What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jiarun Dai
Google Scholar
7
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
HouseFuzz: Service-Aware Grey-Box Fuzzing for Vulnerability Detection in Linux-Based Firmware.
Haoyu Xiao
Ziqi Wei
Jiarun Dai
Bowen Li
Yuan Zhang
Min Yang
2025
conf/uss
Make Agent Defeat Agent: Automatic Detection of Taint-Style Vulnerabilities in LLM-based Agents.
Fengyu Liu
Yuan Zhang
Jiaqi Luo
Jiarun Dai
Tian Chen
Letian Yuan
Zhengmin Yu
Youkun Shi
Ke Li
Chengyuan Zhou
Hao Chen
Min Yang
2025
conf/uss
Effective Directed Fuzzing with Hierarchical Scheduling for Web Vulnerability Detection.
Zihan Lin
Yuan Zhang
Jiarun Dai
Xinyou Huang
Bocheng Xiang
Guangliang Yang
Letian Yuan
Lei Zhang
Tian Chen
Min Yang
2025
conf/uss
XSSky: Detecting XSS Vulnerabilities through Local Path-Persistent Fuzzing.
Youkun Shi
Yuan Zhang
Tianhao Bai
Feng Xue
Jiarun Dai
Fengyu Liu
Lei Zhang
Xiapu Luo
Min Yang
2023
conf/uss
Exorcising "Wraith": Protecting LiDAR-based Object Detector in Automated Driving System from Appearing Attacks.
Qifan Xiao
Xudong Pan
Yifan Lu
Mi Zhang
Jiarun Dai
Min Yang
2021
conf/ccs
Facilitating Vulnerability Assessment through PoC Migration.
Jiarun Dai
Yuan Zhang
Hailong Xu
Haiming Lyu
Zicheng Wu
Xinyu Xing
Min Yang
2020
conf/uss
BScout: Direct Whole Patch Presence Test for Java Executables.
Jiarun Dai
Yuan Zhang
Zheyue Jiang
Yingtian Zhou
Junyan Chen
Xinyu Xing
Xiaohan Zhang
Xin Tan
Min Yang
Zhemin Yang
Coauthors
Bocheng Xiang
(1)
Bowen Li
(1)
Chengyuan Zhou
(1)
Feng Xue
(1)
Fengyu Liu
(2)
Guangliang Yang
(1)
Hailong Xu
(1)
Haiming Lyu
(1)
Hao Chen
(1)
Haoyu Xiao
(1)
Jiaqi Luo
(1)
Jiarun Dai
(7)
Junyan Chen
(1)
Ke Li
(1)
Lei Zhang
(2)
Letian Yuan
(2)
Mi Zhang
(1)
Min Yang
(6)
Min Yang
(1)
Qifan Xiao
(1)
Tian Chen
(2)
Tianhao Bai
(1)
Xiaohan Zhang
(1)
Xiapu Luo
(1)
Xin Tan
(1)
Xinyou Huang
(1)
Xinyu Xing
(2)
Xudong Pan
(1)
Yifan Lu
(1)
Yingtian Zhou
(1)
Youkun Shi
(2)
Yuan Zhang
(1)
Yuan Zhang
(5)
Zhemin Yang
(1)
Zhengmin Yu
(1)
Zheyue Jiang
(1)
Zicheng Wu
(1)
Zihan Lin
(1)
Ziqi Wei
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to