Jianzhong Liu

ORCID: 0000-0003-3612-4315
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Software Testing and Debugging Techniques
  • Geochemistry and Geologic Mapping
  • Computational Drug Discovery Methods
  • Geological and Geochemical Analysis
  • Software Reliability and Analysis Research
  • Protein Structure and Dynamics
  • Software Engineering Research
  • Geochemistry and Geochronology of Asian Mineral Deposits
  • Security and Verification in Computing
  • Music and Audio Processing
  • Multi-Agent Systems and Negotiation
  • Service-Oriented Architecture and Web Services
  • Advanced Computational Techniques and Applications
  • Embedded Systems Design Techniques
  • Parallel Computing and Optimization Techniques
  • Geochemistry and Elemental Analysis
  • Molecular spectroscopy and chirality
  • Microbial Natural Products and Biosynthesis
  • Soil Geostatistics and Mapping
  • Software System Performance and Reliability
  • Mobile Agent-Based Network Management
  • Lipid Membrane Structure and Behavior
  • Free Radicals and Antioxidants
  • Speech Recognition and Synthesis

Tsinghua University
2019-2025

Xian Yang Central Hospital
2024

Jiangsu University of Technology
2024

Ministry of Natural Resources
2023-2024

Bureau of Geology and Mineral Exploration and Development of Guizhou Province
2014-2024

Guizhou University
2022-2024

ShanghaiTech University
2019-2023

Huawei Technologies (Canada)
2023

York University
2023

Hubei University of Arts and Science
2023

Greybox fuzzing has made impressive progress in recent years, evolving from heuristics-based random mutation to approaches for solving individual branch constraints. However, they have difficulty path constraints that involve deeply nested conditional statements, which are common image and video decoders, network packet analyzers, checksum tools. We propose an approach addressing this problem. First, we identify all the control flow-dependent statements of target statement. Next, select...

10.1145/3319535.3363225 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2019-11-06

Taint analysis assists fuzzers in solving complex fuzzing constraints by inferring the influencing input bytes. Execution paths real-world programs often reach loops, where these loops can be visited and recorded multiple times. Conventional taint techniques experience difficulties when distinguishing between occurrences of same constraint. In this paper, we propose PATA, a fuzzer that implements path-aware analysis, i.e. one distinguishes variable based on execution path information. PATA...

10.1109/sp46214.2022.9833594 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2022-05-01

Modern operating system kernels are too complex to be free of bugs. Fuzzing is a promising approach for vulnerability detection and has been applied kernel testing. However, existing work does not consider the influence relations between calls when generating mutating inputs, resulting in difficulties trying reach into kernel's deeper logic effectively.

10.1145/3477132.3483547 article EN 2021-10-19

eBPF is an inspiring technique in Linux that allows user space processes to extend the kernel by dynamically injecting programs. However, it poses security issues, since untrusted code now executed space. utilizes a verifier validate safety of provided programs, thus its correctness paramount importance as attackers may exploit vulnerabilities within inject malicious Bug-finding tools like fuzzers currently can detect memory bugs system calls, but they experience difficulties finding...

10.1145/3627703.3629562 article EN 2024-04-18

Modern file systems have become increasingly feature-rich and highly complex, making crash consistency difficult to perform correctly. Thoroughly testing for bugs, however, is achieve good results due insufficient state exploration, a lack of guidance test case generation, missing support modern system features. In this paper, we present new approach towards consistency: systematic persistent exploration. contrast previous efforts, our design addresses these shortcomings through the property...

10.1145/3718738 article EN ACM Transactions on Software Engineering and Methodology 2025-02-20

The Youjiang Basin in China is the world’s second-largest concentrated area of Carlin-type Au deposits after Nevada, USA, boasting cumulative reserves nearing 1000 t. This study examined recently unearthed Lintan deposit within Basin. Factor analysis and association rule algorithms were used to identify exploration vectors indicators essential for navigating this promising geological territory. In mining area, strata encompass Triassic Bianyang, Niluo, Xuman formations comprised clastic...

10.3390/min14050492 article EN Minerals 2024-05-07

10.1109/sp54263.2024.00051 article DE 2022 IEEE Symposium on Security and Privacy (SP) 2024-05-19

A new method, using a combination of 4D-molecular similarity measures and cluster analysis to construct optimum QSAR models, is applied data set 150 chemically diverse compounds build blood-brain barrier (BBB) penetration models. The complete divided into subsets based on analysis. in each subset are further training test set. Predictive QASAR models constructed for the corresponding sets. These best predict which assigned same subset, measures, from derived. results suggest that specific...

10.1021/ci0498057 article EN Journal of Chemical Information and Computer Sciences 2004-10-07

Fuzzing is a technique widely used in vulnerability detection. The process usually involves writing effective fuzz driver programs, which, when done manually, can be extremely labor intensive. Previous attempts at automation leave much to desired, either degree of or quality output. In this paper, we propose IntelliGen, framework that constructs valid drivers automatically. First, IntelliGen determines set entry functions and evaluates their respective chance exhibiting vulnerability. Then,...

10.1109/icse-seip52600.2021.00041 article EN 2021-05-01

Three and four state categorical quantitative structure–activity relationship (QSAR) models for skin sensitization have been constructed using data from the murine Local Lymph Node Assay studies. These are same we previously used to build two-state (sensitizer, nonsensitizer) QSAR (Li et al., 2007, Chem. Res. Toxicol. 20, 114–128). 4D-fingerprint descriptors derived 4D-molecular similarity paradigm generate these models. A training set of 196 a test 22 structurally diverse compounds were in...

10.1093/toxsci/kfm185 article EN Toxicological Sciences 2007-08-03

A training set of 55 antifungal P450 analogue inhibitors was used to construct receptor-independent four-dimensional quantitative structure−activity relationship (RI 4D-QSAR) models. Ten different alignments were build the models, and one alignment yields a significantly better model than other alignments. Two methodologies measure similarity best 4D-QSAR models each alignment. One method compares residual fit between pairs using cross-correlation coefficient their residuals as measure. The...

10.1021/ci034142z article EN Journal of Chemical Information and Computer Sciences 2003-10-25

Embedded operating systems (Embedded OSs) are extensively deployed in many mission-critical industrial scenarios. Any defects within these may result unacceptable losses. Therefore, it is imperative to develop tools detect bugs OSs, thus minimizing potential impacts on infrastructures. Coverage-guided fuzzing a vulnerability detection technique that has found numerous real-world vulnerabilities both application programs as well kernels. However, state-of-the-art kernel fuzzers, e.g.,...

10.1109/tcad.2022.3198910 article EN IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2022-11-01

A methodology termed membrane-interaction QSAR (MI-QSAR) analysis has been used to develop models predict drug permeability coefficients across cornea and its component layers (epithelium, stroma, endothelium). From a training set of 25 structurally diverse drugs, significant are constructed compared for the cornea, epithelium, stroma plus endothelium. Cornea is found depend on measured distribution coefficient drug, cohesive energy total potential drug-membrane "complex," three other...

10.1093/toxsci/kfi319 article EN Toxicological Sciences 2005-09-14

Greybox fuzzing has made impressive progress in recent years, evolving from heuristics-based random mutation to approaches for solving individual path constraints. However, they have difficulty constraints that involve deeply nested conditional statements, which are common image and video decoders, network packet analyzers, checksum tools. We propose an approach addressing this problem. First, we identify all the control flow-dependent statements of target statement. Next, select data...

10.48550/arxiv.1905.12228 preprint EN other-oa arXiv (Cornell University) 2019-01-01

Kernel fuzzing is an effective technique in operating system vulnerability detection. Fuzzers such as Syzkaller and Moonshine frequently pass highly structured data between fuzzer processes guest virtual machines manager the host to synchronize fuzzing-relevant information. Since machines’ system’s memory spaces are mutually isolated, fuzzers conduct synchronization operations using mechanisms Remote Procedure Calls over TCP/IP networks, incurring significant overheads that negatively impact...

10.1145/3611665 article EN ACM Transactions on Software Engineering and Methodology 2023-08-08

Following decades of exploration Carlin-type gold deposits in the Yunnan, Guizhou, and Guangxi provinces China (known as Dian–Qian–Gui Golden Triangle), surface mines are almost exhausted undiscovered orebodies deeply buried; thus, surficial geochemical information associated with concealed is poor. In this study, we compared methods extracting weak based on soil geochemistry tectono-geochemistry, then applied tectono-geochemical method to Huijiabao Nibao ore fields evaluate its validity...

10.1016/j.oregeorev.2023.105813 article EN cc-by-nc-nd Ore Geology Reviews 2023-12-01

Fuzzing is increasingly used in industrial settings for vulnerability detection due to its scalability and effectiveness. Libraries require driver programs feed the fuzzer-generated inputs into library-provided interfaces. Writing such drivers manually tedious error-prone, thus greatly hindering widespread use of fuzzing practical situations. Previous attempts at automatic synthesis perform static analysis on libraries their consumers. However, a lack dynamic object usage information renders...

10.1109/icse-seip58684.2023.00013 article EN 2023-05-01

Greybox fuzzing has received much attention from developers and researchers due to its success in discovering bugs within many programs. However, randomized algorithms have limited fuzzers' effectiveness. First, branch coverage feedback that is based on random edge ID can lead collision. Besides, state-of-the-art fuzzers heavily rely methods reach new coverage. Finally, some only employ heuristics-based bug exploitation methods, which are not effective triggering those require non-trivial...

10.1016/j.jss.2023.111886 article EN cc-by-nc-nd Journal of Systems and Software 2023-11-10
Coming Soon ...