What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Shuitao Gan
Google Scholar
7
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
BridgeRouter: Automated Capability Upgrading of Out-Of-Bounds Write Vulnerabilities to Arbitrary Memory Write Primitives in the Linux Kernel.
Dongchen Xie
Dongnan He
Wei You
Jianjun Huang
Bin Liang
Shuitao Gan
Wenchang Shi
2025
conf/ndss
EAGLEYE: Exposing Hidden Web Interfaces in IoT Devices via Routing Analysis.
Hangtian Liu
Lei Zheng
Shuitao Gan
Chao Zhang
Zicong Gao
Hongqi Zhang
Yishun Zeng
Zhiyuan Jiang
Jiahai Yang
2024
conf/uss
Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection.
Haojie He
Xingwei Lin
Ziang Weng
Ruijie Zhao
Shuitao Gan
Libo Chen
Yuede Ji
Jiashui Wang
Zhi Xue
2024
conf/sp
Labrador: Response Guided Directed Fuzzing for Black-box IoT Devices.
Hangtian Liu
Shuitao Gan
Chao Zhang
Zicong Gao
Hongqi Zhang
Xiangzhi Wang
Guangming Gao
2022
conf/ccs
Evocatio: Conjuring Bug Capabilities from a Single PoC.
Zhiyuan Jiang
Shuitao Gan
Adrian Herrera
Flavio Toffalini
Lucio Romerio
Chaojing Tang
Manuel Egele
Chao Zhang
Mathias Payer
2020
conf/uss
GREYONE: Data Flow Sensitive Fuzzing.
Shuitao Gan
Chao Zhang
Peng Chen
Bodong Zhao
Xiaojun Qin
Dong Wu
Zuoning Chen
2018
conf/sp
CollAFL: Path Sensitive Fuzzing.
Shuitao Gan
Chao Zhang
Xiaojun Qin
Xuwen Tu
Kang Li
Zhongyu Pei
Zuoning Chen
Coauthors
Adrian Herrera
(1)
Bin Liang
(1)
Bodong Zhao
(1)
Chao Zhang
(5)
Chaojing Tang
(1)
Dong Wu
(1)
Dongchen Xie
(1)
Dongnan He
(1)
Flavio Toffalini
(1)
Guangming Gao
(1)
Hangtian Liu
(2)
Haojie He
(1)
Hongqi Zhang
(2)
Jiahai Yang
(1)
Jianjun Huang
(1)
Jiashui Wang
(1)
Kang Li
(1)
Lei Zheng
(1)
Libo Chen
(1)
Lucio Romerio
(1)
Manuel Egele
(1)
Mathias Payer
(1)
Peng Chen
(1)
Ruijie Zhao
(1)
Shuitao Gan
(7)
Wei You
(1)
Wenchang Shi
(1)
Xiangzhi Wang
(1)
Xiaojun Qin
(2)
Xingwei Lin
(1)
Xuwen Tu
(1)
Yishun Zeng
(1)
Yuede Ji
(1)
Zhi Xue
(1)
Zhiyuan Jiang
(2)
Zhongyu Pei
(1)
Ziang Weng
(1)
Zicong Gao
(2)
Zuoning Chen
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to