Cited By
View all- Yuan YLu YZhu KHuang HChen YZhang Y(2024)sqlFuzz: Directed Fuzzing for SQL Injection VulnerabilityElectronics10.3390/electronics1315294613:15(2946)Online publication date: 26-Jul-2024
- Ruan BLiu JZhang CLiang Z(2024)KernJC: Automated Vulnerable Environment Generation for Linux Kernel VulnerabilitiesProceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3678890.3678891(384-402)Online publication date: 30-Sep-2024
- Neef SKleissner LSeifert JQuek TGao DZhou JCardenas A(2024)What All the PHUZZ Is About: A Coverage-guided Fuzzer for Finding Vulnerabilities in PHP Web ApplicationsProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3661137(1523-1538)Online publication date: 1-Jul-2024
- Show More Cited By