024-11-04

IoT firmware faces severe threats to security vulnerabilities. As an important method detect vulnerabilities, recurring vulnerability detection has not been systematically studied in firmware. In fact, existing methods would meet significant challenges from two aspects. First, vulnerabilities are usually reported texts without too much code-level information, e.g., patches. Second, images released as binaries, making the analysis of known and unknown quite difficult.

10.1145/3658644.3670275 article EN 2024-12-02

Emerging app-in-app ecosystems (e.g., WeChat) provide a lightweight and efficient WebView-based runtime for mini-apps, which frequently load rich web content from remote servers access sensitive resources via APIs provided by the super-apps (a.k.a. frameworks). Inspired security policy (CSP), enforce domain-based allowlist to prevent mini-apps loading untrusted malicious content. In this paper, we observe that mechanism is unreliable in because it assumes all pages under domain are trusted....

10.1145/3605762.3624430 article EN 2023-11-22
Coming Soon ...