Wang Pengfei

Wang Pengfei

Associate Professor of Computer Security

National University of Defense Technology

Biography

Wang Pengfei is an associate professor of computer security at the Department of Network and Cyber Security, National University of Defense Technology. His research interests include system security, program analysis, vulnerability detection, and fuzzing test. He is looking for self-motivated students for collaborations on computer security research.

Download my resumé.

Interests
  • System Security
  • Program Analysis
  • Vulnerability Detection
  • Fuzzing Test.
Education
  • PhD in Computer Science and Technology, 2018

    National University of Defense Technology

  • Visiting Scholar, 2016

    University College London

Recent News

[2024-1] Our paper “INSTILLER: Towards Efficient and Realistic RTL Fuzzing” has been accepted by IEEE TCAD.

[2023-11] Our paper “The Progress, Challenges, and Perspectives of Directed Greybox Fuzzing” has been accepted by STVR.

[2023-09] Our paper “DeepGo: Predictive Directed Greybox Fuzzing” has been accepted by NDSS 2024.

[2022-12] Our paper “VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search” has been accepted by NDSS 2023.

[2022-11] Our paper “From Release to Rebirth: Exploiting Thanos Objects in Linux Kernel " has been accepted by IEEE TIFS.

[2022-10] Our paper “UltraFuzz: Towards Resource-saving in Distributed Fuzzing” has been accepted by IEEE TSE.

[2021-12] Our paper “MobFuzz: Adaptive Multi-objective Optimization in Gray-box Fuzzing” has been accepted by NDSS 2022.

Experience

 
 
 
 
 
Research Service
Reviewer
Jan 2014 – Present
  • IEEE TIFS, 2023
  • Computer & Security, 2022
  • Software Quality Journal, 2018/2021

Publications

(2024). Instiller: Towards Efficient and Realistic RTL Fuzzing. IEEE TCAD.

PDF DOI

(2023). DeepGo: Predictive Directed Greybox Fuzzing. NDSS 2024.

PDF

(2023). The progress, challenges, and perspectives of directed greybox fuzzing. STVR.

PDF DOI

(2022). VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search. NDSS 2023.

PDF

(2022). From Release to Rebirth: Exploiting Thanos Objects in Linux Kernel. IEEE TIFS.

PDF DOI

(2022). UltraFuzz: Towards Resource-saving in Distributed Fuzzing. IEEE TSE.

PDF DOI

(2022). MobFuzz: Adaptive Multi-objective Optimization in Gray-box Fuzzing. NDSS 2022.

PDF Slides

(2021). MEBS: Uncovering Memory Life-Cycle Bugs in Operating System Kernels. JCST.

PDF DOI

(2021). ARGUS: Assessing Unpatched Vulnerable Devices on the Internet via Efficient Firmware Recognition. AsiaCCS 2021.

PDF DOI

(2021). HashMTI: Scalable Mutation-based Taint Inference with Hash Records. SANER 2021.

PDF

(2020). EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit. USENIX Security ‘20.

PDF Slides

(2019). Poster: Fuzzing IoT Firmware via Multi-stage Message Generation. CCS ‘19.

PDF DOI

(2018). DFTinker: Detecting and Fixing Double-fetch Bugs in an Automated Way. WASA 2018.

PDF DOI

(2018). A Survey of the Double-Fetch Vulnerabilities. CCPE.

PDF DOI

(2017). How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel. USENIX Security ‘17.

PDF Slides

Contact