Select Publications

Conference Papers

Ding Z; Deng G; Liu Y; Ding J; Chen J; Sui Y; Li Y, 2025, 'IllusionCAPTCHA: A CAPTCHA based on Visual Illusion', in Www 2025 Proceedings of the ACM Web Conference, pp. 3683 - 3691, http://dx.doi.org/10.1145/3696410.3714726

Chen Z; Kemper P; Liu Y; Gorzny J; Siqueira D; Li Y; Pellegrino D; Derka M, 2025, 'A Methodology for Replicating Historical Exploits on EVM-Compatible Blockchains', in Proceedings 2025 IEEE ACM 7th International Workshop on Emerging Trends in Software Engineering for Blockchain Wetseb 2025, pp. 57 - 60, http://dx.doi.org/10.1109/WETSEB66605.2025.00014

Ding Z; Fu Q; Ding J; Deng G; Liu Y; Li Y, 2025, 'A Rusty Link in the AI Supply Chain: Detecting Evil Configurations in Model Repositories', in Proceedings 46th IEEE Symposium on Security and Privacy Workshops Spw 2025, pp. 260 - 264, http://dx.doi.org/10.1109/SPW67851.2025.00036

Xu Z; Liu Y; Deng G; Wang K; Li Y; Shi L; Picek S, 2025, 'Continuous Embedding Attacks via Clipped Inputs in Jailbreaking Large Language Models', in Proceedings 46th IEEE Symposium on Security and Privacy Workshops Spw 2025, pp. 270 - 277, http://dx.doi.org/10.1109/SPW67851.2025.00038

Jin D; Fu Q; Li Y, 2025, 'Good News for Script Kiddies? Evaluating Large Language Models for Automated Exploit Generation', in Proceedings 46th IEEE Symposium on Security and Privacy Workshops Spw 2025, pp. 278 - 282, http://dx.doi.org/10.1109/SPW67851.2025.00039

Sun W; Miao Y; Li Y; Zhang H; Fang C; Liu Y; Deng G; Liu Y; Chen Z, 2025, 'Source Code Summarization in the Era of Large Language Models', in Proceedings International Conference on Software Engineering, pp. 1882 - 1894, http://dx.doi.org/10.1109/ICSE55347.2025.00034

Li S; Li Y; Chen Z; Dong C; Wang Y; Li H; Chen Y; Zhu H, 2025, 'TransferFuzz: Fuzzing with Historical Trace for Verifying Propagated Vulnerability Code', in Proceedings International Conference on Software Engineering, pp. 268 - 280, http://dx.doi.org/10.1109/ICSE55347.2025.00061

Kute DV; Xu Z; Li Y; Rabhi F, 2025, 'Truman: A Large Language Model-based Multi-agent Simulator for Synthetic Money Laundering Data Generation', in Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems Aamas, pp. 2594 - 2596

Liu T; Deng Z; Meng G; Li Y; Chen K, 2024, 'Demystifying RCE Vulnerabilities in LLM-Integrated Apps', in Ccs 2024 Proceedings of the 2024 ACM Sigsac Conference on Computer and Communications Security, pp. 1716 - 1730, http://dx.doi.org/10.1145/3658644.3690338

Yang W; Gao C; Liu X; Li Y; Xue Y, 2024, 'Rust-twins: Automatic Rust Compiler Testing through Program Mutation and Dual Macros Generation', in Proceedings 2024 39th ACM IEEE International Conference on Automated Software Engineering Ase 2024, pp. 631 - 642, http://dx.doi.org/10.1145/3691620.3695059

Yu J; Xie X; Zhang C; Chen S; Li Y; Shen W, 2024, 'Bugs in Pods: Understanding Bugs in Container Runtime Systems', in Issta 2024 Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 1364 - 1376, http://dx.doi.org/10.1145/3650212.3680366

Zhang C; Zheng Y; Bai M; Li Y; Ma W; Xie X; Li Y; Sun L; Liu Y, 2024, 'How Effective Are They? Exploring Large Language Model Based Fuzz Driver Generation', in Issta 2024 Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 1223 - 1235, http://dx.doi.org/10.1145/3650212.3680355

Liu Y; Deng G; Xu Z; Li Y; Zheng Y; Zhang Y; Zhao L; Zhang T; Wang K, 2024, 'A Hitchhiker’s Guide to Jailbreaking ChatGPT via Prompt Engineering', in Sea4dq 2024 Proceedings of the 4th International Workshop on Software Engineering and AI for Data Quality in Cyber Physical Systems Internet of Things Co Located with Esec Fse 2024, pp. 12 - 21, http://dx.doi.org/10.1145/3663530.3665021

Du Z; Li Y; Zheng Y; Zhang X; Zhang C; Liu Y; Habib SM; Li X; Wang L; Liu Y; Mao B, 2024, 'Medusa: Unveil Memory Exhaustion DoS Vulnerabilities in Protocol Implementations', in Www 2024 Proceedings of the ACM Web Conference, pp. 1668 - 1679, http://dx.doi.org/10.1145/3589334.3645476

Wang G; Li Y; Liu Y; Deng G; Li T; Xu G; Liu Y; Wang H; Wang K, 2024, 'MeTMaP: Metamorphic Testing for Detecting False Vector Matching Problems in LLM Augmented Generation', in Proceedings 2024 IEEE ACM 1st International Conference on AI Foundation Models and Software Engineering Forge 2024, pp. 12 - 23, http://dx.doi.org/10.1145/3650105.3652297

Zhao J; Li Y; Zou Y; Liang Z; Xiao Y; Li Y; Peng B; Zhong N; Wang X; Wang W; Huo W, 2024, 'Leveraging Semantic Relations in Code and Data to Enhance Taint Analysis of Embedded Systems', in Proceedings of the 33rd Usenix Security Symposium, pp. 7067 - 7084

Deng G; Liu Y; Mayoral-Vilches V; Liu P; Li Y; Xu Y; Zhang T; Liu Y; Pinzger M; Rass S, 2024, 'PENTESTGPT: Evaluating and Harnessing Large Language Models for Automated Penetration Testing', in Proceedings of the 33rd Usenix Security Symposium, pp. 847 - 864

Sapin E; Menon S; Ge J; Habib SM; Heymann M; Li Y; Palige R; Byman G; Liu Y, 2023, 'Monitoring Automotive Software Security Health through Trustworthiness Score', in Proceedings Cscs 2023 7th ACM Computer Science in Cars Symposium, http://dx.doi.org/10.1145/3631204.3631859

Shi J; Xiao Y; Li Y; Li Y; Yu D; Yu C; Su H; Chen Y; Huo W, 2023, 'ACETest: Automated Constraint Extraction for Testing Deep Learning Operators', in Issta 2023 Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 690 - 702, http://dx.doi.org/10.1145/3597926.3598088

Liu Y; Li Y; Deng G; Juefei-Xu F; Du Y; Zhang C; Liu C; Li Y; Ma L; Liu Y, 2023, 'ASTER: Automatic Speech Recognition System Accessibility Testing for Stutterers', in Proceedings 2023 38th IEEE ACM International Conference on Automated Software Engineering Ase 2023, pp. 510 - 521, http://dx.doi.org/10.1109/ASE56229.2023.00107

Du Z; Li Y, 2023, 'HasteFuzz: Full-Speed Fuzzing', in Proceedings 2023 IEEE ACM International Workshop on Search Based and Fuzz Testing Sbft 2023, pp. 73 - 75, http://dx.doi.org/10.1109/SBFT59156.2023.00022

Deng G; Zhang Z; Li Y; Liu Y; Zhang T; Liu Y; Yu G; Wang D, 2023, 'NAUTILUS: Automated RESTful API Vulnerability Detection', in 32nd Usenix Security Symposium Usenix Security 2023, pp. 5593 - 5610

Ge J; Li Y; Liu Y; Zheng Y; Liu Y; Zhao L, 2023, 'PumpChannel: An Efficient and Secure Communication Channel for Trusted Execution Environment on ARM-FPGA Embedded SoC', in Proceedings Design Automation and Test in Europe Date, http://dx.doi.org/10.23919/DATE56975.2023.10137170

Yin J; Li M; Li Y; Yu Y; Lin B; Zou Y; Liu Y; Huo W; Xue J, 2023, 'RSFuzzer: Discovering Deep SMI Handler Vulnerabilities in UEFI Firmware with Hybrid Fuzzing', in Proceedings IEEE Symposium on Security and Privacy, pp. 2155 - 2169, http://dx.doi.org/10.1109/SP46215.2023.10179421

Ge J; Li Y; Zheng Y; Liu Y; Habib SM, 2022, 'More Secure Collaborative APIs resistant to Flush-Based Cache Attacks on Cortex-A9 Based Automotive System', in Proceedings Cscs 2022 6th ACM Computer Science in Cars Symposium, http://dx.doi.org/10.1145/3568160.3570227

Liu Y; Li Y; Liu Y; Wan R; Wu R; Liu Q, 2022, 'Morest: Industry Practice of Automatic RESTful API Testing', in ACM International Conference Proceeding Series, http://dx.doi.org/10.1145/3551349.3559498

Zheng Y; Li Y; Zhang C; Zhu H; Liu Y; Sun L, 2022, 'Efficient greybox fuzzing of applications in Linux-based IoT devices via enhanced user-mode emulation', in Issta 2022 Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 417 - 428, http://dx.doi.org/10.1145/3533767.3534414

Liu Y; Li Y; Deng G; Liu Y; Wan R; Wu R; Ji D; Xu S; Bao M, 2022, 'Morest: Model-based RESTful API Testing with Execution Feedback', in Proceedings International Conference on Software Engineering, pp. 1406 - 1417, http://dx.doi.org/10.1145/3510003.3510133

Li Y; Sun Y; Xu Z; Cao J; Li Y; Li R; Chen H; Cheung SC; Liu Y; Xiao Y, 2022, 'RegexScalpel: Regular Expression Denial of Service (ReDoS) Defense by Localize-and-Fix', in Proceedings of the 31st Usenix Security Symposium Security 2022, pp. 4183 - 4200

Du Z; Li Y; Liu Y; Mao B, 2022, 'Windranger: A Directed Greybox Fuzzer driven by Deviation Basic Blocks', in Proceedings International Conference on Software Engineering, pp. 2440 - 2451, http://dx.doi.org/10.1145/3510003.3510197

He X; Xie X; Li Y; Sun J; Li F; Zou W; Liu Y; Yu L; Zhou J; Shi W; Huo W, 2021, 'SoFi: Reflection-Augmented Fuzzing for JavaScript Engines', in Proceedings of the ACM Conference on Computer and Communications Security, pp. 2229 - 2242, http://dx.doi.org/10.1145/3460120.3484823

Li S; Lin Y; Xie X; Li Y; Li X; Ge W; Liu Y; Dong J, 2021, 'A First Look at the Effect of Deep Learning in Coverage-guided Fuzzing', in Proceedings 2021 36th IEEE ACM International Conference on Automated Software Engineering Ase 2021, pp. 1186 - 1189, http://dx.doi.org/10.1109/ASE51524.2021.9678794

Zhang C; Lin X; Li Y; Xue Y; Xie J; Chen H; Ying X; Wang J; Liu Y, 2021, 'APICRAFT: Fuzz driver generation for closed-source SDK libraries', in Proceedings of the 30th Usenix Security Symposium, pp. 2811 - 2828

Tian Z; Li Y, 2021, 'AutoCom: Automatic comment generation for C code', in Proceedings of the International Conference on Software Engineering and Knowledge Engineering Seke, pp. 632 - 633, http://dx.doi.org/10.18293/SEKE2021-202

Zhang C; Li Y; Chen H; Luo X; Li M; Nguyen AQ; Liu Y, 2021, 'BIFF: Practical Binary Fuzzing Framework for Programs of IoT and Mobile Devices', in Proceedings 2021 36th IEEE ACM International Conference on Automated Software Engineering Ase 2021, pp. 1161 - 1165, http://dx.doi.org/10.1109/ASE51524.2021.9678910

Li Y; Meng G; Xu J; Zhang C; Chen H; Xie X; Wang H; Liu Y, 2021, 'Vall-nut: Principled Anti-Grey box - Fuzzing', in Proceedings International Symposium on Software Reliability Engineering ISSRE, pp. 288 - 299, http://dx.doi.org/10.1109/ISSRE52982.2021.00039

Li Y; Chen H; Zhang C; Xiong S; Liu C; Wang Y, 2020, 'Ori: A greybox fuzzer for SOME/IP protocols in automotive ethernet', in Proceedings Asia Pacific Software Engineering Conference APSEC, pp. 495 - 499, http://dx.doi.org/10.1109/APSEC51365.2020.00063

Wen C; Wang H; Li Y; Qin S; Liu Y; Xu Z; Chen H; Xie X; Pu G; Liu T, 2020, 'Memlock: Memory usage guided fuzzing', in Proceedings International Conference on Software Engineering, pp. 765 - 777, http://dx.doi.org/10.1145/3377811.3380396

Wang H; Xie X; Li Y; Wen C; Li Y; Liu Y; Qin S; Chen H; Sui Y, 2020, 'Typestate-guided fuzzer for discovering use-after-free vulnerabilities', in Proceedings International Conference on Software Engineering, pp. 999 - 1010, http://dx.doi.org/10.1145/3377811.3380386

Chen H; Guo S; Xue Y; Sui Y; Zhang C; Li Y; Wang H; Liu Y, 2020, 'MUZZ: Thread-aware grey-box fuzzing for effective bug hunting in multithreaded programs', in Proceedings of the 29th Usenix Security Symposium, pp. 2325 - 2342

Li Y; Xue Y; Chen H; Wu X; Zhang C; Xie X; Wang H; Liu Y, 2019, 'Cerebro: Context-aware adaptive fuzzing for effective vulnerability detection', in Esec Fse 2019 Proceedings of the 2019 27th ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 533 - 544, http://dx.doi.org/10.1145/3338906.3338975

Wang H; Xie X; Lin SW; Lin Y; Li Y; Qin S; Liu Y; Liu T, 2019, 'Locating vulnerabilities in binaries via memory layout recovering', in Esec Fse 2019 Proceedings of the 2019 27th ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 718 - 728, http://dx.doi.org/10.1145/3338906.3338966

Xie X; Ma L; Wang H; Li Y; Liu Y; Li X, 2019, 'DiffChaser: Detecting Disagreements for Deep Neural Networks', in Kraus S (ed.), PROCEEDINGS OF THE TWENTY-EIGHTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, IJCAI-INT JOINT CONF ARTIF INTELL, PEOPLES R CHINA, Macao, pp. 5772 - 5778, presented at 28th International Joint Conference on Artificial Intelligence, PEOPLES R CHINA, Macao, 10 August 2019 - 16 August 2019

Du X; Chen B; Li Y; Guo J; Zhou Y; Liu Y; Jiang Y, 2019, 'LEOPARD: Identifying Vulnerable Code for Vulnerability Assessment Through Program Metrics', in Proceedings International Conference on Software Engineering, pp. 60 - 71, http://dx.doi.org/10.1109/ICSE.2019.00024

Xie X; Ma L; Wang H; Li Y; Liu Y; Li X, 2019, 'Diffchaser: Detecting disagreements for deep neural networks', in Ijcai International Joint Conference on Artificial Intelligence, pp. 5772 - 5778, http://dx.doi.org/10.24963/ijcai.2019/800

Chen H; Li Y; Chen B; Xue Y; Liu Y, 2018, 'FOT: A Versatile, Configurable, Extensible Fuzzing Framework', in Leavens GT; Garcia A; Pasareanu CS (eds.), ESEC/FSE'18: PROCEEDINGS OF THE 2018 26TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, ASSOC COMPUTING MACHINERY, FL, Lake Buena Vista, pp. 867 - 870, presented at 26th ACM Joint Meeting on European Software Engineering Conference (ESEC) / Symposium on the Foundations of Software Engineering (FSE), FL, Lake Buena Vista, 04 November 2018 - 09 November 2018, http://dx.doi.org/10.7115/3236024.3264593

Chen H; Li Y; Chen B; Xue Y; Liu Y, 2018, 'FOT: A versatile, configurable, extensible fuzzing framework', in Esec Fse 2018 Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 867 - 870, http://dx.doi.org/10.1145/3236024.3264593

Chen H; Chen B; Xue Y; Xie X; Liu Y; Li Y; Wu X, 2018, 'Hawkeye: Towards a desired directed grey-box fuzzer', in Proceedings of the ACM Conference on Computer and Communications Security, pp. 2095 - 2108, http://dx.doi.org/10.1145/3243734.3243849

Li Y, 2018, 'Principled greybox fuzzing', in Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp. 455 - 458, http://dx.doi.org/10.1007/978-3-030-02450-5_34

Li Y; Chen B; Chandramohan M; Lin SW; Liu Y; Tiu A, 2017, 'Steelix: Program-state based binary fuzzing', in Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering, pp. 627 - 637, http://dx.doi.org/10.1145/3106237.3106295


Back to profile page