Follow
Fei Peng
Fei Peng
Verified email at apple.com
Title
Cited by
Cited by
Year
{X-Force}:{Force-Executing} binary programs for security applications
F Peng, Z Deng, X Zhang, D Xu, Z Lin, Z Su
23rd USENIX Security Symposium (USENIX Security 14), 829-844, 2014
1442014
Pmp: Cost-effective forced execution with probabilistic memory pre-planning
W You, Z Zhang, Y Kwon, Y Aafer, F Peng, Y Shi, C Harmon, X Zhang
2020 IEEE Symposium on Security and Privacy (SP), 1121-1138, 2020
292020
P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions.
Y Kwon, F Peng, D Kim, K Kim, X Zhang, D Xu, V Yegneswaran, J Qian
NDSS, 2015
32015
Forced Execution for Security Analysis of Software Without Source Code
F Peng
Purdue University, 2021
12021
The system can't perform the operation now. Try again later.
Articles 1–4