- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources7
- Resource Type
-
0006000001000000
- More
- Availability
-
70
- Author / Contributor
- Filter by Author / Creator
-
-
Tang, Yuzhe (7)
-
Wang, Yibo (5)
-
Chen, Jiaqi (4)
-
Li, Kai (3)
-
Ding, Wanning (2)
-
Zhou, Yuxuan (2)
-
Gao, Xing (1)
-
Gu, Guofei (1)
-
Hu, Aiqun (1)
-
Li, Xiaofan (1)
-
Phoha, Vir Virander (1)
-
Wan, Changsheng (1)
-
Wang, XiaoFeng (1)
-
Yang, Jin (1)
-
Yang, Zhihua (1)
-
#Tyler Phillips, Kenneth E. (0)
-
#Willis, Ciara (0)
-
& Abreu-Ramos, E. D. (0)
-
& Abramson, C. I. (0)
-
& Abreu-Ramos, E. D. (0)
-
- Filter by Editor
-
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
(submitted - in Review for IEEE ICASSP-2024) (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
In blockchains, mempool controls transaction flow before consensus, denial of whose service hurts the health and security of blockchain networks. This paper presents MPFUZZ, the first mempool fuzzer to find asymmetric DoS bugs by exploring the space of symbolized mempool states and optimistically estimating the promisingness of an intermediate state in reaching bug oracles. Compared to the baseline blockchain fuzzers, MPFUZZ achieves a > 100× speedup in finding known DETER exploits. Running MPFUZZ on major Ethereum clients leads to discovering new mempool vulnerabilities, which exhibit a wide variety of sophisticated patterns, including stealthy mempool eviction and mempool locking. Rule-based mitigation schemes are proposed against all newly discovered vulnerabilities.more » « less
-
Zhou, Yuxuan; Chen, Jiaqi; Wang, Yibo; Tang, Yuzhe; Gu, Guofei (, ACM)
-
Li, Xiaofan; Yang, Jin; Chen, Jiaqi; Tang, Yuzhe; Gao, Xing (, ACM)
-
Chen, Jiaqi; Wang, Yibo; Zhou, Yuxuan; Ding, Wanning; Tang, Yuzhe; Wang, XiaoFeng; Li, Kai (, IEEE)
-
Tang, Yuzhe; Li, Kai; Wang, Yibo; Chen, Jiaqi (, Internet Society)
-
Wan, Changsheng; Phoha, Vir Virander; Tang, Yuzhe; Hu, Aiqun (, IEEE Transactions on Vehicular Technology)
An official website of the United States government

Full Text Available